Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1s -
max time network
15s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
01/02/2024, 11:59
General
-
Target
client.exe
-
Size
4.1MB
-
MD5
e186f33b25f3cfcb91836a407f5c39b4
-
SHA1
22bf66b4682a2100dafe1665410061899c2ad829
-
SHA256
fad52a7cf65a9c2af091815e20bca29bd798b55cf92ef1c35c75be110ac71fce
-
SHA512
6aefb19ecc26e66d1734a3b2916d45a6fb922b941db9f75696bb2263cd6f168549ad81df7300b03f19a453e1df155f3b024d8f38ad463d768017fccc4de68fdd
-
SSDEEP
98304:n1wxDTIoVs1wZbkd1q4iVJ1JaOprgqAN8Rkk+v:aIoVMUbkfq4ejpH9RWv
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ client.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion client.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion client.exe -
resource yara_rule behavioral1/memory/4304-0-0x00007FF61B820000-0x00007FF61C2D7000-memory.dmp themida behavioral1/memory/4304-2-0x00007FF61B820000-0x00007FF61C2D7000-memory.dmp themida behavioral1/memory/4304-3-0x00007FF61B820000-0x00007FF61C2D7000-memory.dmp themida behavioral1/memory/4304-4-0x00007FF61B820000-0x00007FF61C2D7000-memory.dmp themida behavioral1/memory/4304-5-0x00007FF61B820000-0x00007FF61C2D7000-memory.dmp themida behavioral1/memory/4304-6-0x00007FF61B820000-0x00007FF61C2D7000-memory.dmp themida behavioral1/memory/4304-7-0x00007FF61B820000-0x00007FF61C2D7000-memory.dmp themida behavioral1/memory/4304-8-0x00007FF61B820000-0x00007FF61C2D7000-memory.dmp themida behavioral1/memory/4304-14-0x00007FF61B820000-0x00007FF61C2D7000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA client.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4304 client.exe