Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
300s -
max time network
308s -
platform
windows10-1703_x64 -
resource
win10-20240611-en -
resource tags
arch:x64arch:x86image:win10-20240611-enlocale:en-usos:windows10-1703-x64system -
submitted
29/07/2024, 05:00
Behavioral task
behavioral1
Sample
0203d873e829973442286495a39d5f214af944f8298784a2273e7181e3b281d2.exe
Resource
win7-20240705-en
General
-
Target
0203d873e829973442286495a39d5f214af944f8298784a2273e7181e3b281d2.exe
-
Size
4.6MB
-
MD5
9f94ba372ce87a8ec90f0a43b6b9f7b6
-
SHA1
19777ba5b1006b5906fdccecc079a4d239bed187
-
SHA256
0203d873e829973442286495a39d5f214af944f8298784a2273e7181e3b281d2
-
SHA512
b11cfad7da0254554524862fdc00baa85ebf7e774fc0eb5e94ca70838dda2339231daef65e7cbce56283ca30888e9dd2239a205da1f0b11672aeedd442b5ff44
-
SSDEEP
98304:MSyPy1mHB7Dt4i2bXcFTe24oFX/wJO4wHkUmRKlDfO15IZ0:MSCyUHVii2bXkT5Za5RKlDfO1qZ0
Malware Config
Extracted
risepro
147.45.47.169
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 0203d873e829973442286495a39d5f214af944f8298784a2273e7181e3b281d2.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0203d873e829973442286495a39d5f214af944f8298784a2273e7181e3b281d2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0203d873e829973442286495a39d5f214af944f8298784a2273e7181e3b281d2.exe -
resource yara_rule behavioral2/memory/4476-0-0x0000000001370000-0x0000000002163000-memory.dmp themida behavioral2/memory/4476-9-0x0000000001370000-0x0000000002163000-memory.dmp themida behavioral2/memory/4476-11-0x0000000001370000-0x0000000002163000-memory.dmp themida behavioral2/memory/4476-12-0x0000000001370000-0x0000000002163000-memory.dmp themida behavioral2/memory/4476-10-0x0000000001370000-0x0000000002163000-memory.dmp themida behavioral2/memory/4476-14-0x0000000001370000-0x0000000002163000-memory.dmp themida behavioral2/memory/4476-13-0x0000000001370000-0x0000000002163000-memory.dmp themida behavioral2/memory/4476-15-0x0000000001370000-0x0000000002163000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 0203d873e829973442286495a39d5f214af944f8298784a2273e7181e3b281d2.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4476 0203d873e829973442286495a39d5f214af944f8298784a2273e7181e3b281d2.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0203d873e829973442286495a39d5f214af944f8298784a2273e7181e3b281d2.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4476 0203d873e829973442286495a39d5f214af944f8298784a2273e7181e3b281d2.exe 4476 0203d873e829973442286495a39d5f214af944f8298784a2273e7181e3b281d2.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0203d873e829973442286495a39d5f214af944f8298784a2273e7181e3b281d2.exe"C:\Users\Admin\AppData\Local\Temp\0203d873e829973442286495a39d5f214af944f8298784a2273e7181e3b281d2.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4476