Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
29/08/2024, 09:42
Static task
static1
Behavioral task
behavioral1
Sample
d2dd278a6859adac4c9faf2ef16eeff0N.exe
Resource
win7-20240708-en
General
-
Target
d2dd278a6859adac4c9faf2ef16eeff0N.exe
-
Size
500KB
-
MD5
d2dd278a6859adac4c9faf2ef16eeff0
-
SHA1
dd05e2dba2e36974a06e54183b2eaee9948b0f4a
-
SHA256
44ebd75f0ad30fe37032deca26aee390862df19bcfb0d423a3be3bcc5e3430e0
-
SHA512
6c74054f5d47bae8b8e76b0a2e6c9242cfd7432dd2e432c8a06117cc67357b89cef2e7f0ed517881764f485c1673a50bcb29c8981a5ad95470f0d108294c8fdf
-
SSDEEP
6144:1mPGPAfua3FHqE8IwXZ10zOvfIM5mlgPM/pFjdz5vUe3eQ60evOfgZuR7bPS3ypr:1m2un3FHqRIySqvFc9IeaOfauJz/XiR8
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d2dd278a6859adac4c9faf2ef16eeff0N.exe -
Executes dropped EXE 1 IoCs
pid Process 2352 s5800.exe -
Loads dropped DLL 4 IoCs
pid Process 388 d2dd278a6859adac4c9faf2ef16eeff0N.exe 388 d2dd278a6859adac4c9faf2ef16eeff0N.exe 388 d2dd278a6859adac4c9faf2ef16eeff0N.exe 388 d2dd278a6859adac4c9faf2ef16eeff0N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d2dd278a6859adac4c9faf2ef16eeff0N.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS d2dd278a6859adac4c9faf2ef16eeff0N.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer d2dd278a6859adac4c9faf2ef16eeff0N.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 388 d2dd278a6859adac4c9faf2ef16eeff0N.exe 388 d2dd278a6859adac4c9faf2ef16eeff0N.exe 2352 s5800.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2352 s5800.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2352 s5800.exe 2352 s5800.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 388 wrote to memory of 2352 388 d2dd278a6859adac4c9faf2ef16eeff0N.exe 31 PID 388 wrote to memory of 2352 388 d2dd278a6859adac4c9faf2ef16eeff0N.exe 31 PID 388 wrote to memory of 2352 388 d2dd278a6859adac4c9faf2ef16eeff0N.exe 31 PID 388 wrote to memory of 2352 388 d2dd278a6859adac4c9faf2ef16eeff0N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\d2dd278a6859adac4c9faf2ef16eeff0N.exe"C:\Users\Admin\AppData\Local\Temp\d2dd278a6859adac4c9faf2ef16eeff0N.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Users\Admin\AppData\Local\Temp\n5800\s5800.exe"C:\Users\Admin\AppData\Local\Temp\n5800\s5800.exe" ins.exe /e 11827793 /u 50d1d9d5-cf90-407c-820a-35e05bc06f2f /v "C:\Users\Admin\AppData\Local\Temp\d2dd278a6859adac4c9faf2ef16eeff0N.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2352
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
282KB
MD529c1470cbf58838dc6a3f9d624b4527f
SHA1e8d1d1306e44b47e36b03ade24deb56e98bb82d4
SHA256dd056f949a90c1de581ddb0b16c5d49309cfe99926cd397fc31cff7e4895141d
SHA5129e90bcd2f0ff30b035531c1fd885034f6e6763d4e566bf0a0ee5b8238fdfc62d581c6c3f4e97cf36f374e1b8597fe0b39544bb30c9b7d8802cef98cc4880bd57