Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
9Static
static
3Themida_x3...64.exe
windows7-x64
9Themida_x3...64.exe
windows10-2004-x64
9Themida_x3...lp.chm
windows7-x64
1Themida_x3...lp.chm
windows10-2004-x64
1Themida_x3...in.dll
windows7-x64
1Themida_x3...in.dll
windows10-2004-x64
1Themida_x3...in.dll
windows7-x64
1Themida_x3...in.dll
windows10-2004-x64
1Themida_x3...in.dll
windows7-x64
3Themida_x3...in.dll
windows10-2004-x64
3Themida_x3...ct1.js
windows7-x64
3Themida_x3...ct1.js
windows10-2004-x64
3Themida_x3...e.html
windows7-x64
1Themida_x3...e.html
windows10-2004-x64
1Themida_x3...ct1.js
windows7-x64
3Themida_x3...ct1.js
windows10-2004-x64
3Themida_x3...on.pdf
windows7-x64
1Themida_x3...on.pdf
windows10-2004-x64
1Themida_x3...32.dll
windows7-x64
1Themida_x3...32.dll
windows10-2004-x64
1Themida_x3...64.dll
windows7-x64
1Themida_x3...64.dll
windows10-2004-x64
1Themida_x3...DK.dll
windows7-x64
3Themida_x3...DK.dll
windows10-2004-x64
3Themida_x3...ld.exe
windows7-x64
9Themida_x3...ld.exe
windows10-2004-x64
9Themida_x3...re.exe
windows7-x64
1Themida_x3...re.exe
windows10-2004-x64
1Themida_x3...er.dll
windows7-x64
1Themida_x3...er.dll
windows10-2004-x64
3Themida_x3...pv.dll
windows7-x64
1Themida_x3...pv.dll
windows10-2004-x64
1Analysis
-
max time kernel
52s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
16/06/2024, 16:23
Static task
static1
Behavioral task
behavioral1
Sample
Themida_x32_x64_v3.0.4.0_Repacked/Themida64.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
Themida_x32_x64_v3.0.4.0_Repacked/Themida64.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
Themida_x32_x64_v3.0.4.0_Repacked/ThemidaHelp.chm
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Themida_x32_x64_v3.0.4.0_Repacked/ThemidaHelp.chm
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
Themida_x32_x64_v3.0.4.0_Repacked/ThemidaSDK/ExamplesSDK/Plugins/Examples/C/Debug/TestPlugin.dll
Resource
win7-20240611-en
Behavioral task
behavioral6
Sample
Themida_x32_x64_v3.0.4.0_Repacked/ThemidaSDK/ExamplesSDK/Plugins/Examples/C/Debug/TestPlugin.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
Themida_x32_x64_v3.0.4.0_Repacked/ThemidaSDK/ExamplesSDK/Plugins/Examples/C/x64/Debug/TestPlugin.dll
Resource
win7-20240508-en
Behavioral task
behavioral8
Sample
Themida_x32_x64_v3.0.4.0_Repacked/ThemidaSDK/ExamplesSDK/Plugins/Examples/C/x64/Debug/TestPlugin.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral9
Sample
Themida_x32_x64_v3.0.4.0_Repacked/ThemidaSDK/ExamplesSDK/Plugins/Examples/Delphi/TestPlugin.dll
Resource
win7-20240611-en
Behavioral task
behavioral10
Sample
Themida_x32_x64_v3.0.4.0_Repacked/ThemidaSDK/ExamplesSDK/Plugins/Examples/Delphi/TestPlugin.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral11
Sample
Themida_x32_x64_v3.0.4.0_Repacked/ThemidaSDK/ExamplesSDK/Protectio Macros(Check Protection)/C/CBuilder/Project1.js
Resource
win7-20231129-en
Behavioral task
behavioral12
Sample
Themida_x32_x64_v3.0.4.0_Repacked/ThemidaSDK/ExamplesSDK/Protectio Macros(Check Protection)/C/CBuilder/Project1.js
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
Themida_x32_x64_v3.0.4.0_Repacked/ThemidaSDK/ExamplesSDK/Protectio Macros(Check Protection)/C/Visual C++/vc_example.html
Resource
win7-20240508-en
Behavioral task
behavioral14
Sample
Themida_x32_x64_v3.0.4.0_Repacked/ThemidaSDK/ExamplesSDK/Protectio Macros(Check Protection)/C/Visual C++/vc_example.html
Resource
win10v2004-20240611-en
Behavioral task
behavioral15
Sample
Themida_x32_x64_v3.0.4.0_Repacked/ThemidaSDK/ExamplesSDK/Protection Macros/C/CBuilder/Project1.js
Resource
win7-20240220-en
Behavioral task
behavioral16
Sample
Themida_x32_x64_v3.0.4.0_Repacked/ThemidaSDK/ExamplesSDK/Protection Macros/C/CBuilder/Project1.js
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
Themida_x32_x64_v3.0.4.0_Repacked/ThemidaSDK/Include/C/Via ASM module/How to add ASM files in your Solution.pdf
Resource
win7-20240611-en
Behavioral task
behavioral18
Sample
Themida_x32_x64_v3.0.4.0_Repacked/ThemidaSDK/Include/C/Via ASM module/How to add ASM files in your Solution.pdf
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
Themida_x32_x64_v3.0.4.0_Repacked/ThemidaSDK/SecureEngineSDK32.dll
Resource
win7-20240508-en
Behavioral task
behavioral20
Sample
Themida_x32_x64_v3.0.4.0_Repacked/ThemidaSDK/SecureEngineSDK32.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral21
Sample
Themida_x32_x64_v3.0.4.0_Repacked/ThemidaSDK/SecureEngineSDK64.dll
Resource
win7-20240508-en
Behavioral task
behavioral22
Sample
Themida_x32_x64_v3.0.4.0_Repacked/ThemidaSDK/SecureEngineSDK64.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral23
Sample
Themida_x32_x64_v3.0.4.0_Repacked/WinlicenseSDK.dll
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
Themida_x32_x64_v3.0.4.0_Repacked/WinlicenseSDK.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral25
Sample
Themida_x32_x64_v3.0.4.0_Repacked/build.exe
Resource
win7-20240611-en
Behavioral task
behavioral26
Sample
Themida_x32_x64_v3.0.4.0_Repacked/build.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral27
Sample
Themida_x32_x64_v3.0.4.0_Repacked/core.exe
Resource
win7-20240508-en
Behavioral task
behavioral28
Sample
Themida_x32_x64_v3.0.4.0_Repacked/core.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
Themida_x32_x64_v3.0.4.0_Repacked/demangler.dll
Resource
win7-20231129-en
Behavioral task
behavioral30
Sample
Themida_x32_x64_v3.0.4.0_Repacked/demangler.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral31
Sample
Themida_x32_x64_v3.0.4.0_Repacked/libspv.dll
Resource
win7-20240611-en
Behavioral task
behavioral32
Sample
Themida_x32_x64_v3.0.4.0_Repacked/libspv.dll
Resource
win10v2004-20240226-en
General
-
Target
Themida_x32_x64_v3.0.4.0_Repacked/build.exe
-
Size
26.5MB
-
MD5
1f98c492872020543e4c944bbc6c39d7
-
SHA1
9766f47c7f67fa04bb3439a877b705910e3e5ac5
-
SHA256
5e1b00d4486377d56afe7ff819dbec01d9aa2f2c27e9b9dc7ee48d22b58dc175
-
SHA512
e30b3d7bb95c14c57f00bbed6daa87d4c64167d980cd9f5e9e055ddfd98c0089521edb900acb67f05ec31ed6599fca8420c4697dbb3b6f58ac0750c783fa4253
-
SSDEEP
393216:uFFoqa6Fyb4NdjjzzYkFpWNkovt9QwPnoUuJLYtVFzvCtd8BIZrp/ta7zF0+y2Ch:u/9Nd3zckFAnVawPnMatVFzatdpR4Pbe
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ build.exe -
Checks BIOS information in registry 2 TTPs 3 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion build.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion build.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate build.exe -
Loads dropped DLL 1 IoCs
pid Process 1900 build.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA build.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 build.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1900 build.exe 1900 build.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000_CLASSES\CertificateAuthority.Request\CLSID build.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000_CLASSES\CertificateAuthority.Request build.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000_CLASSES\CertificateAuthority.Request\CLSID\Certificate Number (535603502) = 83246282e02b8c90 build.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1900 build.exe 1900 build.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1900 build.exe 1900 build.exe 1900 build.exe 1900 build.exe 1900 build.exe 1900 build.exe 1900 build.exe 1900 build.exe 1900 build.exe 1900 build.exe 1900 build.exe 1900 build.exe 1900 build.exe 1900 build.exe 1900 build.exe 1900 build.exe 1900 build.exe 1900 build.exe 1900 build.exe 1900 build.exe 1900 build.exe 1900 build.exe 1900 build.exe 1900 build.exe 1900 build.exe 1900 build.exe 1900 build.exe 1900 build.exe 1900 build.exe 1900 build.exe 1900 build.exe 1900 build.exe 1900 build.exe 1900 build.exe 1900 build.exe 1900 build.exe 1900 build.exe 1900 build.exe 1900 build.exe 1900 build.exe 1900 build.exe 1900 build.exe 1900 build.exe 1900 build.exe 1900 build.exe 1900 build.exe 1900 build.exe 1900 build.exe 1900 build.exe 1900 build.exe 1900 build.exe 1900 build.exe 1900 build.exe 1900 build.exe 1900 build.exe 1900 build.exe 1900 build.exe 1900 build.exe 1900 build.exe 1900 build.exe 1900 build.exe 1900 build.exe 1900 build.exe 1900 build.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1900 build.exe 1900 build.exe 1900 build.exe 1900 build.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Themida_x32_x64_v3.0.4.0_Repacked\build.exe"C:\Users\Admin\AppData\Local\Temp\Themida_x32_x64_v3.0.4.0_Repacked\build.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Loads dropped DLL
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:1900
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD5e1db733e43aa8d065fb7e8669db76524
SHA13f9c62ee28959959271632fdc7f5387d539a1d23
SHA2569e65d9e8ebb895f3b03c95ce64f044c70251fff444a4bcbee83f558b599a614d
SHA5123f6106f32932e72d197865f7b796eba072c8ab20c22b4d205f27de9b9fc6c139be8450ae25541fbdac37a06bc3ec2d1fab3f9b3216201a9231b70fcde6fb8eb3