Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 03:18
Static task
static1
Behavioral task
behavioral1
Sample
261ad28bb11516f6557316778cbbf8bd.exe
Resource
win7-20231215-en
General
-
Target
261ad28bb11516f6557316778cbbf8bd.exe
-
Size
1.4MB
-
MD5
261ad28bb11516f6557316778cbbf8bd
-
SHA1
6bf3b451ecb45d758706c1c67a4c9f256f1dee29
-
SHA256
4643fd8421eeea214ea49a05937858d1fda72b9b4141861ab1dd52e83949601b
-
SHA512
ddba725d9b3dbcbbf9849eeeabaa516542c0a69fe1bed51fc6708244f93e0c2ec69996780a8a77a9ed5a45aa4b693b52c1f40cade3539b2e0d38d64368897d81
-
SSDEEP
24576:8thUkbMvMKfXX8mG4M5zvl611+Cq9n9tW00iqbXT3PLleQ8i5fDB0AX/aOugguqe:8Qkb2MY3lMw1+CQ9Oi0XTfLlsiF5Cm
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 261ad28bb11516f6557316778cbbf8bd.exe -
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 261ad28bb11516f6557316778cbbf8bd.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Wine 261ad28bb11516f6557316778cbbf8bd.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 261ad28bb11516f6557316778cbbf8bd.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1380 set thread context of 2088 1380 261ad28bb11516f6557316778cbbf8bd.exe 28 -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2088 261ad28bb11516f6557316778cbbf8bd.exe Token: SeSecurityPrivilege 2088 261ad28bb11516f6557316778cbbf8bd.exe Token: SeTakeOwnershipPrivilege 2088 261ad28bb11516f6557316778cbbf8bd.exe Token: SeLoadDriverPrivilege 2088 261ad28bb11516f6557316778cbbf8bd.exe Token: SeSystemProfilePrivilege 2088 261ad28bb11516f6557316778cbbf8bd.exe Token: SeSystemtimePrivilege 2088 261ad28bb11516f6557316778cbbf8bd.exe Token: SeProfSingleProcessPrivilege 2088 261ad28bb11516f6557316778cbbf8bd.exe Token: SeIncBasePriorityPrivilege 2088 261ad28bb11516f6557316778cbbf8bd.exe Token: SeCreatePagefilePrivilege 2088 261ad28bb11516f6557316778cbbf8bd.exe Token: SeBackupPrivilege 2088 261ad28bb11516f6557316778cbbf8bd.exe Token: SeRestorePrivilege 2088 261ad28bb11516f6557316778cbbf8bd.exe Token: SeShutdownPrivilege 2088 261ad28bb11516f6557316778cbbf8bd.exe Token: SeDebugPrivilege 2088 261ad28bb11516f6557316778cbbf8bd.exe Token: SeSystemEnvironmentPrivilege 2088 261ad28bb11516f6557316778cbbf8bd.exe Token: SeChangeNotifyPrivilege 2088 261ad28bb11516f6557316778cbbf8bd.exe Token: SeRemoteShutdownPrivilege 2088 261ad28bb11516f6557316778cbbf8bd.exe Token: SeUndockPrivilege 2088 261ad28bb11516f6557316778cbbf8bd.exe Token: SeManageVolumePrivilege 2088 261ad28bb11516f6557316778cbbf8bd.exe Token: SeImpersonatePrivilege 2088 261ad28bb11516f6557316778cbbf8bd.exe Token: SeCreateGlobalPrivilege 2088 261ad28bb11516f6557316778cbbf8bd.exe Token: 33 2088 261ad28bb11516f6557316778cbbf8bd.exe Token: 34 2088 261ad28bb11516f6557316778cbbf8bd.exe Token: 35 2088 261ad28bb11516f6557316778cbbf8bd.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1380 261ad28bb11516f6557316778cbbf8bd.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1380 wrote to memory of 2088 1380 261ad28bb11516f6557316778cbbf8bd.exe 28 PID 1380 wrote to memory of 2088 1380 261ad28bb11516f6557316778cbbf8bd.exe 28 PID 1380 wrote to memory of 2088 1380 261ad28bb11516f6557316778cbbf8bd.exe 28 PID 1380 wrote to memory of 2088 1380 261ad28bb11516f6557316778cbbf8bd.exe 28 PID 1380 wrote to memory of 2088 1380 261ad28bb11516f6557316778cbbf8bd.exe 28 PID 1380 wrote to memory of 2088 1380 261ad28bb11516f6557316778cbbf8bd.exe 28 PID 1380 wrote to memory of 2088 1380 261ad28bb11516f6557316778cbbf8bd.exe 28 PID 1380 wrote to memory of 2088 1380 261ad28bb11516f6557316778cbbf8bd.exe 28 PID 1380 wrote to memory of 2088 1380 261ad28bb11516f6557316778cbbf8bd.exe 28 PID 1380 wrote to memory of 2088 1380 261ad28bb11516f6557316778cbbf8bd.exe 28 PID 1380 wrote to memory of 2088 1380 261ad28bb11516f6557316778cbbf8bd.exe 28 PID 1380 wrote to memory of 2088 1380 261ad28bb11516f6557316778cbbf8bd.exe 28 PID 1380 wrote to memory of 2088 1380 261ad28bb11516f6557316778cbbf8bd.exe 28 PID 1380 wrote to memory of 2088 1380 261ad28bb11516f6557316778cbbf8bd.exe 28 PID 1380 wrote to memory of 2088 1380 261ad28bb11516f6557316778cbbf8bd.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\261ad28bb11516f6557316778cbbf8bd.exe"C:\Users\Admin\AppData\Local\Temp\261ad28bb11516f6557316778cbbf8bd.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Users\Admin\AppData\Local\Temp\261ad28bb11516f6557316778cbbf8bd.exe"C:\Users\Admin\AppData\Local\Temp\261ad28bb11516f6557316778cbbf8bd.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2088
-