Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
16s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
05/08/2024, 16:00
Static task
static1
Behavioral task
behavioral1
Sample
ab907c7f461d850c3e174a47acbde9e0N.exe
Resource
win7-20240705-en
General
-
Target
ab907c7f461d850c3e174a47acbde9e0N.exe
-
Size
490KB
-
MD5
ab907c7f461d850c3e174a47acbde9e0
-
SHA1
2eb799041805ec7e8de0d2347cbd95527ff55530
-
SHA256
3236c8f5d603fbfb3c6e448dd966dca641fb60ef68ae128f6b3640f04b67aea4
-
SHA512
7a5cd7f4d644b3962cf53d32670e145c69322c6e4fd3a48b7150cf26253dfbcabc0a4ab9b9ea7fec94141a4f8c9f8dab0303886164abdc2182136e35b7884e10
-
SSDEEP
6144:LxCL8ow3omoizDbeRIDVp0zm2kdtA5KMco7PoFjdz53WbX7A/mXuH20uPr/MHPEN:LxczaFz3bewMRT56KDsY1uJCyxG
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ab907c7f461d850c3e174a47acbde9e0N.exe -
Executes dropped EXE 1 IoCs
pid Process 1748 s3057.exe -
Loads dropped DLL 4 IoCs
pid Process 2380 ab907c7f461d850c3e174a47acbde9e0N.exe 2380 ab907c7f461d850c3e174a47acbde9e0N.exe 2380 ab907c7f461d850c3e174a47acbde9e0N.exe 2380 ab907c7f461d850c3e174a47acbde9e0N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ab907c7f461d850c3e174a47acbde9e0N.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS ab907c7f461d850c3e174a47acbde9e0N.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer ab907c7f461d850c3e174a47acbde9e0N.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2380 ab907c7f461d850c3e174a47acbde9e0N.exe 1748 s3057.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1748 s3057.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1748 s3057.exe 1748 s3057.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2380 wrote to memory of 1748 2380 ab907c7f461d850c3e174a47acbde9e0N.exe 30 PID 2380 wrote to memory of 1748 2380 ab907c7f461d850c3e174a47acbde9e0N.exe 30 PID 2380 wrote to memory of 1748 2380 ab907c7f461d850c3e174a47acbde9e0N.exe 30 PID 2380 wrote to memory of 1748 2380 ab907c7f461d850c3e174a47acbde9e0N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\ab907c7f461d850c3e174a47acbde9e0N.exe"C:\Users\Admin\AppData\Local\Temp\ab907c7f461d850c3e174a47acbde9e0N.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\n3057\s3057.exe"C:\Users\Admin\AppData\Local\Temp\n3057\s3057.exe" ins.exe /e 12740290 /u 5280fe20-efa8-4c56-acec-17bc0a000013 /v "C:\Users\Admin\AppData\Local\Temp\ab907c7f461d850c3e174a47acbde9e0N.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
284KB
MD556c3c0bea17637a46ab6d82507923e75
SHA1de31ef91d7568429b34a00b23c3b2be815417e2a
SHA256b5518025103fc369faed527131b8c09df89f58bad97674388b36291b96cbb13a
SHA512fb3c60e5bf4cf73ea6c101d3a811016a4d30bf467da9f412321d856de1d949bec9a11f3adaf1c7fb0238ddd429759a743de927a8181dd14eb2638ee52677d16c