Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
54s -
max time network
58s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
03/01/2024, 14:58
Behavioral task
behavioral1
Sample
MatSploit.exe
Resource
win7-20231215-en
9 signatures
600 seconds
General
-
Target
MatSploit.exe
-
Size
5.5MB
-
MD5
9e0513f49b3bb36ea8e2021114c05cc4
-
SHA1
48f8a10ef94aaab148226deee2fd648814732317
-
SHA256
bab0af44c41ebaf4ba8ae3209d852247e9b443154e626dbdf003a076c1e88abc
-
SHA512
2d93d1579dd2324d854971bafe5c7ae0ed79df45b551c18d238e05f2b2d9fed70d696f9b145ac30db7abea7565a4196d2a6726ae00771341f1f898a785767123
-
SSDEEP
98304:O/G5xtyMrU1eOyjaG8uOJQToGRtVtmNh6/wfi2dxIkbyFQ0g/QjESYaBheEBrbiD:+wOK8uRTLvtmUwfxtWQ0gkbhcjSW
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ MatSploit.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion MatSploit.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion MatSploit.exe -
resource yara_rule behavioral1/memory/1264-23-0x00000000010C0000-0x0000000001E14000-memory.dmp themida behavioral1/memory/1264-24-0x00000000010C0000-0x0000000001E14000-memory.dmp themida behavioral1/memory/1264-45-0x00000000010C0000-0x0000000001E14000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA MatSploit.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1264 MatSploit.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2096 1264 WerFault.exe 27 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1264 MatSploit.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1264 wrote to memory of 2096 1264 MatSploit.exe 30 PID 1264 wrote to memory of 2096 1264 MatSploit.exe 30 PID 1264 wrote to memory of 2096 1264 MatSploit.exe 30 PID 1264 wrote to memory of 2096 1264 MatSploit.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\MatSploit.exe"C:\Users\Admin\AppData\Local\Temp\MatSploit.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1264 -s 13922⤵
- Program crash
PID:2096
-