Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
3Setup.exe
windows7-x64
10Setup.exe
windows10-2004-x64
10acdbase.dll
windows7-x64
1acdbase.dll
windows10-2004-x64
1api-ms-win...-0.dll
windows10-2004-x64
1api-ms-win...-0.dll
windows10-2004-x64
1api-ms-win...-0.dll
windows10-2004-x64
1api-ms-win...-0.dll
windows10-2004-x64
1api-ms-win...-0.dll
windows10-2004-x64
1api-ms-win...-0.dll
windows10-2004-x64
1api-ms-win...-0.dll
windows10-2004-x64
1api-ms-win...-0.dll
windows10-2004-x64
1libmmd.dll
windows7-x64
1libmmd.dll
windows10-2004-x64
1rinderpest.odp
windows7-x64
1rinderpest.odp
windows10-2004-x64
1updater.exe
windows7-x64
1updater.exe
windows10-2004-x64
1vcruntime140.dll
windows7-x64
1vcruntime140.dll
windows10-2004-x64
1x64/AzureK...ib.dll
windows7-x64
1x64/AzureK...ib.dll
windows10-2004-x64
1x64/BugReporter.exe
windows7-x64
1x64/BugReporter.exe
windows10-2004-x64
1x64/ComExtractor.exe
windows7-x64
1x64/ComExtractor.exe
windows10-2004-x64
1x64/Micros...st.dll
windows7-x64
1x64/Micros...st.dll
windows10-2004-x64
1x64/Micros...ml.dll
windows7-x64
1x64/Micros...ml.dll
windows10-2004-x64
1x64/WinUiB...er.dll
windows7-x64
1x64/WinUiB...er.dll
windows10-2004-x64
1Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
21/04/2024, 11:05
Static task
static1
Behavioral task
behavioral1
Sample
Setup.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
Setup.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral3
Sample
acdbase.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
acdbase.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral5
Sample
api-ms-win-crt-convert-l1-1-0.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral6
Sample
api-ms-win-crt-environment-l1-1-0.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral7
Sample
api-ms-win-crt-heap-l1-1-0.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral8
Sample
api-ms-win-crt-runtime-l1-1-0.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral9
Sample
api-ms-win-crt-stdio-l1-1-0.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral10
Sample
api-ms-win-crt-string-l1-1-0.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral11
Sample
api-ms-win-crt-time-l1-1-0.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral12
Sample
api-ms-win-crt-utility-l1-1-0.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral13
Sample
libmmd.dll
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
libmmd.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral15
Sample
rinderpest.odp
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
rinderpest.odp
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
updater.exe
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
updater.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral19
Sample
vcruntime140.dll
Resource
win7-20231129-en
Behavioral task
behavioral20
Sample
vcruntime140.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral21
Sample
x64/AzureKeyVaultDgssLib.dll
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
x64/AzureKeyVaultDgssLib.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral23
Sample
x64/BugReporter.exe
Resource
win7-20240220-en
Behavioral task
behavioral24
Sample
x64/BugReporter.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral25
Sample
x64/ComExtractor.exe
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
x64/ComExtractor.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral27
Sample
x64/Microsoft.Toolkit.Win32.UI.XamlHost.dll
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
x64/Microsoft.Toolkit.Win32.UI.XamlHost.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral29
Sample
x64/Microsoft.UI.Xaml.dll
Resource
win7-20240215-en
Behavioral task
behavioral30
Sample
x64/Microsoft.UI.Xaml.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral31
Sample
x64/WinUiBootstrapper.dll
Resource
win7-20240221-en
Behavioral task
behavioral32
Sample
x64/WinUiBootstrapper.dll
Resource
win10v2004-20240412-en
General
-
Target
Setup.exe
-
Size
8.5MB
-
MD5
98169506fec94c2b12ba9930ad704515
-
SHA1
bce662a9fb94551f648ba2d7e29659957fd6a428
-
SHA256
9b8a5b0a45adf843e24214b46c285e44e73bc6eaf9e2a3b2c14a6d93ae541363
-
SHA512
7f4f7ac2326a1a8b7afc72822dae328753578eb0a4ffcec5adb4e4fb0c49703070f71e7411df221ee9f44d6b43a0a94921fe530877c5d5e71640b807e96def30
-
SSDEEP
196608:vdoUox8PFOegKz+qE1cnuyHgv3eZaOxqeXY4K:vC0O9m7EWEvbOxqetK
Malware Config
Extracted
lumma
https://bettynoticecovej.shop/api
https://productivelookewr.shop/api
https://tolerateilusidjukl.shop/api
https://shatterbreathepsw.shop/api
https://shortsvelventysjo.shop/api
https://incredibleextedwj.shop/api
https://alcojoldwograpciw.shop/api
https://liabilitynighstjsko.shop/api
https://demonstationfukewko.shop/api
Signatures
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Setup.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate Setup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Setup.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4856 set thread context of 1944 4856 Setup.exe 89 -
Loads dropped DLL 1 IoCs
pid Process 1556 tracewpp.exe -
Registers COM server for autorun 1 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6EEAF7AB-9B86-0A4B-E9E8-6422E70DF8B3}\InprocServer32\ = "C:\\Windows\\System32\\FirewallAPI.dll" Setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6EEAF7AB-9B86-0A4B-E9E8-6422E70DF8B3}\InprocServer32\ThreadingModel = "Both" Setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6EEAF7AB-9B86-0A4B-E9E8-6422E70DF8B3}\InprocServer32 Setup.exe -
Modifies registry class 12 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6EEAF7AB-9B86-0A4B-E9E8-6422E70DF8B3}\ = "HNetCfg.FwOpenPort" Setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6EEAF7AB-9B86-0A4B-E9E8-6422E70DF8B3}\AppID = "{0CA545C6-37AD-4A6C-BF92-9F7610067EF5}" Setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6EEAF7AB-9B86-0A4B-E9E8-6422E70DF8B3}\LocalizedString = "@%systemroot%\\system32\\FirewallControlPanel.dll,-12122" Setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6EEAF7AB-9B86-0A4B-E9E8-6422E70DF8B3}\Elevation Setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6EEAF7AB-9B86-0A4B-E9E8-6422E70DF8B3}\InprocServer32\ThreadingModel = "Both" Setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6EEAF7AB-9B86-0A4B-E9E8-6422E70DF8B3}\ProgID\ = "HNetCfg.FwOpenPort" Setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6EEAF7AB-9B86-0A4B-E9E8-6422E70DF8B3} Setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6EEAF7AB-9B86-0A4B-E9E8-6422E70DF8B3}\Elevation\Enabled = "1" Setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6EEAF7AB-9B86-0A4B-E9E8-6422E70DF8B3}\Elevation\IconReference = "@C:\\Windows\\System32\\FirewallControlPanel.dll,-1" Setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6EEAF7AB-9B86-0A4B-E9E8-6422E70DF8B3}\InprocServer32 Setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6EEAF7AB-9B86-0A4B-E9E8-6422E70DF8B3}\InprocServer32\ = "C:\\Windows\\System32\\FirewallAPI.dll" Setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6EEAF7AB-9B86-0A4B-E9E8-6422E70DF8B3}\ProgID Setup.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4856 Setup.exe 4856 Setup.exe 1944 netsh.exe 1944 netsh.exe 1944 netsh.exe 1944 netsh.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 4856 Setup.exe 1944 netsh.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4856 wrote to memory of 1944 4856 Setup.exe 89 PID 4856 wrote to memory of 1944 4856 Setup.exe 89 PID 4856 wrote to memory of 1944 4856 Setup.exe 89 PID 4856 wrote to memory of 1944 4856 Setup.exe 89 PID 1944 wrote to memory of 1556 1944 netsh.exe 98 PID 1944 wrote to memory of 1556 1944 netsh.exe 98 PID 1944 wrote to memory of 1556 1944 netsh.exe 98 PID 1944 wrote to memory of 1556 1944 netsh.exe 98 PID 1944 wrote to memory of 1556 1944 netsh.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Suspicious use of SetThreadContext
- Registers COM server for autorun
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Windows\SysWOW64\netsh.exeC:\Windows\SysWOW64\netsh.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Users\Admin\AppData\Local\Temp\tracewpp.exeC:\Users\Admin\AppData\Local\Temp\tracewpp.exe3⤵
- Loads dropped DLL
PID:1556
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5f6e8c852c20da674bcf6ad316026298c
SHA10ad165a549928423d173fe7fbb295755fb5e645a
SHA2568e9030c532003305a0954d9ea4ace5dcf198f02f7d72db782e3c753c1cf1766c
SHA512f36d1abf46675f1c099c2329665add6571ef7b3d05439c90a1e2babb90918516f3eb0395651dc02617f76c0a849f1264b864a2c83a175b62b615c7491e215b5b
-
Filesize
207KB
MD50930890f83efad2a3091d1e3f0b82707
SHA1e0dcdefdde9dddd482e0b72504b35e96b795b27e
SHA256e8be7f038dd98179a1a27d5b176d23a60ad44426442699a3b9b714f9778c5cf2
SHA512608e2a169a9eb3c1b8e4459704e87123e5d04de57937175811a3f67559f0ead77b09e48562c1df732552a6aca7a8089528f43cda83bcdad1644a089b11a0e9f6