Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19/08/2024, 10:26
Static task
static1
Behavioral task
behavioral1
Sample
4964fbd0316122cd1ad6d2d60ae9c9e0N.exe
Resource
win7-20240708-en
General
-
Target
4964fbd0316122cd1ad6d2d60ae9c9e0N.exe
-
Size
500KB
-
MD5
4964fbd0316122cd1ad6d2d60ae9c9e0
-
SHA1
10e7d488ddef3b80bb9c30c769862e8671199d22
-
SHA256
7985ab3d836824881ff27765286ae0e6b050cd175c500776fd9cac280b92918d
-
SHA512
e75007b40af655f08339c493919ef64374d95cb963966bf27d852a568200b862de32a06290ff3b5477f852eba98b96e5a14426496de366c34cf346cd8e9e775b
-
SSDEEP
12288:CcuA7U+EljXJBh+tli2vklUHM13sfoBjW44:CcuA7U+85BCl/cSHMlsujR4
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4964fbd0316122cd1ad6d2d60ae9c9e0N.exe -
Executes dropped EXE 1 IoCs
pid Process 1264 s1074.exe -
Loads dropped DLL 4 IoCs
pid Process 2348 4964fbd0316122cd1ad6d2d60ae9c9e0N.exe 2348 4964fbd0316122cd1ad6d2d60ae9c9e0N.exe 2348 4964fbd0316122cd1ad6d2d60ae9c9e0N.exe 2348 4964fbd0316122cd1ad6d2d60ae9c9e0N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4964fbd0316122cd1ad6d2d60ae9c9e0N.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS 4964fbd0316122cd1ad6d2d60ae9c9e0N.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer 4964fbd0316122cd1ad6d2d60ae9c9e0N.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2348 4964fbd0316122cd1ad6d2d60ae9c9e0N.exe 1264 s1074.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1264 s1074.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1264 s1074.exe 1264 s1074.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2348 wrote to memory of 1264 2348 4964fbd0316122cd1ad6d2d60ae9c9e0N.exe 30 PID 2348 wrote to memory of 1264 2348 4964fbd0316122cd1ad6d2d60ae9c9e0N.exe 30 PID 2348 wrote to memory of 1264 2348 4964fbd0316122cd1ad6d2d60ae9c9e0N.exe 30 PID 2348 wrote to memory of 1264 2348 4964fbd0316122cd1ad6d2d60ae9c9e0N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\4964fbd0316122cd1ad6d2d60ae9c9e0N.exe"C:\Users\Admin\AppData\Local\Temp\4964fbd0316122cd1ad6d2d60ae9c9e0N.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Users\Admin\AppData\Local\Temp\n1074\s1074.exe"C:\Users\Admin\AppData\Local\Temp\n1074\s1074.exe" ins.exe /e12411830 /u52fe2c91-49dc-40b7-b209-1f140a000013 /v"C:\Users\Admin\AppData\Local\Temp\4964fbd0316122cd1ad6d2d60ae9c9e0N.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1264
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
275KB
MD5316287c0010874356127dd8b7bc17896
SHA10939ad854954393f052f5ba64b6c4b8e03a8866b
SHA25669d0557e8d695a1d44ed91b643b93a01a2fd74056dc21bf334965f5045e8f4c9
SHA5121d995b5e18bdf387a42d0029d20c1f2889fa70c5bc8895df674fc83e3b49bb2acd8031966b593cff2b72438bde929a50a7558adc1df5d8cae7097b8fedb39c1c