Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    114s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/05/2024, 00:11

General

  • Target

    release/main/loader.exe

  • Size

    4.1MB

  • MD5

    9ecdc9ed1bea6c226f92d740d43400b9

  • SHA1

    b5b5066cd4284733d8c3f3d7de3ca6653091ae10

  • SHA256

    60c57f14c2e0e0df0bda16646b21dddceaee0159dafbbb8daba310d4e1b5be6c

  • SHA512

    30bc705a2438288e3647d5adfc6119d751823970972b9c6b39a60384a2b7ac261986026b8d1c0b0ca7ee3d7e95363c97b873fdc5fad4096c903cb4e15bf57e43

  • SSDEEP

    98304:vnUGAC+hqc8lqvdzw2nsNKYYURyc9JirsN4JzmUPj:PTn2qcUzp6UYeJRCxPj

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Themida packer 10 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 16 IoCs
  • Suspicious use of FindShellTrayWindow 27 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\release\main\loader.exe
    "C:\Users\Admin\AppData\Local\Temp\release\main\loader.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3608
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\release\main\loader.exe" MD5 | find /i /v "md5" | find /i /v "certutil"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4624
      • C:\Windows\system32\certutil.exe
        certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\release\main\loader.exe" MD5
        3⤵
          PID:4724
        • C:\Windows\system32\find.exe
          find /i /v "md5"
          3⤵
            PID:4024
          • C:\Windows\system32\find.exe
            find /i /v "certutil"
            3⤵
              PID:4964
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe"
          1⤵
          • Enumerates system info in registry
          • Modifies data under HKEY_USERS
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of WriteProcessMemory
          PID:4108
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffb065cab58,0x7ffb065cab68,0x7ffb065cab78
            2⤵
              PID:1048
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1728 --field-trial-handle=1924,i,17400322912770464118,14886870428101745686,131072 /prefetch:2
              2⤵
                PID:3336
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2000 --field-trial-handle=1924,i,17400322912770464118,14886870428101745686,131072 /prefetch:8
                2⤵
                  PID:2812
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2272 --field-trial-handle=1924,i,17400322912770464118,14886870428101745686,131072 /prefetch:8
                  2⤵
                    PID:4380
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3092 --field-trial-handle=1924,i,17400322912770464118,14886870428101745686,131072 /prefetch:1
                    2⤵
                      PID:4660
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3128 --field-trial-handle=1924,i,17400322912770464118,14886870428101745686,131072 /prefetch:1
                      2⤵
                        PID:4348
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4384 --field-trial-handle=1924,i,17400322912770464118,14886870428101745686,131072 /prefetch:1
                        2⤵
                          PID:1096
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4524 --field-trial-handle=1924,i,17400322912770464118,14886870428101745686,131072 /prefetch:8
                          2⤵
                            PID:3768
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4676 --field-trial-handle=1924,i,17400322912770464118,14886870428101745686,131072 /prefetch:8
                            2⤵
                              PID:3620
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4584 --field-trial-handle=1924,i,17400322912770464118,14886870428101745686,131072 /prefetch:8
                              2⤵
                                PID:5444
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4596 --field-trial-handle=1924,i,17400322912770464118,14886870428101745686,131072 /prefetch:8
                                2⤵
                                  PID:5524
                                • C:\Program Files\Google\Chrome\Application\110.0.5481.104\Installer\setup.exe
                                  "C:\Program Files\Google\Chrome\Application\110.0.5481.104\Installer\setup.exe" --reenable-autoupdates --system-level
                                  2⤵
                                    PID:5644
                                    • C:\Program Files\Google\Chrome\Application\110.0.5481.104\Installer\setup.exe
                                      "C:\Program Files\Google\Chrome\Application\110.0.5481.104\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x254,0x258,0x25c,0x230,0x260,0x7ff7f46dae48,0x7ff7f46dae58,0x7ff7f46dae68
                                      3⤵
                                        PID:5852
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5004 --field-trial-handle=1924,i,17400322912770464118,14886870428101745686,131072 /prefetch:8
                                      2⤵
                                        PID:5656
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=4908 --field-trial-handle=1924,i,17400322912770464118,14886870428101745686,131072 /prefetch:1
                                        2⤵
                                          PID:5444
                                      • C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe
                                        "C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"
                                        1⤵
                                          PID:4232

                                        Network

                                        MITRE ATT&CK Enterprise v15

                                        Replay Monitor

                                        Loading Replay Monitor...

                                        Downloads

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                          Filesize

                                          72B

                                          MD5

                                          3efad4977fcb1d51d2d81919c2888256

                                          SHA1

                                          4f7f28ea1ca3ba304b6ee106baf02e4dac51ed3b

                                          SHA256

                                          578ed8c36f8ea732a04d131d1b7fa794a8558e99892512f4963dc628352641eb

                                          SHA512

                                          06dd16a622cd608676273b76bffe3563ac0c9fa4909ea6cd97b55beec621d3a45caf4ef281820ebed59f7465879e672183dedd217b5307e4fbc6e4d7d9d605b2

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1

                                          Filesize

                                          264KB

                                          MD5

                                          f50f89a0a91564d0b8a211f8921aa7de

                                          SHA1

                                          112403a17dd69d5b9018b8cede023cb3b54eab7d

                                          SHA256

                                          b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                          SHA512

                                          bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                          Filesize

                                          1KB

                                          MD5

                                          ad4f671e8adfb41e23018bbe16952a15

                                          SHA1

                                          ba30581a320fe71988db8e3d175ab5fa1501c7d1

                                          SHA256

                                          ee899510f4eef3ab0c88799290a0bef42f915374d358bee362d326d8c21d992d

                                          SHA512

                                          ed796fc86ba3cd06fe264bb0dc71739ec3b48ea5a345e2b0762880f55d3a851063b462f78ab49e3af2e6c1093edc30eb59cc0c27d94ffa6fa4519b4b0cbec00a

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                          Filesize

                                          2B

                                          MD5

                                          d751713988987e9331980363e24189ce

                                          SHA1

                                          97d170e1550eee4afc0af065b78cda302a97674c

                                          SHA256

                                          4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                          SHA512

                                          b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                          Filesize

                                          352B

                                          MD5

                                          fc399db02d9148b2eeda5cbc9b76b9c7

                                          SHA1

                                          712b6ea284c2ac6e54d8496115735e8201619edc

                                          SHA256

                                          f5c8bcc84c2c7463b1e220c546fda73b7868116abb7907870fa5c1a806d42943

                                          SHA512

                                          d1b8c57f09e70a08eafca3802854d4eff07d84d1a83ca02767116d13a10fe6c87cae6dcb0bc5550286499699e266db7b338e7cfe6b1c7c8f946b92d9e65bc195

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                          Filesize

                                          7KB

                                          MD5

                                          7970a1b85fae66f955d56f595b5909b5

                                          SHA1

                                          028e64cc48014e03e19651c1f35c742373ebc320

                                          SHA256

                                          d611f572a2752c34b548f9a5af00e1e185d0aba3106bb2106adc6ab78c717c3e

                                          SHA512

                                          3f19a7bbbbba2a1cfd6e823e944eb701eaf976891d5ebbde7c56b08c3420d1f598ac02784dbc779a3e418cd6b82afc29420781aba03fc752334c2735cac22d7c

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                          Filesize

                                          16KB

                                          MD5

                                          51555232954028b13b1570988ed9f723

                                          SHA1

                                          4dcafd142aa3a037d2bf05e20d6a171d9c8e35eb

                                          SHA256

                                          c2fdd3a89a04e3416574bb8bad51b50daf761cc9c1ad1174b2361b3a00ba4107

                                          SHA512

                                          adf6e7ff957d9703e19745bb357497a9d779972f0fb59672b9ef12e5bbf4a2460c7e745c9c9b071cbe5599aae57ff3d042cd24af5cec4b488775cbcd4e8a89db

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\a0bca2cd-203f-40bc-abd9-37a6c769bf44.tmp

                                          Filesize

                                          259KB

                                          MD5

                                          3e7f71bcafdb24c1487c3f3e25c002b5

                                          SHA1

                                          058ad69226f4a34044c3289cee0e55b90804a060

                                          SHA256

                                          8f7f3164b26eef2b90ff1053ccd53198df96dbe619477a510d4870866e1cb71e

                                          SHA512

                                          3bc807b22861e740d0debdd770aca31e1a795fe63a24adc387556f512d73c21111799a53090d8a507039840fac2cbf5c5675695ccec18fd8b1cb2af05fee381c

                                        • memory/3608-9-0x00007FF67A130000-0x00007FF67ABCF000-memory.dmp

                                          Filesize

                                          10.6MB

                                        • memory/3608-0-0x00007FF67A130000-0x00007FF67ABCF000-memory.dmp

                                          Filesize

                                          10.6MB

                                        • memory/3608-8-0x00007FF67A130000-0x00007FF67ABCF000-memory.dmp

                                          Filesize

                                          10.6MB

                                        • memory/3608-28-0x00007FF67A130000-0x00007FF67ABCF000-memory.dmp

                                          Filesize

                                          10.6MB

                                        • memory/3608-5-0x00007FF67A130000-0x00007FF67ABCF000-memory.dmp

                                          Filesize

                                          10.6MB

                                        • memory/3608-7-0x00007FF67A130000-0x00007FF67ABCF000-memory.dmp

                                          Filesize

                                          10.6MB

                                        • memory/3608-6-0x00007FF67A130000-0x00007FF67ABCF000-memory.dmp

                                          Filesize

                                          10.6MB

                                        • memory/3608-4-0x00007FF67A130000-0x00007FF67ABCF000-memory.dmp

                                          Filesize

                                          10.6MB

                                        • memory/3608-3-0x00007FF67A130000-0x00007FF67ABCF000-memory.dmp

                                          Filesize

                                          10.6MB

                                        • memory/3608-2-0x00007FF67A130000-0x00007FF67ABCF000-memory.dmp

                                          Filesize

                                          10.6MB

                                        • memory/3608-1-0x00007FFB24FB0000-0x00007FFB24FB2000-memory.dmp

                                          Filesize

                                          8KB