Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
27/03/2024, 00:49
Static task
static1
Behavioral task
behavioral1
Sample
e05f7b8e28e8f66bcf8c2285fb5a7418.exe
Resource
win7-20240221-en
General
-
Target
e05f7b8e28e8f66bcf8c2285fb5a7418.exe
-
Size
4.2MB
-
MD5
e05f7b8e28e8f66bcf8c2285fb5a7418
-
SHA1
7ecf8fb1f0b66cb822ffdb95c5af26a22a8f21ca
-
SHA256
dca15b06df096c0c64040541b93cb082d36da00301e593df1e84c9c4c3755e4e
-
SHA512
93f420af76dcac8cfb2478bf00c2540486f5fb7bd4cb10920be3bcab6f1656fbe9c433a0936492ba0e9dfe97b54a4b9ba58fcf1b2d8d3e6a7743902c15489804
-
SSDEEP
24576:g8FD4Ib+69Q8VHHA3sE2CognHHdndjsmB/MOs9jqHL2+i+KFYQyNW8HFSGYcXHX0:vzvK8V56H9dt/imVlXc5
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate vbc.exe -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1740 set thread context of 2244 1740 e05f7b8e28e8f66bcf8c2285fb5a7418.exe 92 -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString vbc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier vbc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier vbc.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 vbc.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier vbc.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2244 vbc.exe Token: SeSecurityPrivilege 2244 vbc.exe Token: SeTakeOwnershipPrivilege 2244 vbc.exe Token: SeLoadDriverPrivilege 2244 vbc.exe Token: SeSystemProfilePrivilege 2244 vbc.exe Token: SeSystemtimePrivilege 2244 vbc.exe Token: SeProfSingleProcessPrivilege 2244 vbc.exe Token: SeIncBasePriorityPrivilege 2244 vbc.exe Token: SeCreatePagefilePrivilege 2244 vbc.exe Token: SeBackupPrivilege 2244 vbc.exe Token: SeRestorePrivilege 2244 vbc.exe Token: SeShutdownPrivilege 2244 vbc.exe Token: SeDebugPrivilege 2244 vbc.exe Token: SeSystemEnvironmentPrivilege 2244 vbc.exe Token: SeChangeNotifyPrivilege 2244 vbc.exe Token: SeRemoteShutdownPrivilege 2244 vbc.exe Token: SeUndockPrivilege 2244 vbc.exe Token: SeManageVolumePrivilege 2244 vbc.exe Token: SeImpersonatePrivilege 2244 vbc.exe Token: SeCreateGlobalPrivilege 2244 vbc.exe Token: 33 2244 vbc.exe Token: 34 2244 vbc.exe Token: 35 2244 vbc.exe Token: 36 2244 vbc.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1740 wrote to memory of 3896 1740 e05f7b8e28e8f66bcf8c2285fb5a7418.exe 91 PID 1740 wrote to memory of 3896 1740 e05f7b8e28e8f66bcf8c2285fb5a7418.exe 91 PID 1740 wrote to memory of 3896 1740 e05f7b8e28e8f66bcf8c2285fb5a7418.exe 91 PID 1740 wrote to memory of 2244 1740 e05f7b8e28e8f66bcf8c2285fb5a7418.exe 92 PID 1740 wrote to memory of 2244 1740 e05f7b8e28e8f66bcf8c2285fb5a7418.exe 92 PID 1740 wrote to memory of 2244 1740 e05f7b8e28e8f66bcf8c2285fb5a7418.exe 92 PID 1740 wrote to memory of 2244 1740 e05f7b8e28e8f66bcf8c2285fb5a7418.exe 92 PID 1740 wrote to memory of 2244 1740 e05f7b8e28e8f66bcf8c2285fb5a7418.exe 92 PID 1740 wrote to memory of 2244 1740 e05f7b8e28e8f66bcf8c2285fb5a7418.exe 92 PID 1740 wrote to memory of 2244 1740 e05f7b8e28e8f66bcf8c2285fb5a7418.exe 92 PID 1740 wrote to memory of 2244 1740 e05f7b8e28e8f66bcf8c2285fb5a7418.exe 92 PID 1740 wrote to memory of 2244 1740 e05f7b8e28e8f66bcf8c2285fb5a7418.exe 92 PID 1740 wrote to memory of 2244 1740 e05f7b8e28e8f66bcf8c2285fb5a7418.exe 92 PID 1740 wrote to memory of 2244 1740 e05f7b8e28e8f66bcf8c2285fb5a7418.exe 92 PID 1740 wrote to memory of 2244 1740 e05f7b8e28e8f66bcf8c2285fb5a7418.exe 92 PID 1740 wrote to memory of 2244 1740 e05f7b8e28e8f66bcf8c2285fb5a7418.exe 92 PID 1740 wrote to memory of 2244 1740 e05f7b8e28e8f66bcf8c2285fb5a7418.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\e05f7b8e28e8f66bcf8c2285fb5a7418.exe"C:\Users\Admin\AppData\Local\Temp\e05f7b8e28e8f66bcf8c2285fb5a7418.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:3896
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Checks BIOS information in registry
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:2244
-