Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1778s -
max time network
1794s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
31/05/2024, 09:22
Behavioral task
behavioral1
Sample
malware.exe
Resource
win10-20240404-en
13 signatures
1800 seconds
Behavioral task
behavioral2
Sample
malware.exe
Resource
win10v2004-20240426-en
13 signatures
1800 seconds
General
-
Target
malware.exe
-
Size
11.2MB
-
MD5
80e3aac80e5f5c553e4c4cf74381d99f
-
SHA1
fdac8472eddc8bf8b5c4526c5651ed85de97996e
-
SHA256
d45c674975c17303105e19648eea8de55e8cf084035b10793a4c628b70729144
-
SHA512
5b69e237a5e6de08c066d5e2e31b6832b3f1db333d24a82e600108d5fa645a5d0866aa8e856b13fefe4b6b382e5bcff698af437e6b5f8917f434f8f908a63d3f
-
SSDEEP
196608:BtCbFLyXyLm+2WzU4qrVTcHHRBTue9iSoCVMbgb/x3/18afB:mxL4S2kCVsHRsekTCVxhjB
Malware Config
Signatures
-
DarkTrack payload 4 IoCs
resource yara_rule behavioral1/memory/1544-38-0x0000000000400000-0x00000000004A8000-memory.dmp family_darktrack behavioral1/memory/1544-41-0x0000000000400000-0x00000000004A8000-memory.dmp family_darktrack behavioral1/memory/1544-42-0x0000000000400000-0x00000000004A8000-memory.dmp family_darktrack behavioral1/memory/1544-39-0x0000000000400000-0x00000000004A8000-memory.dmp family_darktrack -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ malware.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion malware.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion malware.exe -
resource yara_rule behavioral1/memory/5084-13-0x0000000000400000-0x0000000001F60000-memory.dmp themida behavioral1/memory/5084-14-0x0000000000400000-0x0000000001F60000-memory.dmp themida behavioral1/memory/5084-45-0x0000000000400000-0x0000000001F60000-memory.dmp themida -
resource yara_rule behavioral1/memory/1544-34-0x0000000000400000-0x00000000004A8000-memory.dmp upx behavioral1/memory/1544-35-0x0000000000400000-0x00000000004A8000-memory.dmp upx behavioral1/memory/1544-38-0x0000000000400000-0x00000000004A8000-memory.dmp upx behavioral1/memory/1544-37-0x0000000000400000-0x00000000004A8000-memory.dmp upx behavioral1/memory/1544-41-0x0000000000400000-0x00000000004A8000-memory.dmp upx behavioral1/memory/1544-42-0x0000000000400000-0x00000000004A8000-memory.dmp upx behavioral1/memory/1544-39-0x0000000000400000-0x00000000004A8000-memory.dmp upx -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA malware.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 5084 malware.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5084 set thread context of 1544 5084 malware.exe 72 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 5084 malware.exe 5084 malware.exe 5084 malware.exe 5084 malware.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1544 AddInProcess32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5084 malware.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 5084 wrote to memory of 1544 5084 malware.exe 72 PID 5084 wrote to memory of 1544 5084 malware.exe 72 PID 5084 wrote to memory of 1544 5084 malware.exe 72 PID 5084 wrote to memory of 1544 5084 malware.exe 72 PID 5084 wrote to memory of 1544 5084 malware.exe 72 PID 5084 wrote to memory of 1544 5084 malware.exe 72 PID 5084 wrote to memory of 1544 5084 malware.exe 72
Processes
-
C:\Users\Admin\AppData\Local\Temp\malware.exe"C:\Users\Admin\AppData\Local\Temp\malware.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"2⤵
- Suspicious behavior: GetForegroundWindowSpam
PID:1544
-