Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
19/06/2024, 10:32
Static task
static1
Behavioral task
behavioral1
Sample
ee23f6f39488b2b43b8d42321616ef135d4580056013bcc95433434d8cb841d0.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
ee23f6f39488b2b43b8d42321616ef135d4580056013bcc95433434d8cb841d0.exe
Resource
win10v2004-20240611-en
General
-
Target
ee23f6f39488b2b43b8d42321616ef135d4580056013bcc95433434d8cb841d0.exe
-
Size
2.4MB
-
MD5
1bec93e30a48d1f80a270a2bc0e1016b
-
SHA1
123401d10983005c57acf0196b1046897d1abd75
-
SHA256
ee23f6f39488b2b43b8d42321616ef135d4580056013bcc95433434d8cb841d0
-
SHA512
8d25fd42dc7f8b8bb64ddedfb88562c25a53a6b4e5501d41d0597a2971644f3088c225cdebc104ed40408757a83202c354a97962e1331601d23b4870162d690b
-
SSDEEP
49152:bcv0srSX2TOm8/Ummh7nST0q5VWy7EeNL:bcvRBMUmmh7nyPtQAL
Malware Config
Signatures
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ee23f6f39488b2b43b8d42321616ef135d4580056013bcc95433434d8cb841d0.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ee23f6f39488b2b43b8d42321616ef135d4580056013bcc95433434d8cb841d0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate ee23f6f39488b2b43b8d42321616ef135d4580056013bcc95433434d8cb841d0.exe -
Modifies registry class 21 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{866805CC-CB68-22E4-9CB6-4CEB715E663C} ee23f6f39488b2b43b8d42321616ef135d4580056013bcc95433434d8cb841d0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{866805CC-CB68-22E4-9CB6-4CEB715E663C}\ = "Power Options" ee23f6f39488b2b43b8d42321616ef135d4580056013bcc95433434d8cb841d0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{866805CC-CB68-22E4-9CB6-4CEB715E663C}\InfoTip = "@%SystemRoot%\\System32\\powercpl.dll,-2" ee23f6f39488b2b43b8d42321616ef135d4580056013bcc95433434d8cb841d0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{866805CC-CB68-22E4-9CB6-4CEB715E663C}\System.ControlPanel.EnableInSafeMode = "3" ee23f6f39488b2b43b8d42321616ef135d4580056013bcc95433434d8cb841d0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{866805CC-CB68-22E4-9CB6-4CEB715E663C}\System.Software.TasksFileUrl = "Internal" ee23f6f39488b2b43b8d42321616ef135d4580056013bcc95433434d8cb841d0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{866805CC-CB68-22E4-9CB6-4CEB715E663C}\Instance\InitPropertyBag\ResourceID = "100" ee23f6f39488b2b43b8d42321616ef135d4580056013bcc95433434d8cb841d0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{866805CC-CB68-22E4-9CB6-4CEB715E663C}\ShellFolder ee23f6f39488b2b43b8d42321616ef135d4580056013bcc95433434d8cb841d0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{866805CC-CB68-22E4-9CB6-4CEB715E663C}\LocalizedString = "@%SystemRoot%\\System32\\powercpl.dll,-1" ee23f6f39488b2b43b8d42321616ef135d4580056013bcc95433434d8cb841d0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{866805CC-CB68-22E4-9CB6-4CEB715E663C}\DefaultIcon ee23f6f39488b2b43b8d42321616ef135d4580056013bcc95433434d8cb841d0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{866805CC-CB68-22E4-9CB6-4CEB715E663C}\InProcServer32 ee23f6f39488b2b43b8d42321616ef135d4580056013bcc95433434d8cb841d0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{866805CC-CB68-22E4-9CB6-4CEB715E663C}\InProcServer32\ = "%SystemRoot%\\SysWow64\\shdocvw.dll" ee23f6f39488b2b43b8d42321616ef135d4580056013bcc95433434d8cb841d0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{866805CC-CB68-22E4-9CB6-4CEB715E663C}\InProcServer32\ThreadingModel = "Apartment" ee23f6f39488b2b43b8d42321616ef135d4580056013bcc95433434d8cb841d0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{866805CC-CB68-22E4-9CB6-4CEB715E663C}\Instance ee23f6f39488b2b43b8d42321616ef135d4580056013bcc95433434d8cb841d0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{866805CC-CB68-22E4-9CB6-4CEB715E663C}\ShellFolder\Attributes = "2684354560" ee23f6f39488b2b43b8d42321616ef135d4580056013bcc95433434d8cb841d0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{866805CC-CB68-22E4-9CB6-4CEB715E663C}\ShellFolder\WantsParseDisplayName ee23f6f39488b2b43b8d42321616ef135d4580056013bcc95433434d8cb841d0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{866805CC-CB68-22E4-9CB6-4CEB715E663C}\System.ApplicationName = "Microsoft.PowerOptions" ee23f6f39488b2b43b8d42321616ef135d4580056013bcc95433434d8cb841d0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{866805CC-CB68-22E4-9CB6-4CEB715E663C}\DefaultIcon\ = "%SystemRoot%\\SysWow64\\powercpl.dll,-1" ee23f6f39488b2b43b8d42321616ef135d4580056013bcc95433434d8cb841d0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{866805CC-CB68-22E4-9CB6-4CEB715E663C}\Instance\CLSID = "{328B0346-7EAF-4BBE-A479-7CB88A095F5B}" ee23f6f39488b2b43b8d42321616ef135d4580056013bcc95433434d8cb841d0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{866805CC-CB68-22E4-9CB6-4CEB715E663C}\System.ControlPanel.Category = "2,5" ee23f6f39488b2b43b8d42321616ef135d4580056013bcc95433434d8cb841d0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{866805CC-CB68-22E4-9CB6-4CEB715E663C}\Instance\InitPropertyBag ee23f6f39488b2b43b8d42321616ef135d4580056013bcc95433434d8cb841d0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{866805CC-CB68-22E4-9CB6-4CEB715E663C}\Instance\InitPropertyBag\ResourceDLL = "%SystemRoot%\\SysWow64\\powercpl.dll" ee23f6f39488b2b43b8d42321616ef135d4580056013bcc95433434d8cb841d0.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 1820 ee23f6f39488b2b43b8d42321616ef135d4580056013bcc95433434d8cb841d0.exe Token: SeIncBasePriorityPrivilege 1820 ee23f6f39488b2b43b8d42321616ef135d4580056013bcc95433434d8cb841d0.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ee23f6f39488b2b43b8d42321616ef135d4580056013bcc95433434d8cb841d0.exe"C:\Users\Admin\AppData\Local\Temp\ee23f6f39488b2b43b8d42321616ef135d4580056013bcc95433434d8cb841d0.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1820