Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
03/02/2024, 05:49
Static task
static1
Behavioral task
behavioral1
Sample
8b8df6391b5a71ed0217ffc5367f0dec.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8b8df6391b5a71ed0217ffc5367f0dec.exe
Resource
win10v2004-20231222-en
General
-
Target
8b8df6391b5a71ed0217ffc5367f0dec.exe
-
Size
518KB
-
MD5
8b8df6391b5a71ed0217ffc5367f0dec
-
SHA1
842c948438c132ae162024198fd6e616c170c259
-
SHA256
16c51826c4a6070da0f0a6762723d82bdc66e2453d591c2cdb0ae59e1cd23213
-
SHA512
75124d436c96ee6b2be1889d46e7da7b4aad771608bc5b0260f8727af6665d7525561a3ff1298427c6bf2fcfc576ada53b732d4a33274322b815f5adb90d94ce
-
SSDEEP
12288:dYvksw0qRRIKmn4YCs7LvMXtto1fJda+9EiBZSi:dYvksmRQt7UtuJLH9EiBZSi
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 8b8df6391b5a71ed0217ffc5367f0dec.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation 8b8df6391b5a71ed0217ffc5367f0dec.exe -
Executes dropped EXE 1 IoCs
pid Process 2760 s4072.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini s4072.exe File opened for modification C:\Windows\assembly\Desktop.ini s4072.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\assembly s4072.exe File created C:\Windows\assembly\Desktop.ini s4072.exe File opened for modification C:\Windows\assembly\Desktop.ini s4072.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS 8b8df6391b5a71ed0217ffc5367f0dec.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer 8b8df6391b5a71ed0217ffc5367f0dec.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 4132 8b8df6391b5a71ed0217ffc5367f0dec.exe 4132 8b8df6391b5a71ed0217ffc5367f0dec.exe 2760 s4072.exe 2760 s4072.exe 2760 s4072.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2760 s4072.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2760 s4072.exe 2760 s4072.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4132 wrote to memory of 2760 4132 8b8df6391b5a71ed0217ffc5367f0dec.exe 87 PID 4132 wrote to memory of 2760 4132 8b8df6391b5a71ed0217ffc5367f0dec.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\8b8df6391b5a71ed0217ffc5367f0dec.exe"C:\Users\Admin\AppData\Local\Temp\8b8df6391b5a71ed0217ffc5367f0dec.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks computer location settings
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4132 -
C:\Users\Admin\AppData\Local\Temp\n4072\s4072.exe"C:\Users\Admin\AppData\Local\Temp\n4072\s4072.exe" 00bd1363c364c7accf5a993f5GV5FTCSKIYVcxi7XHSanDt7mNM8kAqOc9OtXJjGbL3XXpozjKBhwMomM6+0NleirbkyURCkOQXif4RWfdQgToVgVb3O/kKVF6VRM7J1dGlTsCvZkyxoi8scST6JpGJ5kq+s4PCmh75ROSwWnDSYwcti /v "C:\Users\Admin\AppData\Local\Temp\8b8df6391b5a71ed0217ffc5367f0dec.exe"2⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2760
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
230KB
MD5f6bf052647bbf9a0fc34da26907be904
SHA1007955815a3f142fa279a04fdc360e7fb9b5a324
SHA256bac01719e43d9019ec34d749dd76274c0e49843bd0c8789ac1df0a5850e4919d
SHA51288b0d37f4615dbe6e277d3d32b9a82e76f8c7982367057d4c0697f73736b91fe2668adf13ce14867e256eb84a03846ed1566dd4ddf2745754b5ebcad2de24f9e