Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
20/12/2023, 02:10
Static task
static1
Behavioral task
behavioral1
Sample
50c2d68b67e63e9e58170740ba2380a3.exe
Resource
win7-20231215-en
General
-
Target
50c2d68b67e63e9e58170740ba2380a3.exe
-
Size
14.3MB
-
MD5
50c2d68b67e63e9e58170740ba2380a3
-
SHA1
31ca0875a886a87e7f756816a5a3a8a9f0ef4805
-
SHA256
6f27472247fac75c31c76aedb7823da8429aef16f26d5ab27721686e924cde94
-
SHA512
6e3ce56f24eac510022716c69ccbd7a1332373b95568b5d985172a7197db8965dc8faccbe91a0be822e62c01adac49f6955c9e86128d8597536bd845a7770306
-
SSDEEP
196608:OvmwHVRzpgetATsTJbaAzgLPz+hgtrxro+QpqN/+BL5fNWJ+BSNLuk7GFViAk0He:OZ1lATstzYPttroBa+lq+4tUVxFE
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 50c2d68b67e63e9e58170740ba2380a3.exe -
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions 50c2d68b67e63e9e58170740ba2380a3.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 50c2d68b67e63e9e58170740ba2380a3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 50c2d68b67e63e9e58170740ba2380a3.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 50c2d68b67e63e9e58170740ba2380a3.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 64 IoCs
pid Process 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 50c2d68b67e63e9e58170740ba2380a3.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe 4560 50c2d68b67e63e9e58170740ba2380a3.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4560 wrote to memory of 2816 4560 50c2d68b67e63e9e58170740ba2380a3.exe 93 PID 4560 wrote to memory of 2816 4560 50c2d68b67e63e9e58170740ba2380a3.exe 93 PID 2816 wrote to memory of 2728 2816 cmd.exe 94 PID 2816 wrote to memory of 2728 2816 cmd.exe 94 PID 2816 wrote to memory of 3812 2816 cmd.exe 96 PID 2816 wrote to memory of 3812 2816 cmd.exe 96 PID 2816 wrote to memory of 3644 2816 cmd.exe 95 PID 2816 wrote to memory of 3644 2816 cmd.exe 95 PID 4560 wrote to memory of 4516 4560 50c2d68b67e63e9e58170740ba2380a3.exe 97 PID 4560 wrote to memory of 4516 4560 50c2d68b67e63e9e58170740ba2380a3.exe 97 PID 4560 wrote to memory of 1456 4560 50c2d68b67e63e9e58170740ba2380a3.exe 98 PID 4560 wrote to memory of 1456 4560 50c2d68b67e63e9e58170740ba2380a3.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\50c2d68b67e63e9e58170740ba2380a3.exe"C:\Users\Admin\AppData\Local\Temp\50c2d68b67e63e9e58170740ba2380a3.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Looks for VirtualBox Guest Additions in registry
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks for VirtualBox DLLs, possible anti-VM trick
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\50c2d68b67e63e9e58170740ba2380a3.exe" MD5 | find /i /v "md5" | find /i /v "certutil"2⤵
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\system32\certutil.execertutil -hashfile "C:\Users\Admin\AppData\Local\Temp\50c2d68b67e63e9e58170740ba2380a3.exe" MD53⤵PID:2728
-
-
C:\Windows\system32\find.exefind /i /v "certutil"3⤵PID:3644
-
-
C:\Windows\system32\find.exefind /i /v "md5"3⤵PID:3812
-
-
-
C:\Users\Admin\AppData\Local\Temp\50c2d68b67e63e9e58170740ba2380a3.exe"C:\Users\Admin\AppData\Local\Temp\50c2d68b67e63e9e58170740ba2380a3.exe"2⤵PID:4516
-
-
C:\Users\Admin\AppData\Local\Temp\50c2d68b67e63e9e58170740ba2380a3.exe"C:\Users\Admin\AppData\Local\Temp\50c2d68b67e63e9e58170740ba2380a3.exe"2⤵PID:1456
-