Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    59s
  • max time network
    37s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/05/2024, 20:19

General

  • Target

    Neuer Ordner/Arxvestiy.exe

  • Size

    24.1MB

  • MD5

    422d34314b11f0c3fcc01384a1aa2cfa

  • SHA1

    879686ece371c0db4a1c7a4411fe9759785debdb

  • SHA256

    1032b5ba7302a7bd466427dac1c6c2339e4d8901370417bb265779be95462cd5

  • SHA512

    78cd4c64cde2567e0b8639c22cdf17bff795c9946c7de21360f77b2c5f17810a2fc3447103d05bbc7bbe97c6a8dc1253fdead14f65188d47fd8b15279eaefac5

  • SSDEEP

    786432:aGnDa8TnMExrvJ4FMW/wNPsgb1kI0vXOiqIz4k3OUqq/:aQcENvyYNEgbVq+hIzZqq/

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • PrivateLoader

    PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 6 IoCs
  • Checks BIOS information in registry 2 TTPs 14 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 6 IoCs
  • Themida packer 16 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks whether UAC is enabled 1 TTPs 6 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
  • Drops file in Windows directory 4 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 61 IoCs
  • Suspicious use of SendNotifyMessage 60 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Neuer Ordner\Arxvestiy.exe
    "C:\Users\Admin\AppData\Local\Temp\Neuer Ordner\Arxvestiy.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:544
    • \??\c:\users\admin\appdata\local\temp\neuer ordner\arxvestiy.exe 
      "c:\users\admin\appdata\local\temp\neuer ordner\arxvestiy.exe "
      2⤵
      • Checks BIOS information in registry
      • Executes dropped EXE
      PID:3684
    • C:\Windows\Resources\Themes\icsys.icn.exe
      C:\Windows\Resources\Themes\icsys.icn.exe
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2080
      • \??\c:\windows\resources\themes\explorer.exe
        c:\windows\resources\themes\explorer.exe
        3⤵
        • Modifies visiblity of hidden/system files in Explorer
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Adds Run key to start application
        • Checks whether UAC is enabled
        • Drops file in System32 directory
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Windows directory
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:5068
        • \??\c:\windows\resources\spoolsv.exe
          c:\windows\resources\spoolsv.exe SE
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Checks whether UAC is enabled
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Drops file in Windows directory
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1928
          • \??\c:\windows\resources\svchost.exe
            c:\windows\resources\svchost.exe
            5⤵
            • Modifies visiblity of hidden/system files in Explorer
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Adds Run key to start application
            • Checks whether UAC is enabled
            • Drops file in System32 directory
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:4860
            • \??\c:\windows\resources\spoolsv.exe
              c:\windows\resources\spoolsv.exe PR
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Checks whether UAC is enabled
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • Suspicious use of SetWindowsHookEx
              PID:1380
  • C:\Windows\system32\taskmgr.exe
    "C:\Windows\system32\taskmgr.exe" /4
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:4180

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Neuer Ordner\arxvestiy.exe 

    Filesize

    21.5MB

    MD5

    7ea1f5289c64e9ea796344c20d746114

    SHA1

    309cd5f97624c288d6b6eff3b9f2057daf4d015d

    SHA256

    d95ba607da2ed1bd1b378083eb66247e4d9a77f5c5636107c3b7de5f220e5448

    SHA512

    d334430dae108730ac1f802251ce326bffb6a5c81b2783b2cd8d2b217be15a9194154ca4e018c195a900250d68ea11f001f1206150bf816772be5b535f9d5481

  • C:\Windows\Resources\Themes\explorer.exe

    Filesize

    2.5MB

    MD5

    d3dfbcaf9a79f39dd6e5a3ad274f960f

    SHA1

    e6b71ba9acb21c1c89dc65b69dd103a38f05c382

    SHA256

    f627693ca00945febfdbf57bbddb06814a82d5942e5cd0dd36355bb742b36928

    SHA512

    ce28c6d35858302bd8475b94c57d1ca8d5718bbd64ed76d7697676a259d80b735ddff1275c9c822ced22b7796795d0a66b9d3cbe548be7dfb0d19b8d50052cfb

  • C:\Windows\Resources\Themes\icsys.icn.exe

    Filesize

    2.5MB

    MD5

    5c3f863d7e4076b549302c0196dd459d

    SHA1

    8d8d22eb49a981c963e04476851ffd2a3c242e6c

    SHA256

    457199770a6344c1713a60e303b0972f102b7e1ee79f82c8aecfe980e8102be4

    SHA512

    205f91db2861126813592dd49fbb423555c6009a82db161bccb862b0772c70398729eadfefcae8fe24720f963af24bd9139d9470abdb5084a6942c1d61f5574d

  • C:\Windows\Resources\spoolsv.exe

    Filesize

    2.5MB

    MD5

    fbd7193fcffdc15a15a7c7721d21df8c

    SHA1

    024200efd03af4c25f56e35b71fd5f201561b39d

    SHA256

    61040644c45894462d1df5e26e9e2604a9ec6439f8ad95b1171de843a0630866

    SHA512

    71ca3eeedd44fb463854902d628f0dd9a380706fd6173f8498d87ddfdd8f997774206bb03748f5aab42a7e77fa77439040e9cc32cbebece301a90457759b15f6

  • C:\Windows\Resources\svchost.exe

    Filesize

    2.5MB

    MD5

    db903af379bf4b62c5db8fc7e2479ff2

    SHA1

    cbdd000caf950d5d657f1168ea380a99ab945fcd

    SHA256

    0a416c3097b55fc93f798083ef2209dae7addd1497c488ba9682fa63133db035

    SHA512

    43f19f09057560f6514f3097927a7374a6602bcc044017cfcc4f06f7c429df3f6501f7d106e8c561dce50ae1f495a56bd766f827953a89c8fe9770bc7643005d

  • memory/544-60-0x0000000000400000-0x0000000000A0E000-memory.dmp

    Filesize

    6.1MB

  • memory/544-1-0x0000000077374000-0x0000000077376000-memory.dmp

    Filesize

    8KB

  • memory/544-0-0x0000000000400000-0x0000000000A0E000-memory.dmp

    Filesize

    6.1MB

  • memory/1380-49-0x0000000000400000-0x0000000000A0E000-memory.dmp

    Filesize

    6.1MB

  • memory/1380-54-0x0000000000400000-0x0000000000A0E000-memory.dmp

    Filesize

    6.1MB

  • memory/1928-33-0x0000000000400000-0x0000000000A0E000-memory.dmp

    Filesize

    6.1MB

  • memory/1928-56-0x0000000000400000-0x0000000000A0E000-memory.dmp

    Filesize

    6.1MB

  • memory/2080-14-0x0000000000400000-0x0000000000A0E000-memory.dmp

    Filesize

    6.1MB

  • memory/2080-58-0x0000000000400000-0x0000000000A0E000-memory.dmp

    Filesize

    6.1MB

  • memory/3684-12-0x00007FF677380000-0x00007FF679290000-memory.dmp

    Filesize

    31.1MB

  • memory/3684-44-0x00007FF677380000-0x00007FF679290000-memory.dmp

    Filesize

    31.1MB

  • memory/3684-21-0x00007FFFEFF70000-0x00007FFFEFF72000-memory.dmp

    Filesize

    8KB

  • memory/4180-63-0x000001E2F7470000-0x000001E2F7471000-memory.dmp

    Filesize

    4KB

  • memory/4180-71-0x000001E2F7470000-0x000001E2F7471000-memory.dmp

    Filesize

    4KB

  • memory/4180-68-0x000001E2F7470000-0x000001E2F7471000-memory.dmp

    Filesize

    4KB

  • memory/4180-64-0x000001E2F7470000-0x000001E2F7471000-memory.dmp

    Filesize

    4KB

  • memory/4180-70-0x000001E2F7470000-0x000001E2F7471000-memory.dmp

    Filesize

    4KB

  • memory/4180-62-0x000001E2F7470000-0x000001E2F7471000-memory.dmp

    Filesize

    4KB

  • memory/4180-69-0x000001E2F7470000-0x000001E2F7471000-memory.dmp

    Filesize

    4KB

  • memory/4180-74-0x000001E2F7470000-0x000001E2F7471000-memory.dmp

    Filesize

    4KB

  • memory/4180-73-0x000001E2F7470000-0x000001E2F7471000-memory.dmp

    Filesize

    4KB

  • memory/4180-72-0x000001E2F7470000-0x000001E2F7471000-memory.dmp

    Filesize

    4KB

  • memory/4860-43-0x0000000000400000-0x0000000000A0E000-memory.dmp

    Filesize

    6.1MB

  • memory/4860-75-0x0000000000400000-0x0000000000A0E000-memory.dmp

    Filesize

    6.1MB

  • memory/5068-24-0x0000000000400000-0x0000000000A0E000-memory.dmp

    Filesize

    6.1MB

  • memory/5068-61-0x0000000000400000-0x0000000000A0E000-memory.dmp

    Filesize

    6.1MB