Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
22/07/2024, 06:28
Static task
static1
Behavioral task
behavioral1
Sample
71d5e8282abbe5c45ed3cb40515bdb30N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
71d5e8282abbe5c45ed3cb40515bdb30N.exe
Resource
win10v2004-20240709-en
General
-
Target
71d5e8282abbe5c45ed3cb40515bdb30N.exe
-
Size
507KB
-
MD5
71d5e8282abbe5c45ed3cb40515bdb30
-
SHA1
3232b234010e12308ea6bb6a461a7f5caa7840a7
-
SHA256
576baad9eb890eb36128a2677d133e9864da403ba6f937c1dae6b75e9d8a5a7a
-
SHA512
f06fcf883c847c3fd08a3c75022b93985fdb17019f27722352e1686740ab4e688b05c7cf4c9661bf6f4da126fe5e2f803b4e6e1c14a89b9c67ffc9c0e6a0dbdd
-
SSDEEP
12288:my8RUAXZNHvLiW4LJf08YtlCvk1V10f24moBYWdD:mytAXDHvLiVM1lCcPuf249YOD
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 71d5e8282abbe5c45ed3cb40515bdb30N.exe -
Executes dropped EXE 1 IoCs
pid Process 2116 s4281.exe -
Loads dropped DLL 4 IoCs
pid Process 1628 71d5e8282abbe5c45ed3cb40515bdb30N.exe 1628 71d5e8282abbe5c45ed3cb40515bdb30N.exe 1628 71d5e8282abbe5c45ed3cb40515bdb30N.exe 1628 71d5e8282abbe5c45ed3cb40515bdb30N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS 71d5e8282abbe5c45ed3cb40515bdb30N.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer 71d5e8282abbe5c45ed3cb40515bdb30N.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1628 71d5e8282abbe5c45ed3cb40515bdb30N.exe 1628 71d5e8282abbe5c45ed3cb40515bdb30N.exe 2116 s4281.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2116 s4281.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2116 s4281.exe 2116 s4281.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1628 wrote to memory of 2116 1628 71d5e8282abbe5c45ed3cb40515bdb30N.exe 30 PID 1628 wrote to memory of 2116 1628 71d5e8282abbe5c45ed3cb40515bdb30N.exe 30 PID 1628 wrote to memory of 2116 1628 71d5e8282abbe5c45ed3cb40515bdb30N.exe 30 PID 1628 wrote to memory of 2116 1628 71d5e8282abbe5c45ed3cb40515bdb30N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\71d5e8282abbe5c45ed3cb40515bdb30N.exe"C:\Users\Admin\AppData\Local\Temp\71d5e8282abbe5c45ed3cb40515bdb30N.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Loads dropped DLL
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Users\Admin\AppData\Local\Temp\n4281\s4281.exe"C:\Users\Admin\AppData\Local\Temp\n4281\s4281.exe" ins.exe /e12388104 /u52fe2c91-49dc-40b7-b209-1f140a000013 /v"C:\Users\Admin\AppData\Local\Temp\71d5e8282abbe5c45ed3cb40515bdb30N.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2116
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
275KB
MD5316287c0010874356127dd8b7bc17896
SHA10939ad854954393f052f5ba64b6c4b8e03a8866b
SHA25669d0557e8d695a1d44ed91b643b93a01a2fd74056dc21bf334965f5045e8f4c9
SHA5121d995b5e18bdf387a42d0029d20c1f2889fa70c5bc8895df674fc83e3b49bb2acd8031966b593cff2b72438bde929a50a7558adc1df5d8cae7097b8fedb39c1c