Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

06/03/2024, 20:58 UTC

240306-zsgvhshc86 7

06/03/2024, 20:55 UTC

240306-zqxg7ahc53 9

Analysis

  • max time kernel
    118s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    06/03/2024, 20:55 UTC

General

  • Target

    7HMI9P6EOI.exe

  • Size

    10.4MB

  • MD5

    7d55d62466eb034c8a5842075735388b

  • SHA1

    6e3804162b62fca63f00237b90ced033c7bb4751

  • SHA256

    938b6c2a1d72280742fde40e28b0dda21f14de8aab56181e502ac5a9ba625710

  • SHA512

    2b0d4c4c7962d0ccd78f3606c39dc8ad04764a7a99e1eb8729f412be9c21f42f21e780eb9f33bcb5c3653e9dd27e001f5f917a7853558d67c53fc516de90e531

  • SSDEEP

    196608:kp4QZqMFGkcNYuwPZ/bpo6kxYKURFqIhmdL1qo:kTtGt0zcmKURFq2m

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Themida packer 12 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7HMI9P6EOI.exe
    "C:\Users\Admin\AppData\Local\Temp\7HMI9P6EOI.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1728
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 1728 -s 372
      2⤵
        PID:2688

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1728-0-0x0000000076D00000-0x0000000076EA9000-memory.dmp

      Filesize

      1.7MB

    • memory/1728-1-0x000000013FC80000-0x0000000141389000-memory.dmp

      Filesize

      23.0MB

    • memory/1728-2-0x000000013FC80000-0x0000000141389000-memory.dmp

      Filesize

      23.0MB

    • memory/1728-3-0x000000013FC80000-0x0000000141389000-memory.dmp

      Filesize

      23.0MB

    • memory/1728-4-0x000000013FC80000-0x0000000141389000-memory.dmp

      Filesize

      23.0MB

    • memory/1728-5-0x000000013FC80000-0x0000000141389000-memory.dmp

      Filesize

      23.0MB

    • memory/1728-6-0x000000013FC80000-0x0000000141389000-memory.dmp

      Filesize

      23.0MB

    • memory/1728-7-0x000000013FC80000-0x0000000141389000-memory.dmp

      Filesize

      23.0MB

    • memory/1728-8-0x000000013FC80000-0x0000000141389000-memory.dmp

      Filesize

      23.0MB

    • memory/1728-9-0x000000013FC80000-0x0000000141389000-memory.dmp

      Filesize

      23.0MB

    • memory/1728-10-0x000000013FC80000-0x0000000141389000-memory.dmp

      Filesize

      23.0MB

    • memory/1728-11-0x000000013FC80000-0x0000000141389000-memory.dmp

      Filesize

      23.0MB

    • memory/1728-13-0x0000000076D00000-0x0000000076EA9000-memory.dmp

      Filesize

      1.7MB

    • memory/1728-16-0x000000013FC80000-0x0000000141389000-memory.dmp

      Filesize

      23.0MB

    • memory/1728-17-0x0000000076D00000-0x0000000076EA9000-memory.dmp

      Filesize

      1.7MB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.