Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
55s -
max time network
52s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
29/04/2024, 09:15
Static task
static1
Behavioral task
behavioral1
Sample
GetFlashInfo_v9.2.0.627_/GetFlashInfo_v9.2.0.627_/GetFlashInfo.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
GetFlashInfo_v9.2.0.627_/GetFlashInfo_v9.2.0.627_/GetFlashInfo.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral3
Sample
GetFlashInfo_v9.2.0.627_/GetFlashInfo_v9.2.0.627_/gfienc.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
GetFlashInfo_v9.2.0.627_/GetFlashInfo_v9.2.0.627_/gfienc.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral5
Sample
GetFlashInfo_v9.2.0.627_/Readme-ZOL.htm
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
GetFlashInfo_v9.2.0.627_/Readme-ZOL.htm
Resource
win10v2004-20240426-en
General
-
Target
GetFlashInfo_v9.2.0.627_/GetFlashInfo_v9.2.0.627_/gfienc.dll
-
Size
5.9MB
-
MD5
6ae064d5d426433a72f6bf1530f0ce69
-
SHA1
6b6dbec445f77e3e667aedfc1ef7f99697c501b1
-
SHA256
349459ba5ed6ddcd33a1cc968ea536fee099c9d65fd65f8e6efab2afa54c03eb
-
SHA512
4bafe6983523ba0f0cca8f71ca7adaff7c17b9ba5bef9cac72c4fa41e98cdd69499c22646258ed83aa3b6e7889f50272f6dcde9ae6fda95a74206612c1baac27
-
SSDEEP
98304:yA9sW78WKuXu+G/YuyuMFqgVqVLWDTPc6lj1dv8MCy3Bs:nPqgNc69DvXCKBs
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rundll32.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rundll32.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Software\Wine rundll32.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 3832 rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 808 3832 WerFault.exe 85 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3832 rundll32.exe 3832 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2288 wrote to memory of 3832 2288 rundll32.exe 85 PID 2288 wrote to memory of 3832 2288 rundll32.exe 85 PID 2288 wrote to memory of 3832 2288 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\GetFlashInfo_v9.2.0.627_\GetFlashInfo_v9.2.0.627_\gfienc.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\GetFlashInfo_v9.2.0.627_\GetFlashInfo_v9.2.0.627_\gfienc.dll,#12⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3832 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3832 -s 8603⤵
- Program crash
PID:808
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3832 -ip 38321⤵PID:2408