Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
24/04/2024, 20:11
Behavioral task
behavioral1
Sample
0xVanguard.exe
Resource
win7-20240221-en
11 signatures
150 seconds
General
-
Target
0xVanguard.exe
-
Size
20.2MB
-
MD5
e510770367dc26a1ed1c67feb70ccdf9
-
SHA1
7f989819e9851110980925b25301ee7a267e9058
-
SHA256
8e6dc734b552472725c80ecd5ad2187bac5427cf9deea9f78e41ca80563f5810
-
SHA512
f3c518d949c68b6ebcf5e603ffbf51f4c5d281b3cf66a63dde2304cfd01d7a57d2aa0dc774f61e86e804fd95fbc5c9c22210eae1851da5ef09e216cb6e48743c
-
SSDEEP
393216:EqPu8bmS69TPKFK4UCQTHvN6uR4LwqnPTD3qEjRBJ8oy52EvNu1WuAEZY:FqTRP6JUtTH16uRj0jRT8oylNKWuW
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 0xVanguard.exe -
Stops running service(s) 3 TTPs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0xVanguard.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0xVanguard.exe -
resource yara_rule behavioral2/memory/2004-1-0x00007FF6E4950000-0x00007FF6E7CF6000-memory.dmp themida behavioral2/memory/2004-2-0x00007FF6E4950000-0x00007FF6E7CF6000-memory.dmp themida behavioral2/memory/2004-3-0x00007FF6E4950000-0x00007FF6E7CF6000-memory.dmp themida behavioral2/memory/2004-4-0x00007FF6E4950000-0x00007FF6E7CF6000-memory.dmp themida behavioral2/memory/2004-5-0x00007FF6E4950000-0x00007FF6E7CF6000-memory.dmp themida behavioral2/memory/2004-6-0x00007FF6E4950000-0x00007FF6E7CF6000-memory.dmp themida behavioral2/memory/2004-7-0x00007FF6E4950000-0x00007FF6E7CF6000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 0xVanguard.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2004 0xVanguard.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 760 sc.exe -
Kills process with taskkill 5 IoCs
pid Process 3416 taskkill.exe 700 taskkill.exe 4508 taskkill.exe 3604 taskkill.exe 2632 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2004 0xVanguard.exe 2004 0xVanguard.exe 2004 0xVanguard.exe 2004 0xVanguard.exe 2004 0xVanguard.exe 2004 0xVanguard.exe 2004 0xVanguard.exe 2004 0xVanguard.exe 2004 0xVanguard.exe 2004 0xVanguard.exe 2004 0xVanguard.exe 2004 0xVanguard.exe 2004 0xVanguard.exe 2004 0xVanguard.exe 2004 0xVanguard.exe 2004 0xVanguard.exe 2004 0xVanguard.exe 2004 0xVanguard.exe 2004 0xVanguard.exe 2004 0xVanguard.exe 2004 0xVanguard.exe 2004 0xVanguard.exe 2004 0xVanguard.exe 2004 0xVanguard.exe 2004 0xVanguard.exe 2004 0xVanguard.exe 2004 0xVanguard.exe 2004 0xVanguard.exe 2004 0xVanguard.exe 2004 0xVanguard.exe 2004 0xVanguard.exe 2004 0xVanguard.exe 2004 0xVanguard.exe 2004 0xVanguard.exe 2004 0xVanguard.exe 2004 0xVanguard.exe 2004 0xVanguard.exe 2004 0xVanguard.exe 2004 0xVanguard.exe 2004 0xVanguard.exe 2004 0xVanguard.exe 2004 0xVanguard.exe 2004 0xVanguard.exe 2004 0xVanguard.exe 2004 0xVanguard.exe 2004 0xVanguard.exe 2004 0xVanguard.exe 2004 0xVanguard.exe 2004 0xVanguard.exe 2004 0xVanguard.exe 2004 0xVanguard.exe 2004 0xVanguard.exe 2004 0xVanguard.exe 2004 0xVanguard.exe 2004 0xVanguard.exe 2004 0xVanguard.exe 2004 0xVanguard.exe 2004 0xVanguard.exe 2004 0xVanguard.exe 2004 0xVanguard.exe 2004 0xVanguard.exe 2004 0xVanguard.exe 2004 0xVanguard.exe 2004 0xVanguard.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 3604 taskkill.exe Token: SeDebugPrivilege 2632 taskkill.exe Token: SeDebugPrivilege 3416 taskkill.exe Token: SeDebugPrivilege 700 taskkill.exe Token: SeDebugPrivilege 4508 taskkill.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 2004 wrote to memory of 8 2004 0xVanguard.exe 89 PID 2004 wrote to memory of 8 2004 0xVanguard.exe 89 PID 2004 wrote to memory of 5112 2004 0xVanguard.exe 90 PID 2004 wrote to memory of 5112 2004 0xVanguard.exe 90 PID 5112 wrote to memory of 3604 5112 cmd.exe 92 PID 5112 wrote to memory of 3604 5112 cmd.exe 92 PID 8 wrote to memory of 3600 8 cmd.exe 91 PID 8 wrote to memory of 3600 8 cmd.exe 91 PID 8 wrote to memory of 4696 8 cmd.exe 93 PID 8 wrote to memory of 4696 8 cmd.exe 93 PID 8 wrote to memory of 4496 8 cmd.exe 94 PID 8 wrote to memory of 4496 8 cmd.exe 94 PID 2004 wrote to memory of 3336 2004 0xVanguard.exe 96 PID 2004 wrote to memory of 3336 2004 0xVanguard.exe 96 PID 3336 wrote to memory of 2632 3336 cmd.exe 97 PID 3336 wrote to memory of 2632 3336 cmd.exe 97 PID 2004 wrote to memory of 1784 2004 0xVanguard.exe 98 PID 2004 wrote to memory of 1784 2004 0xVanguard.exe 98 PID 1784 wrote to memory of 760 1784 cmd.exe 99 PID 1784 wrote to memory of 760 1784 cmd.exe 99 PID 2004 wrote to memory of 2068 2004 0xVanguard.exe 100 PID 2004 wrote to memory of 2068 2004 0xVanguard.exe 100 PID 2068 wrote to memory of 3416 2068 cmd.exe 101 PID 2068 wrote to memory of 3416 2068 cmd.exe 101 PID 2004 wrote to memory of 3176 2004 0xVanguard.exe 102 PID 2004 wrote to memory of 3176 2004 0xVanguard.exe 102 PID 3176 wrote to memory of 700 3176 cmd.exe 103 PID 3176 wrote to memory of 700 3176 cmd.exe 103 PID 2004 wrote to memory of 3056 2004 0xVanguard.exe 104 PID 2004 wrote to memory of 3056 2004 0xVanguard.exe 104 PID 3056 wrote to memory of 4508 3056 cmd.exe 105 PID 3056 wrote to memory of 4508 3056 cmd.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\0xVanguard.exe"C:\Users\Admin\AppData\Local\Temp\0xVanguard.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\0xVanguard.exe" MD5 | find /i /v "md5" | find /i /v "certutil"2⤵
- Suspicious use of WriteProcessMemory
PID:8 -
C:\Windows\system32\certutil.execertutil -hashfile "C:\Users\Admin\AppData\Local\Temp\0xVanguard.exe" MD53⤵PID:3600
-
-
C:\Windows\system32\find.exefind /i /v "md5"3⤵PID:4696
-
-
C:\Windows\system32\find.exefind /i /v "certutil"3⤵PID:4496
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im HTTPDebuggerUI.exe >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Windows\system32\taskkill.exetaskkill /f /im HTTPDebuggerUI.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3604
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im HTTPDebuggerSvc.exe >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:3336 -
C:\Windows\system32\taskkill.exetaskkill /f /im HTTPDebuggerSvc.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2632
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Windows\system32\sc.exesc stop HTTPDebuggerPro3⤵
- Launches sc.exe
PID:760
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3416
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:3176 -
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:700
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4508
-
-