Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
06/03/2024, 20:55 UTC
Behavioral task
behavioral1
Sample
7HMI9P6EOI.exe
Resource
win7-20240221-en
7 signatures
150 seconds
General
-
Target
7HMI9P6EOI.exe
-
Size
10.4MB
-
MD5
7d55d62466eb034c8a5842075735388b
-
SHA1
6e3804162b62fca63f00237b90ced033c7bb4751
-
SHA256
938b6c2a1d72280742fde40e28b0dda21f14de8aab56181e502ac5a9ba625710
-
SHA512
2b0d4c4c7962d0ccd78f3606c39dc8ad04764a7a99e1eb8729f412be9c21f42f21e780eb9f33bcb5c3653e9dd27e001f5f917a7853558d67c53fc516de90e531
-
SSDEEP
196608:kp4QZqMFGkcNYuwPZ/bpo6kxYKURFqIhmdL1qo:kTtGt0zcmKURFq2m
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 7HMI9P6EOI.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7HMI9P6EOI.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7HMI9P6EOI.exe -
resource yara_rule behavioral1/memory/1728-1-0x000000013FC80000-0x0000000141389000-memory.dmp themida behavioral1/memory/1728-2-0x000000013FC80000-0x0000000141389000-memory.dmp themida behavioral1/memory/1728-3-0x000000013FC80000-0x0000000141389000-memory.dmp themida behavioral1/memory/1728-4-0x000000013FC80000-0x0000000141389000-memory.dmp themida behavioral1/memory/1728-5-0x000000013FC80000-0x0000000141389000-memory.dmp themida behavioral1/memory/1728-6-0x000000013FC80000-0x0000000141389000-memory.dmp themida behavioral1/memory/1728-7-0x000000013FC80000-0x0000000141389000-memory.dmp themida behavioral1/memory/1728-8-0x000000013FC80000-0x0000000141389000-memory.dmp themida behavioral1/memory/1728-9-0x000000013FC80000-0x0000000141389000-memory.dmp themida behavioral1/memory/1728-10-0x000000013FC80000-0x0000000141389000-memory.dmp themida behavioral1/memory/1728-11-0x000000013FC80000-0x0000000141389000-memory.dmp themida behavioral1/memory/1728-16-0x000000013FC80000-0x0000000141389000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 7HMI9P6EOI.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1728 7HMI9P6EOI.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1728 7HMI9P6EOI.exe Token: SeDebugPrivilege 1728 7HMI9P6EOI.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1728 wrote to memory of 2688 1728 7HMI9P6EOI.exe 29 PID 1728 wrote to memory of 2688 1728 7HMI9P6EOI.exe 29 PID 1728 wrote to memory of 2688 1728 7HMI9P6EOI.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\7HMI9P6EOI.exe"C:\Users\Admin\AppData\Local\Temp\7HMI9P6EOI.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1728 -s 3722⤵PID:2688
-