Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/08/2024, 01:20
Behavioral task
behavioral1
Sample
Microsoft.Office.2021x64.v2023.04/GameInstall.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
Microsoft.Office.2021x64.v2023.04/GameInstall.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Setup.exe
Resource
win7-20240704-en
General
-
Target
Setup.exe
-
Size
6.4MB
-
MD5
df24a20345970361d56a4ddd210f6ae2
-
SHA1
114968d8674056544ae5d44f47ebb8706315a325
-
SHA256
8668f86e66efeec34f40b36eb8c6b74c838dc262eb3a1e710248ca3b81466423
-
SHA512
e241d6ff40199076519cfcfc734477702e1ef3e635b2ed22b74589fe98995aa8e5381ba7dac89a6a6d248546f0b1f7d9e1f3cfe8e78427d803b8979d55094a46
-
SSDEEP
98304:BSqyTkDBTnveokskBpmeLwgIhw3kc0TGQANu051h5tRA8kY67kE7:Eq+kDJnLjkBp79Ihw3kczN751k8tJe
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Setup.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Setup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Setup.exe -
resource yara_rule behavioral4/memory/4768-0-0x00007FF69BC00000-0x00007FF69CBD5000-memory.dmp themida behavioral4/memory/4768-2-0x00007FF69BC00000-0x00007FF69CBD5000-memory.dmp themida behavioral4/memory/4768-4-0x00007FF69BC00000-0x00007FF69CBD5000-memory.dmp themida behavioral4/memory/4768-3-0x00007FF69BC00000-0x00007FF69CBD5000-memory.dmp themida behavioral4/memory/4768-5-0x00007FF69BC00000-0x00007FF69CBD5000-memory.dmp themida behavioral4/memory/4768-8-0x00007FF69BC00000-0x00007FF69CBD5000-memory.dmp themida behavioral4/memory/4768-6-0x00007FF69BC00000-0x00007FF69CBD5000-memory.dmp themida behavioral4/memory/4768-7-0x00007FF69BC00000-0x00007FF69CBD5000-memory.dmp themida behavioral4/memory/4768-9-0x00007FF69BC00000-0x00007FF69CBD5000-memory.dmp themida behavioral4/memory/4768-10-0x00007FF69BC00000-0x00007FF69CBD5000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Setup.exe -
AutoIT Executable 8 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral4/memory/4768-4-0x00007FF69BC00000-0x00007FF69CBD5000-memory.dmp autoit_exe behavioral4/memory/4768-3-0x00007FF69BC00000-0x00007FF69CBD5000-memory.dmp autoit_exe behavioral4/memory/4768-5-0x00007FF69BC00000-0x00007FF69CBD5000-memory.dmp autoit_exe behavioral4/memory/4768-8-0x00007FF69BC00000-0x00007FF69CBD5000-memory.dmp autoit_exe behavioral4/memory/4768-6-0x00007FF69BC00000-0x00007FF69CBD5000-memory.dmp autoit_exe behavioral4/memory/4768-7-0x00007FF69BC00000-0x00007FF69CBD5000-memory.dmp autoit_exe behavioral4/memory/4768-9-0x00007FF69BC00000-0x00007FF69CBD5000-memory.dmp autoit_exe behavioral4/memory/4768-10-0x00007FF69BC00000-0x00007FF69CBD5000-memory.dmp autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4768 Setup.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 4768 Setup.exe 4768 Setup.exe 4768 Setup.exe 4768 Setup.exe 4768 Setup.exe 4768 Setup.exe 4768 Setup.exe 4768 Setup.exe 4768 Setup.exe 4768 Setup.exe 4768 Setup.exe 4768 Setup.exe 4768 Setup.exe 4768 Setup.exe 4768 Setup.exe 4768 Setup.exe 4768 Setup.exe 4768 Setup.exe 4768 Setup.exe 4768 Setup.exe 4768 Setup.exe 4768 Setup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4768