Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
25/06/2024, 01:40
Behavioral task
behavioral1
Sample
99dfe8a4454f28c944e3c749150aecdaa97e19bcc5a9cf644a509b7eb1d4e50f.exe
Resource
win7-20240508-en
6 signatures
150 seconds
General
-
Target
99dfe8a4454f28c944e3c749150aecdaa97e19bcc5a9cf644a509b7eb1d4e50f.exe
-
Size
4.0MB
-
MD5
919db35f2bf4dad6dd23e16b68dbb205
-
SHA1
97a493eb8ebcac4fa8f61c357365d443c72e40dc
-
SHA256
99dfe8a4454f28c944e3c749150aecdaa97e19bcc5a9cf644a509b7eb1d4e50f
-
SHA512
efa3e69c8c3e6b1af82ae4a6c89412fbcc4d21eaf61349c235810fef4790b5b6f7373c1ca0adb2ca7efcd2ea61635968f9d2237802422cf6046039aab27fa05e
-
SSDEEP
98304:z8Ho3wEF+ZSxV4CQrRZIfIM8R6nhYufLX6CL2VeUs:z8IqRSxi6dLqi
Malware Config
Extracted
Family
stealc
Botnet
default
C2
http://85.28.47.4
Attributes
-
url_path
/920475a59bac849d.php
Signatures
-
Detects executables packed with Themida 11 IoCs
resource yara_rule behavioral1/memory/2980-0-0x00000000002C0000-0x00000000008E5000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral1/memory/2980-3-0x00000000002C0000-0x00000000008E5000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral1/memory/2980-2-0x00000000002C0000-0x00000000008E5000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral1/memory/2980-5-0x00000000002C0000-0x00000000008E5000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral1/memory/2980-6-0x00000000002C0000-0x00000000008E5000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral1/memory/2980-4-0x00000000002C0000-0x00000000008E5000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral1/memory/2980-1-0x00000000002C0000-0x00000000008E5000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral1/memory/2980-8-0x00000000002C0000-0x00000000008E5000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral1/memory/2980-12-0x00000000002C0000-0x00000000008E5000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral1/memory/2980-16-0x00000000002C0000-0x00000000008E5000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral1/memory/2980-20-0x00000000002C0000-0x00000000008E5000-memory.dmp INDICATOR_EXE_Packed_Themida -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 99dfe8a4454f28c944e3c749150aecdaa97e19bcc5a9cf644a509b7eb1d4e50f.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 99dfe8a4454f28c944e3c749150aecdaa97e19bcc5a9cf644a509b7eb1d4e50f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 99dfe8a4454f28c944e3c749150aecdaa97e19bcc5a9cf644a509b7eb1d4e50f.exe -
resource yara_rule behavioral1/memory/2980-0-0x00000000002C0000-0x00000000008E5000-memory.dmp themida behavioral1/memory/2980-3-0x00000000002C0000-0x00000000008E5000-memory.dmp themida behavioral1/memory/2980-2-0x00000000002C0000-0x00000000008E5000-memory.dmp themida behavioral1/memory/2980-5-0x00000000002C0000-0x00000000008E5000-memory.dmp themida behavioral1/memory/2980-6-0x00000000002C0000-0x00000000008E5000-memory.dmp themida behavioral1/memory/2980-4-0x00000000002C0000-0x00000000008E5000-memory.dmp themida behavioral1/memory/2980-1-0x00000000002C0000-0x00000000008E5000-memory.dmp themida behavioral1/memory/2980-8-0x00000000002C0000-0x00000000008E5000-memory.dmp themida behavioral1/memory/2980-12-0x00000000002C0000-0x00000000008E5000-memory.dmp themida behavioral1/memory/2980-16-0x00000000002C0000-0x00000000008E5000-memory.dmp themida behavioral1/memory/2980-20-0x00000000002C0000-0x00000000008E5000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 99dfe8a4454f28c944e3c749150aecdaa97e19bcc5a9cf644a509b7eb1d4e50f.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\99dfe8a4454f28c944e3c749150aecdaa97e19bcc5a9cf644a509b7eb1d4e50f.exe"C:\Users\Admin\AppData\Local\Temp\99dfe8a4454f28c944e3c749150aecdaa97e19bcc5a9cf644a509b7eb1d4e50f.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
PID:2980