Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 10:51 UTC
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
68c1087dc475b65907ffdf8e4353260c.exe
Resource
win7-20231215-en
8 signatures
150 seconds
General
-
Target
68c1087dc475b65907ffdf8e4353260c.exe
-
Size
6.3MB
-
MD5
68c1087dc475b65907ffdf8e4353260c
-
SHA1
64ff3fea47709e563a65da87f4f6528f6e82c838
-
SHA256
70d729c98212356bda5b956024d31190c04c54de0166264db7a783f805ddbfc6
-
SHA512
af06f39580315d222f076accacbfee1b5d5e4866a248b8f19c24ef0e3dd95cc1a68ecc8538b0750b182f1caab3348e45c6be9457b37a74d5058e99f2057ae726
-
SSDEEP
196608:eS3YdGvLDKwjQlbqQKC3aJ7ufuDmeyvv2RAxDe0zMvh:eh4z2wjQlbqQKC3M7ufWkvkh
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 68c1087dc475b65907ffdf8e4353260c.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 68c1087dc475b65907ffdf8e4353260c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 68c1087dc475b65907ffdf8e4353260c.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 68c1087dc475b65907ffdf8e4353260c.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 3320 68c1087dc475b65907ffdf8e4353260c.exe -
Runs net.exe
-
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3320 wrote to memory of 5028 3320 68c1087dc475b65907ffdf8e4353260c.exe 92 PID 3320 wrote to memory of 5028 3320 68c1087dc475b65907ffdf8e4353260c.exe 92 PID 5028 wrote to memory of 3984 5028 cmd.exe 98 PID 5028 wrote to memory of 3984 5028 cmd.exe 98 PID 3984 wrote to memory of 1876 3984 net.exe 93 PID 3984 wrote to memory of 1876 3984 net.exe 93 PID 3320 wrote to memory of 3596 3320 68c1087dc475b65907ffdf8e4353260c.exe 94 PID 3320 wrote to memory of 3596 3320 68c1087dc475b65907ffdf8e4353260c.exe 94 PID 3320 wrote to memory of 2112 3320 68c1087dc475b65907ffdf8e4353260c.exe 97 PID 3320 wrote to memory of 2112 3320 68c1087dc475b65907ffdf8e4353260c.exe 97 PID 2112 wrote to memory of 1360 2112 cmd.exe 95 PID 2112 wrote to memory of 1360 2112 cmd.exe 95 PID 3320 wrote to memory of 4248 3320 68c1087dc475b65907ffdf8e4353260c.exe 96 PID 3320 wrote to memory of 4248 3320 68c1087dc475b65907ffdf8e4353260c.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\68c1087dc475b65907ffdf8e4353260c.exe"C:\Users\Admin\AppData\Local\Temp\68c1087dc475b65907ffdf8e4353260c.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:3320 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c net start w32time2⤵
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Windows\system32\net.exenet start w32time3⤵
- Suspicious use of WriteProcessMemory
PID:3984
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:3596
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:4248
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c w32tm /resync2⤵
- Suspicious use of WriteProcessMemory
PID:2112
-
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 start w32time1⤵PID:1876
-
C:\Windows\system32\w32tm.exew32tm /resync1⤵PID:1360
Network
-
Remote address:8.8.8.8:53Request71.159.190.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestg.bing.comIN AResponseg.bing.comIN CNAMEg-bing-com.a-0001.a-msedge.netg-bing-com.a-0001.a-msedge.netIN CNAMEdual-a-0001.a-msedge.netdual-a-0001.a-msedge.netIN A204.79.197.200dual-a-0001.a-msedge.netIN A13.107.21.200
-
Remote address:8.8.8.8:53Request16.134.221.88.in-addr.arpaIN PTRResponse16.134.221.88.in-addr.arpaIN PTRa88-221-134-16deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request241.154.82.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request200.197.79.204.in-addr.arpaIN PTRResponse200.197.79.204.in-addr.arpaIN PTRa-0001a-msedgenet
-
Remote address:8.8.8.8:53Request58.99.105.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request41.110.16.96.in-addr.arpaIN PTRResponse41.110.16.96.in-addr.arpaIN PTRa96-16-110-41deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request41.110.16.96.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request50.23.12.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request18.31.95.13.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request140.71.91.104.in-addr.arpaIN PTRResponse140.71.91.104.in-addr.arpaIN PTRa104-91-71-140deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request5.179.17.96.in-addr.arpaIN PTRResponse5.179.17.96.in-addr.arpaIN PTRa96-17-179-5deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request23.236.111.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request23.236.111.52.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request13.179.17.96.in-addr.arpaIN PTRResponse13.179.17.96.in-addr.arpaIN PTRa96-17-179-13deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request79.121.231.20.in-addr.arpaIN PTRResponse
-
72 B 158 B 1 1
DNS Request
71.159.190.20.in-addr.arpa
-
56 B 158 B 1 1
DNS Request
g.bing.com
DNS Response
204.79.197.20013.107.21.200
-
72 B 137 B 1 1
DNS Request
16.134.221.88.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
241.154.82.20.in-addr.arpa
-
73 B 106 B 1 1
DNS Request
200.197.79.204.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
58.99.105.20.in-addr.arpa
-
142 B 135 B 2 1
DNS Request
41.110.16.96.in-addr.arpa
DNS Request
41.110.16.96.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
95.221.229.192.in-addr.arpa
-
70 B 156 B 1 1
DNS Request
50.23.12.20.in-addr.arpa
-
70 B 144 B 1 1
DNS Request
18.31.95.13.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
140.71.91.104.in-addr.arpa
-
70 B 133 B 1 1
DNS Request
5.179.17.96.in-addr.arpa
-
144 B 158 B 2 1
DNS Request
23.236.111.52.in-addr.arpa
DNS Request
23.236.111.52.in-addr.arpa
-
71 B 135 B 1 1
DNS Request
13.179.17.96.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
79.121.231.20.in-addr.arpa