Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 10:51
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
68c1087dc475b65907ffdf8e4353260c.exe
Resource
win7-20231215-en
8 signatures
150 seconds
General
-
Target
68c1087dc475b65907ffdf8e4353260c.exe
-
Size
6.3MB
-
MD5
68c1087dc475b65907ffdf8e4353260c
-
SHA1
64ff3fea47709e563a65da87f4f6528f6e82c838
-
SHA256
70d729c98212356bda5b956024d31190c04c54de0166264db7a783f805ddbfc6
-
SHA512
af06f39580315d222f076accacbfee1b5d5e4866a248b8f19c24ef0e3dd95cc1a68ecc8538b0750b182f1caab3348e45c6be9457b37a74d5058e99f2057ae726
-
SSDEEP
196608:eS3YdGvLDKwjQlbqQKC3aJ7ufuDmeyvv2RAxDe0zMvh:eh4z2wjQlbqQKC3M7ufWkvkh
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 68c1087dc475b65907ffdf8e4353260c.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 68c1087dc475b65907ffdf8e4353260c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 68c1087dc475b65907ffdf8e4353260c.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 68c1087dc475b65907ffdf8e4353260c.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2644 68c1087dc475b65907ffdf8e4353260c.exe -
Modifies registry class 2 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\66\ComDlg 68c1087dc475b65907ffdf8e4353260c.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\66 68c1087dc475b65907ffdf8e4353260c.exe -
Runs net.exe
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2644 68c1087dc475b65907ffdf8e4353260c.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2644 wrote to memory of 2704 2644 68c1087dc475b65907ffdf8e4353260c.exe 34 PID 2644 wrote to memory of 2704 2644 68c1087dc475b65907ffdf8e4353260c.exe 34 PID 2644 wrote to memory of 2704 2644 68c1087dc475b65907ffdf8e4353260c.exe 34 PID 2704 wrote to memory of 2760 2704 cmd.exe 28 PID 2704 wrote to memory of 2760 2704 cmd.exe 28 PID 2704 wrote to memory of 2760 2704 cmd.exe 28 PID 2760 wrote to memory of 2764 2760 net.exe 33 PID 2760 wrote to memory of 2764 2760 net.exe 33 PID 2760 wrote to memory of 2764 2760 net.exe 33 PID 2644 wrote to memory of 2776 2644 68c1087dc475b65907ffdf8e4353260c.exe 32 PID 2644 wrote to memory of 2776 2644 68c1087dc475b65907ffdf8e4353260c.exe 32 PID 2644 wrote to memory of 2776 2644 68c1087dc475b65907ffdf8e4353260c.exe 32 PID 2644 wrote to memory of 2056 2644 68c1087dc475b65907ffdf8e4353260c.exe 31 PID 2644 wrote to memory of 2056 2644 68c1087dc475b65907ffdf8e4353260c.exe 31 PID 2644 wrote to memory of 2056 2644 68c1087dc475b65907ffdf8e4353260c.exe 31 PID 2056 wrote to memory of 2820 2056 cmd.exe 29 PID 2056 wrote to memory of 2820 2056 cmd.exe 29 PID 2056 wrote to memory of 2820 2056 cmd.exe 29 PID 2644 wrote to memory of 2708 2644 68c1087dc475b65907ffdf8e4353260c.exe 30 PID 2644 wrote to memory of 2708 2644 68c1087dc475b65907ffdf8e4353260c.exe 30 PID 2644 wrote to memory of 2708 2644 68c1087dc475b65907ffdf8e4353260c.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\68c1087dc475b65907ffdf8e4353260c.exe"C:\Users\Admin\AppData\Local\Temp\68c1087dc475b65907ffdf8e4353260c.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:2708
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c w32tm /resync2⤵
- Suspicious use of WriteProcessMemory
PID:2056
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:2776
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c net start w32time2⤵
- Suspicious use of WriteProcessMemory
PID:2704
-
-
C:\Windows\system32\net.exenet start w32time1⤵
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 start w32time2⤵PID:2764
-
-
C:\Windows\system32\w32tm.exew32tm /resync1⤵PID:2820