Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
03/02/2024, 07:37
Static task
static1
Behavioral task
behavioral1
Sample
8bc410247879293843b610d977821c62.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8bc410247879293843b610d977821c62.exe
Resource
win10v2004-20231215-en
General
-
Target
8bc410247879293843b610d977821c62.exe
-
Size
1.6MB
-
MD5
8bc410247879293843b610d977821c62
-
SHA1
1b9b6c5b64da9805dc8c8ce8c31fd919a6dd1198
-
SHA256
c20150dd9ae0dc825c4e904ebc4ada0ac790ff78cd4e4486599b8e514abfc992
-
SHA512
64eddc5edd7b7b98d626cf30b8d70ea86cb92b2f15d040431a2a24662b7e64be168f1373f52bb880cd8263e08ea290dc49c2b30d8e15edd47e78f932528882d3
-
SSDEEP
24576:VMipUtH/GJUANicIoR0qwDEM6SmlKmWeyUCRvuQZUGavLVSsCcu+JiCf:VHkHeJUAA2ZB8TeYlKkwiA
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 8bc410247879293843b610d977821c62.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8bc410247879293843b610d977821c62.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8bc410247879293843b610d977821c62.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\Control Panel\International\Geo\Nation 8bc410247879293843b610d977821c62.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\Software\Wine 8bc410247879293843b610d977821c62.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/1784-1-0x0000000000E70000-0x0000000001080000-memory.dmp autoit_exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 8bc410247879293843b610d977821c62.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1784 8bc410247879293843b610d977821c62.exe 1784 8bc410247879293843b610d977821c62.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1784 wrote to memory of 2740 1784 8bc410247879293843b610d977821c62.exe 86 PID 1784 wrote to memory of 2740 1784 8bc410247879293843b610d977821c62.exe 86 PID 1784 wrote to memory of 2740 1784 8bc410247879293843b610d977821c62.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\8bc410247879293843b610d977821c62.exe"C:\Users\Admin\AppData\Local\Temp\8bc410247879293843b610d977821c62.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:2740
-