Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/02/2024, 12:28

General

  • Target

    97273d65603839cf542745359470e8ba.exe

  • Size

    4.4MB

  • MD5

    97273d65603839cf542745359470e8ba

  • SHA1

    d96f1ec8be081e2226f4ca4384f5fcb9f4613f86

  • SHA256

    51a9f6c8be826bf9b121848ee255138e73032e3a89f49c3a4d0ae35576e8f645

  • SHA512

    1d2bc504969ebeaf9ff4c3dbc562d102976f11caf1f2abcceee23c3078178d241adea0e097c0521abf3872a486b8c0ad5aeeae273703a30f80387918093326b0

  • SSDEEP

    98304:JeIt5UwFAoIQ5unMssx3MwCGN/g9Z+KRvubPBdK9+:JeECwF9qMF8Y/g9AjbPrM+

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 1 IoCs
  • Identifies Wine through registry keys 2 TTPs 2 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 13 IoCs
  • Suspicious behavior: EnumeratesProcesses 30 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\97273d65603839cf542745359470e8ba.exe
    "C:\Users\Admin\AppData\Local\Temp\97273d65603839cf542745359470e8ba.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3032
    • C:\Users\Admin\AppData\Local\Temp\Ñà×Ó¿ìµÝ´òÓ¡.exe
      C:\Users\Admin\AppData\Local\Temp\Ñà×Ó¿ìµÝ´òÓ¡.exe
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Enumerates connected drives
      • Writes to the Master Boot Record (MBR)
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2004

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\yzkddy\set.ini

    Filesize

    35B

    MD5

    1a3bd1422f59c7cd2e3e2f9bc9daf040

    SHA1

    a8f491a2ed0dcf43d2c1cf23e3d6afb7976026ea

    SHA256

    c6647d77457f93c1ceec3e5f8023e4aa8805c5f90a561cb235a839b2d0af047b

    SHA512

    9d8997a5d1d5e24f841af3ce90089823a85beaf6137b22845154e3705703199a20092cfac1dc4099604a942de23552ffc257bf2d808f0c987973d469e3f64902

  • C:\Users\Admin\AppData\Local\Temp\yzkddy\set.ini

    Filesize

    50B

    MD5

    0b6872d33b09e6ddea731c68b4ceabb0

    SHA1

    6d2a1c2e8c9d9616a2281e74b749569d93419dc9

    SHA256

    0ab2dd3063d7e93358ea2c0356064c7c74a57f80dcbe88680183a170f61e1563

    SHA512

    284a6d0be5a7005149d71224b9843c37355e758a7c88b20a73cc54ec532d4b7fd5c829e970112f6cf7204c998ed58ddac6e18dc0ed51243faccc1711d1d37caf

  • C:\Users\Admin\AppData\Local\Temp\yzkddy\surl.ini

    Filesize

    15KB

    MD5

    7955e2593b426a4ca9b44d10a8d9378e

    SHA1

    4651a0d6e2d826074327bd189e3edbec600d9395

    SHA256

    1b3e4b567680e065dcc1fedb2a80503332263a0df8cd723aba460ee3246a9bb3

    SHA512

    470f2da2cb1e342d521f74cc77c55d21843b78a4b099a38c8bd7fc3a6cf6eaaaf0dd4b6a279262080bc02dbbcae381e06e601c70a1a61ea9e23c7e3612ddc75b

  • C:\Users\Admin\AppData\Local\Temp\Ñà×Ó¿ìµÝ´òÓ¡.exe

    Filesize

    4.4MB

    MD5

    97273d65603839cf542745359470e8ba

    SHA1

    d96f1ec8be081e2226f4ca4384f5fcb9f4613f86

    SHA256

    51a9f6c8be826bf9b121848ee255138e73032e3a89f49c3a4d0ae35576e8f645

    SHA512

    1d2bc504969ebeaf9ff4c3dbc562d102976f11caf1f2abcceee23c3078178d241adea0e097c0521abf3872a486b8c0ad5aeeae273703a30f80387918093326b0

  • C:\Windows\ozd

    Filesize

    29B

    MD5

    e5dd6eda8fb744cb786490b10fe19551

    SHA1

    011eb525d86573255c0b6853172f4999f99bfe8a

    SHA256

    2759ea8baa1346689681af8d8857e86a73cbca38513a884043b6f7110cbc553f

    SHA512

    50ea43330b9ba3c28d2948230d029bd2ea35b0185fc5ec2a84873a932fa25f80817e428ef289abf9f4423bbbd4d6fda933699f2694968079f7d84a163676e280

  • memory/2004-61-0x0000000005180000-0x0000000005181000-memory.dmp

    Filesize

    4KB

  • memory/2004-59-0x0000000005210000-0x0000000005211000-memory.dmp

    Filesize

    4KB

  • memory/2004-173-0x0000000000400000-0x0000000000E23000-memory.dmp

    Filesize

    10.1MB

  • memory/2004-172-0x0000000000400000-0x0000000000E23000-memory.dmp

    Filesize

    10.1MB

  • memory/2004-171-0x0000000000400000-0x0000000000E23000-memory.dmp

    Filesize

    10.1MB

  • memory/2004-170-0x0000000000400000-0x0000000000E23000-memory.dmp

    Filesize

    10.1MB

  • memory/2004-155-0x0000000000400000-0x0000000000E23000-memory.dmp

    Filesize

    10.1MB

  • memory/2004-154-0x0000000000400000-0x0000000000E23000-memory.dmp

    Filesize

    10.1MB

  • memory/2004-153-0x0000000000400000-0x0000000000E23000-memory.dmp

    Filesize

    10.1MB

  • memory/2004-47-0x0000000000400000-0x0000000000E23000-memory.dmp

    Filesize

    10.1MB

  • memory/2004-152-0x0000000000400000-0x0000000000E23000-memory.dmp

    Filesize

    10.1MB

  • memory/2004-150-0x0000000000400000-0x0000000000E23000-memory.dmp

    Filesize

    10.1MB

  • memory/2004-149-0x0000000000400000-0x0000000000E23000-memory.dmp

    Filesize

    10.1MB

  • memory/2004-148-0x0000000000400000-0x0000000000E23000-memory.dmp

    Filesize

    10.1MB

  • memory/2004-147-0x0000000000400000-0x0000000000E23000-memory.dmp

    Filesize

    10.1MB

  • memory/2004-146-0x0000000000400000-0x0000000000E23000-memory.dmp

    Filesize

    10.1MB

  • memory/2004-145-0x0000000000400000-0x0000000000E23000-memory.dmp

    Filesize

    10.1MB

  • memory/2004-139-0x0000000000400000-0x0000000000E23000-memory.dmp

    Filesize

    10.1MB

  • memory/2004-138-0x0000000000400000-0x0000000000E23000-memory.dmp

    Filesize

    10.1MB

  • memory/2004-60-0x0000000005310000-0x0000000005312000-memory.dmp

    Filesize

    8KB

  • memory/2004-57-0x00000000050B0000-0x00000000050B1000-memory.dmp

    Filesize

    4KB

  • memory/2004-53-0x00000000050C0000-0x00000000050C1000-memory.dmp

    Filesize

    4KB

  • memory/2004-58-0x00000000052A0000-0x00000000052A2000-memory.dmp

    Filesize

    8KB

  • memory/2004-56-0x0000000005240000-0x0000000005242000-memory.dmp

    Filesize

    8KB

  • memory/2004-55-0x00000000054A0000-0x00000000054A2000-memory.dmp

    Filesize

    8KB

  • memory/2004-34-0x0000000005150000-0x0000000005151000-memory.dmp

    Filesize

    4KB

  • memory/2004-35-0x00000000050A0000-0x00000000050A1000-memory.dmp

    Filesize

    4KB

  • memory/2004-36-0x00000000051D0000-0x00000000051D1000-memory.dmp

    Filesize

    4KB

  • memory/2004-37-0x00000000051A0000-0x00000000051A1000-memory.dmp

    Filesize

    4KB

  • memory/2004-38-0x00000000050D0000-0x00000000050D1000-memory.dmp

    Filesize

    4KB

  • memory/2004-39-0x0000000005100000-0x0000000005102000-memory.dmp

    Filesize

    8KB

  • memory/2004-40-0x0000000005120000-0x0000000005121000-memory.dmp

    Filesize

    4KB

  • memory/2004-41-0x0000000005200000-0x0000000005201000-memory.dmp

    Filesize

    4KB

  • memory/2004-44-0x0000000005190000-0x0000000005191000-memory.dmp

    Filesize

    4KB

  • memory/2004-42-0x00000000050E0000-0x00000000050E1000-memory.dmp

    Filesize

    4KB

  • memory/2004-45-0x00000000051F0000-0x00000000051F1000-memory.dmp

    Filesize

    4KB

  • memory/2004-46-0x00000000051E0000-0x00000000051E1000-memory.dmp

    Filesize

    4KB

  • memory/2004-43-0x0000000005110000-0x0000000005111000-memory.dmp

    Filesize

    4KB

  • memory/2004-54-0x0000000005220000-0x0000000005221000-memory.dmp

    Filesize

    4KB

  • memory/2004-50-0x0000000005130000-0x0000000005131000-memory.dmp

    Filesize

    4KB

  • memory/2004-49-0x0000000005230000-0x0000000005231000-memory.dmp

    Filesize

    4KB

  • memory/2004-52-0x0000000005250000-0x0000000005251000-memory.dmp

    Filesize

    4KB

  • memory/2004-51-0x00000000051B0000-0x00000000051B1000-memory.dmp

    Filesize

    4KB

  • memory/3032-6-0x00000000050D0000-0x00000000050D1000-memory.dmp

    Filesize

    4KB

  • memory/3032-4-0x00000000051D0000-0x00000000051D1000-memory.dmp

    Filesize

    4KB

  • memory/3032-14-0x00000000051E0000-0x00000000051E1000-memory.dmp

    Filesize

    4KB

  • memory/3032-33-0x0000000000400000-0x0000000000E23000-memory.dmp

    Filesize

    10.1MB

  • memory/3032-5-0x00000000051A0000-0x00000000051A1000-memory.dmp

    Filesize

    4KB

  • memory/3032-28-0x0000000000400000-0x0000000000E23000-memory.dmp

    Filesize

    10.1MB

  • memory/3032-27-0x0000000005310000-0x0000000005312000-memory.dmp

    Filesize

    8KB

  • memory/3032-26-0x0000000005150000-0x0000000005151000-memory.dmp

    Filesize

    4KB

  • memory/3032-25-0x0000000005210000-0x0000000005211000-memory.dmp

    Filesize

    4KB

  • memory/3032-0-0x0000000000400000-0x0000000000E23000-memory.dmp

    Filesize

    10.1MB

  • memory/3032-62-0x0000000000400000-0x0000000000E23000-memory.dmp

    Filesize

    10.1MB

  • memory/3032-3-0x00000000050A0000-0x00000000050A1000-memory.dmp

    Filesize

    4KB

  • memory/3032-2-0x0000000005140000-0x0000000005141000-memory.dmp

    Filesize

    4KB

  • memory/3032-24-0x00000000052A0000-0x00000000052A2000-memory.dmp

    Filesize

    8KB

  • memory/3032-22-0x00000000050B0000-0x00000000050B1000-memory.dmp

    Filesize

    4KB

  • memory/3032-21-0x0000000005240000-0x0000000005242000-memory.dmp

    Filesize

    8KB

  • memory/3032-20-0x0000000005220000-0x0000000005221000-memory.dmp

    Filesize

    4KB

  • memory/3032-19-0x00000000051B0000-0x00000000051B1000-memory.dmp

    Filesize

    4KB

  • memory/3032-18-0x00000000050C0000-0x00000000050C1000-memory.dmp

    Filesize

    4KB

  • memory/3032-17-0x0000000005250000-0x0000000005251000-memory.dmp

    Filesize

    4KB

  • memory/3032-16-0x0000000005230000-0x0000000005231000-memory.dmp

    Filesize

    4KB

  • memory/3032-15-0x0000000000400000-0x0000000000E23000-memory.dmp

    Filesize

    10.1MB

  • memory/3032-13-0x00000000051F0000-0x00000000051F1000-memory.dmp

    Filesize

    4KB

  • memory/3032-11-0x0000000005110000-0x0000000005111000-memory.dmp

    Filesize

    4KB

  • memory/3032-12-0x0000000005180000-0x0000000005181000-memory.dmp

    Filesize

    4KB

  • memory/3032-1-0x00000000770C4000-0x00000000770C6000-memory.dmp

    Filesize

    8KB

  • memory/3032-10-0x00000000050E0000-0x00000000050E1000-memory.dmp

    Filesize

    4KB

  • memory/3032-9-0x0000000005200000-0x0000000005201000-memory.dmp

    Filesize

    4KB

  • memory/3032-7-0x0000000005100000-0x0000000005102000-memory.dmp

    Filesize

    8KB

  • memory/3032-8-0x0000000005120000-0x0000000005121000-memory.dmp

    Filesize

    4KB