Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24/04/2024, 20:11
Behavioral task
behavioral1
Sample
0xVanguard.exe
Resource
win7-20240221-en
11 signatures
150 seconds
General
-
Target
0xVanguard.exe
-
Size
20.2MB
-
MD5
e510770367dc26a1ed1c67feb70ccdf9
-
SHA1
7f989819e9851110980925b25301ee7a267e9058
-
SHA256
8e6dc734b552472725c80ecd5ad2187bac5427cf9deea9f78e41ca80563f5810
-
SHA512
f3c518d949c68b6ebcf5e603ffbf51f4c5d281b3cf66a63dde2304cfd01d7a57d2aa0dc774f61e86e804fd95fbc5c9c22210eae1851da5ef09e216cb6e48743c
-
SSDEEP
393216:EqPu8bmS69TPKFK4UCQTHvN6uR4LwqnPTD3qEjRBJ8oy52EvNu1WuAEZY:FqTRP6JUtTH16uRj0jRT8oylNKWuW
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 0xVanguard.exe -
Stops running service(s) 3 TTPs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0xVanguard.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0xVanguard.exe -
resource yara_rule behavioral1/memory/2952-1-0x000000013F620000-0x00000001429C6000-memory.dmp themida behavioral1/memory/2952-2-0x000000013F620000-0x00000001429C6000-memory.dmp themida behavioral1/memory/2952-3-0x000000013F620000-0x00000001429C6000-memory.dmp themida behavioral1/memory/2952-4-0x000000013F620000-0x00000001429C6000-memory.dmp themida behavioral1/memory/2952-5-0x000000013F620000-0x00000001429C6000-memory.dmp themida behavioral1/memory/2952-6-0x000000013F620000-0x00000001429C6000-memory.dmp themida behavioral1/memory/2952-7-0x000000013F620000-0x00000001429C6000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 0xVanguard.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2952 0xVanguard.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2680 sc.exe -
Kills process with taskkill 5 IoCs
pid Process 2436 taskkill.exe 2412 taskkill.exe 2512 taskkill.exe 2596 taskkill.exe 2508 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 2952 0xVanguard.exe 2952 0xVanguard.exe 2952 0xVanguard.exe 2952 0xVanguard.exe 2952 0xVanguard.exe 2952 0xVanguard.exe 2952 0xVanguard.exe 2952 0xVanguard.exe 2952 0xVanguard.exe 2952 0xVanguard.exe 2952 0xVanguard.exe 2952 0xVanguard.exe 2952 0xVanguard.exe 2952 0xVanguard.exe 2952 0xVanguard.exe 2952 0xVanguard.exe 2952 0xVanguard.exe 2952 0xVanguard.exe 2952 0xVanguard.exe 2952 0xVanguard.exe 2952 0xVanguard.exe 2952 0xVanguard.exe 2952 0xVanguard.exe 2952 0xVanguard.exe 2952 0xVanguard.exe 2952 0xVanguard.exe 2952 0xVanguard.exe 2952 0xVanguard.exe 2952 0xVanguard.exe 2952 0xVanguard.exe 2952 0xVanguard.exe 2952 0xVanguard.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2596 taskkill.exe Token: SeDebugPrivilege 2508 taskkill.exe Token: SeDebugPrivilege 2436 taskkill.exe Token: SeDebugPrivilege 2412 taskkill.exe Token: SeDebugPrivilege 2512 taskkill.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 2952 wrote to memory of 2520 2952 0xVanguard.exe 29 PID 2952 wrote to memory of 2520 2952 0xVanguard.exe 29 PID 2952 wrote to memory of 2520 2952 0xVanguard.exe 29 PID 2952 wrote to memory of 2580 2952 0xVanguard.exe 30 PID 2952 wrote to memory of 2580 2952 0xVanguard.exe 30 PID 2952 wrote to memory of 2580 2952 0xVanguard.exe 30 PID 2520 wrote to memory of 2596 2520 cmd.exe 31 PID 2520 wrote to memory of 2596 2520 cmd.exe 31 PID 2520 wrote to memory of 2596 2520 cmd.exe 31 PID 2580 wrote to memory of 2676 2580 cmd.exe 32 PID 2580 wrote to memory of 2676 2580 cmd.exe 32 PID 2580 wrote to memory of 2676 2580 cmd.exe 32 PID 2580 wrote to memory of 2516 2580 cmd.exe 34 PID 2580 wrote to memory of 2516 2580 cmd.exe 34 PID 2580 wrote to memory of 2516 2580 cmd.exe 34 PID 2580 wrote to memory of 1196 2580 cmd.exe 35 PID 2580 wrote to memory of 1196 2580 cmd.exe 35 PID 2580 wrote to memory of 1196 2580 cmd.exe 35 PID 2952 wrote to memory of 2700 2952 0xVanguard.exe 36 PID 2952 wrote to memory of 2700 2952 0xVanguard.exe 36 PID 2952 wrote to memory of 2700 2952 0xVanguard.exe 36 PID 2700 wrote to memory of 2508 2700 cmd.exe 37 PID 2700 wrote to memory of 2508 2700 cmd.exe 37 PID 2700 wrote to memory of 2508 2700 cmd.exe 37 PID 2952 wrote to memory of 2420 2952 0xVanguard.exe 38 PID 2952 wrote to memory of 2420 2952 0xVanguard.exe 38 PID 2952 wrote to memory of 2420 2952 0xVanguard.exe 38 PID 2420 wrote to memory of 2680 2420 cmd.exe 39 PID 2420 wrote to memory of 2680 2420 cmd.exe 39 PID 2420 wrote to memory of 2680 2420 cmd.exe 39 PID 2952 wrote to memory of 2560 2952 0xVanguard.exe 40 PID 2952 wrote to memory of 2560 2952 0xVanguard.exe 40 PID 2952 wrote to memory of 2560 2952 0xVanguard.exe 40 PID 2560 wrote to memory of 2436 2560 cmd.exe 41 PID 2560 wrote to memory of 2436 2560 cmd.exe 41 PID 2560 wrote to memory of 2436 2560 cmd.exe 41 PID 2952 wrote to memory of 2388 2952 0xVanguard.exe 42 PID 2952 wrote to memory of 2388 2952 0xVanguard.exe 42 PID 2952 wrote to memory of 2388 2952 0xVanguard.exe 42 PID 2388 wrote to memory of 2412 2388 cmd.exe 43 PID 2388 wrote to memory of 2412 2388 cmd.exe 43 PID 2388 wrote to memory of 2412 2388 cmd.exe 43 PID 2952 wrote to memory of 2468 2952 0xVanguard.exe 44 PID 2952 wrote to memory of 2468 2952 0xVanguard.exe 44 PID 2952 wrote to memory of 2468 2952 0xVanguard.exe 44 PID 2468 wrote to memory of 2512 2468 cmd.exe 45 PID 2468 wrote to memory of 2512 2468 cmd.exe 45 PID 2468 wrote to memory of 2512 2468 cmd.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\0xVanguard.exe"C:\Users\Admin\AppData\Local\Temp\0xVanguard.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im HTTPDebuggerUI.exe >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\system32\taskkill.exetaskkill /f /im HTTPDebuggerUI.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2596
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\0xVanguard.exe" MD5 | find /i /v "md5" | find /i /v "certutil"2⤵
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\system32\certutil.execertutil -hashfile "C:\Users\Admin\AppData\Local\Temp\0xVanguard.exe" MD53⤵PID:2676
-
-
C:\Windows\system32\find.exefind /i /v "md5"3⤵PID:2516
-
-
C:\Windows\system32\find.exefind /i /v "certutil"3⤵PID:1196
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im HTTPDebuggerSvc.exe >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\system32\taskkill.exetaskkill /f /im HTTPDebuggerSvc.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2508
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Windows\system32\sc.exesc stop HTTPDebuggerPro3⤵
- Launches sc.exe
PID:2680
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2436
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2412
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2512
-
-