Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
14/06/2024, 09:34
Behavioral task
behavioral1
Sample
sample.exe
Resource
win7-20240611-en
General
-
Target
sample.exe
-
Size
8.2MB
-
MD5
e7d9ee8f6f2118fc5b90ed77ac1803e9
-
SHA1
1c3b0135d62b1305e7fc0f392249b76ae3bb6d4a
-
SHA256
f77ad888887105bd7bd8fddc646e11445d0378a8d2443cd6f50fc00f3834af41
-
SHA512
5ad37843243bc7360ca88d56fb829b7f5219561d41e9f5befda24002796003dca5e18b41233d4c5ea0c70415e466ed76ac0018a032de5d300d04a31dd1d03550
-
SSDEEP
196608:fG3NU4pkOiBvZxLRJR99dwBMqFJ+hIESNxEc3m:sNUv5/NL99dwBMqOsY0m
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ sample.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion sample.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion sample.exe -
Loads dropped DLL 1 IoCs
pid Process 2540 sample.exe -
resource yara_rule behavioral1/memory/2540-0-0x000000013FCA0000-0x0000000140F12000-memory.dmp themida behavioral1/memory/2540-5-0x000000013FCA0000-0x0000000140F12000-memory.dmp themida behavioral1/memory/2540-20-0x000000013FCA0000-0x0000000140F12000-memory.dmp themida behavioral1/memory/2540-19-0x000000013FCA0000-0x0000000140F12000-memory.dmp themida behavioral1/memory/2540-23-0x000000013FCA0000-0x0000000140F12000-memory.dmp themida behavioral1/memory/2540-22-0x000000013FCA0000-0x0000000140F12000-memory.dmp themida behavioral1/memory/2540-25-0x000000013FCA0000-0x0000000140F12000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA sample.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 37 IoCs
pid Process 2540 sample.exe 2540 sample.exe 2540 sample.exe 2540 sample.exe 2540 sample.exe 2540 sample.exe 2540 sample.exe 2540 sample.exe 2540 sample.exe 2540 sample.exe 2540 sample.exe 2540 sample.exe 2540 sample.exe 2540 sample.exe 2540 sample.exe 2540 sample.exe 2540 sample.exe 2540 sample.exe 2540 sample.exe 2540 sample.exe 2540 sample.exe 2540 sample.exe 2540 sample.exe 2540 sample.exe 2540 sample.exe 2540 sample.exe 2540 sample.exe 2540 sample.exe 2540 sample.exe 2540 sample.exe 2540 sample.exe 2540 sample.exe 2540 sample.exe 2540 sample.exe 2540 sample.exe 2540 sample.exe 2540 sample.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2540 sample.exe 2540 sample.exe 2540 sample.exe 2540 sample.exe 2540 sample.exe 2540 sample.exe 2540 sample.exe 2540 sample.exe 2540 sample.exe 2540 sample.exe 2540 sample.exe 2540 sample.exe 2540 sample.exe 2540 sample.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2540 wrote to memory of 808 2540 sample.exe 29 PID 2540 wrote to memory of 808 2540 sample.exe 29 PID 2540 wrote to memory of 808 2540 sample.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\sample.exe"C:\Users\Admin\AppData\Local\Temp\sample.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2540 -s 2682⤵PID:808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD52d7adffa791933d88f7e7b04558de0c2
SHA1a5fc7751c7bbfcb038b86838fffede41255304c4
SHA2569d1247485ba1865c4be7429580a5afb71e4ec8e656ee7a50bc565bf79def2880
SHA51246d308c5370e5b7ad14d42fe26d1c86fe62535ba77ea7d29cfd046fb96be8b3c296c88cea38d1e67722b4201340d307787f70599e89c44b56583ba626f93b29b