Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    15/04/2024, 09:23 UTC

General

  • Target

    tmp.exe

  • Size

    3.1MB

  • MD5

    830e6ad0276a69d53ae9474b938467d2

  • SHA1

    9fccd1be2de986b7d2f18f31bd56ef7991a9ff4f

  • SHA256

    ebeb57452612627c9dc6c17a600b344449d763b343bf51f2be2b7f4a1dd5b2b1

  • SHA512

    1173e7e5a597a54e1e86a2ff5a88a5076c87743cca86ea7b432ca4781a222fae98d63fb1687c38184141e34c462b6e2b9fcc231b246e245e1191e91beeb58955

  • SSDEEP

    49152:GIvsqqWsLrhL9opNIr8KdSSuwQkBxAsJ34cLc5dAdNMsEahryAdaaO8Sk4DXovJt:3vsqeNaULAwQkLf31MpahryGX14Tst

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Themida packer 2 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\tmp.exe
    "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    PID:2360

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2360-0-0x000000013F620000-0x000000013FEC4000-memory.dmp

    Filesize

    8.6MB

  • memory/2360-1-0x00000000778A0000-0x0000000077A49000-memory.dmp

    Filesize

    1.7MB

  • memory/2360-2-0x000000013F620000-0x000000013FEC4000-memory.dmp

    Filesize

    8.6MB

  • memory/2360-3-0x00000000778A0000-0x0000000077A49000-memory.dmp

    Filesize

    1.7MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.