Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
15/05/2024, 10:01
Behavioral task
behavioral1
Sample
Predstavlenie № 6-51-2024 .docx.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
$TEMP/rupedoras.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
$TEMP/zapros.docx
Resource
win10-20240404-en
General
-
Target
$TEMP/rupedoras.exe
-
Size
11.2MB
-
MD5
d483c1a9718cf5d880b3cce5d6ff7423
-
SHA1
72be5e949dd6923a43e7eaab1811baea4bc4b644
-
SHA256
8df595a1528a09fdcfe237a7dd1009d1380a886875747d1b145925968463f7bd
-
SHA512
370e220b3bdb617a12479db075ee26741075306ce7a72237115b2d79c452baadf931ccf3b422e9d0ef1eb0138316c3233f3ecd27074f3e797dc20ee974eb6fe4
-
SSDEEP
196608:BtCbFLyXyLm+2WzU4qrVTcHHRBTue9iSoCVMbgb/x3/18af:mxL4S2kCVsHRsekTCVxhj
Malware Config
Signatures
-
DarkTrack payload 4 IoCs
resource yara_rule behavioral2/memory/660-32-0x0000000000400000-0x00000000004A8000-memory.dmp family_darktrack behavioral2/memory/660-35-0x0000000000400000-0x00000000004A8000-memory.dmp family_darktrack behavioral2/memory/660-34-0x0000000000400000-0x00000000004A8000-memory.dmp family_darktrack behavioral2/memory/660-36-0x0000000000400000-0x00000000004A8000-memory.dmp family_darktrack -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rupedoras.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rupedoras.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rupedoras.exe -
resource yara_rule behavioral2/memory/2268-11-0x0000000000400000-0x0000000001F60000-memory.dmp themida behavioral2/memory/2268-12-0x0000000000400000-0x0000000001F60000-memory.dmp themida behavioral2/memory/2268-39-0x0000000000400000-0x0000000001F60000-memory.dmp themida -
resource yara_rule behavioral2/memory/660-28-0x0000000000400000-0x00000000004A8000-memory.dmp upx behavioral2/memory/660-30-0x0000000000400000-0x00000000004A8000-memory.dmp upx behavioral2/memory/660-32-0x0000000000400000-0x00000000004A8000-memory.dmp upx behavioral2/memory/660-31-0x0000000000400000-0x00000000004A8000-memory.dmp upx behavioral2/memory/660-35-0x0000000000400000-0x00000000004A8000-memory.dmp upx behavioral2/memory/660-34-0x0000000000400000-0x00000000004A8000-memory.dmp upx behavioral2/memory/660-36-0x0000000000400000-0x00000000004A8000-memory.dmp upx -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rupedoras.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2268 rupedoras.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2268 set thread context of 660 2268 rupedoras.exe 73 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2268 rupedoras.exe 2268 rupedoras.exe 2268 rupedoras.exe 2268 rupedoras.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 660 AddInProcess32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2268 rupedoras.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2268 wrote to memory of 660 2268 rupedoras.exe 73 PID 2268 wrote to memory of 660 2268 rupedoras.exe 73 PID 2268 wrote to memory of 660 2268 rupedoras.exe 73 PID 2268 wrote to memory of 660 2268 rupedoras.exe 73 PID 2268 wrote to memory of 660 2268 rupedoras.exe 73 PID 2268 wrote to memory of 660 2268 rupedoras.exe 73 PID 2268 wrote to memory of 660 2268 rupedoras.exe 73
Processes
-
C:\Users\Admin\AppData\Local\Temp\$TEMP\rupedoras.exe"C:\Users\Admin\AppData\Local\Temp\$TEMP\rupedoras.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"2⤵
- Suspicious behavior: GetForegroundWindowSpam
PID:660
-