Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
12s -
max time network
13s -
platform
windows11-21h2_x64 -
resource
win11-20240412-en -
resource tags
arch:x64arch:x86image:win11-20240412-enlocale:en-usos:windows11-21h2-x64system -
submitted
16/04/2024, 21:36
General
-
Target
ROTMG.dll
-
Size
29.5MB
-
MD5
f20bf250ba777687a9b5eaf13d69bc04
-
SHA1
f72b2d9e0f2e90b3c5b7750cbed115329a1b4c61
-
SHA256
fc68234698eb7be477342c2b7903acc38726be045e1d85071f8a3180b67708ad
-
SHA512
ee8d50c0f123f5eef40973dc29ab8e4ec808656d6309fef0b0abd7be25b0ec58947938f67373a79fcdddbe263eaa6d0514b830675bf3e095bae9c2d553344079
-
SSDEEP
786432:JcLg+VeLX/7L+Rysyw/iDpxbaSBXDdaKulsB++P8s:JcLg+VEP7qRys1/iD6wRzulab
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rundll32.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe -
resource yara_rule behavioral1/memory/3184-0-0x0000000180000000-0x00000001844DA000-memory.dmp themida behavioral1/memory/3184-2-0x0000000180000000-0x00000001844DA000-memory.dmp themida behavioral1/memory/3184-3-0x0000000180000000-0x00000001844DA000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 3184 rundll32.exe