Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
03/09/2024, 02:41
Static task
static1
Behavioral task
behavioral1
Sample
b87554d3b5377f3800ed096efe3b6e4d02c7ad9e3bdf1f71a66ed47ae479662e.exe
Resource
win7-20240708-en
General
-
Target
b87554d3b5377f3800ed096efe3b6e4d02c7ad9e3bdf1f71a66ed47ae479662e.exe
-
Size
1.8MB
-
MD5
770569784896b9f4265199290d40887b
-
SHA1
bee501ab46012b693f825446bc92f0b5a21f8851
-
SHA256
b87554d3b5377f3800ed096efe3b6e4d02c7ad9e3bdf1f71a66ed47ae479662e
-
SHA512
ffbbdab985370c1ed504b796ff956f789f3dbb2fb7f75cb8dc740d773e082d3db1ca67781c6e78930592e4d06d431053339b1885cda8207fe516542be1a262ce
-
SSDEEP
49152:mcKca9Fi9hD+TeUdG/X+rQVZ5kNRsETkKn7ay:m5uhD20/XmQVZ5kNRs+kKn7a
Malware Config
Extracted
amadey
4.41
c7817d
http://31.41.244.10
-
install_dir
0e8d0864aa
-
install_file
svoutse.exe
-
strings_key
5481b88a6ef75bcf21333988a4e47048
-
url_paths
/Dem7kTu/index.php
Extracted
stealc
leva
http://185.215.113.100
-
url_path
/e2b1563c6670f193.php
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 46a5adc0fd.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b87554d3b5377f3800ed096efe3b6e4d02c7ad9e3bdf1f71a66ed47ae479662e.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ svoutse.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d693e7cb58.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 8 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b87554d3b5377f3800ed096efe3b6e4d02c7ad9e3bdf1f71a66ed47ae479662e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion svoutse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svoutse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d693e7cb58.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d693e7cb58.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 46a5adc0fd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 46a5adc0fd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b87554d3b5377f3800ed096efe3b6e4d02c7ad9e3bdf1f71a66ed47ae479662e.exe -
Executes dropped EXE 4 IoCs
pid Process 2724 svoutse.exe 1196 d693e7cb58.exe 1728 46a5adc0fd.exe 1960 520257e734.exe -
Identifies Wine through registry keys 2 TTPs 4 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Wine b87554d3b5377f3800ed096efe3b6e4d02c7ad9e3bdf1f71a66ed47ae479662e.exe Key opened \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Wine svoutse.exe Key opened \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Wine d693e7cb58.exe Key opened \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Wine 46a5adc0fd.exe -
Loads dropped DLL 6 IoCs
pid Process 776 b87554d3b5377f3800ed096efe3b6e4d02c7ad9e3bdf1f71a66ed47ae479662e.exe 2724 svoutse.exe 2724 svoutse.exe 2724 svoutse.exe 2724 svoutse.exe 2724 svoutse.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000500000001a445-70.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 776 b87554d3b5377f3800ed096efe3b6e4d02c7ad9e3bdf1f71a66ed47ae479662e.exe 2724 svoutse.exe 1196 d693e7cb58.exe 1728 46a5adc0fd.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\svoutse.job b87554d3b5377f3800ed096efe3b6e4d02c7ad9e3bdf1f71a66ed47ae479662e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d693e7cb58.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 46a5adc0fd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 520257e734.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b87554d3b5377f3800ed096efe3b6e4d02c7ad9e3bdf1f71a66ed47ae479662e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svoutse.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 776 b87554d3b5377f3800ed096efe3b6e4d02c7ad9e3bdf1f71a66ed47ae479662e.exe 2724 svoutse.exe 1196 d693e7cb58.exe 1728 46a5adc0fd.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 776 b87554d3b5377f3800ed096efe3b6e4d02c7ad9e3bdf1f71a66ed47ae479662e.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe 1960 520257e734.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 776 wrote to memory of 2724 776 b87554d3b5377f3800ed096efe3b6e4d02c7ad9e3bdf1f71a66ed47ae479662e.exe 30 PID 776 wrote to memory of 2724 776 b87554d3b5377f3800ed096efe3b6e4d02c7ad9e3bdf1f71a66ed47ae479662e.exe 30 PID 776 wrote to memory of 2724 776 b87554d3b5377f3800ed096efe3b6e4d02c7ad9e3bdf1f71a66ed47ae479662e.exe 30 PID 776 wrote to memory of 2724 776 b87554d3b5377f3800ed096efe3b6e4d02c7ad9e3bdf1f71a66ed47ae479662e.exe 30 PID 2724 wrote to memory of 1196 2724 svoutse.exe 33 PID 2724 wrote to memory of 1196 2724 svoutse.exe 33 PID 2724 wrote to memory of 1196 2724 svoutse.exe 33 PID 2724 wrote to memory of 1196 2724 svoutse.exe 33 PID 2724 wrote to memory of 1728 2724 svoutse.exe 34 PID 2724 wrote to memory of 1728 2724 svoutse.exe 34 PID 2724 wrote to memory of 1728 2724 svoutse.exe 34 PID 2724 wrote to memory of 1728 2724 svoutse.exe 34 PID 2724 wrote to memory of 1960 2724 svoutse.exe 35 PID 2724 wrote to memory of 1960 2724 svoutse.exe 35 PID 2724 wrote to memory of 1960 2724 svoutse.exe 35 PID 2724 wrote to memory of 1960 2724 svoutse.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\b87554d3b5377f3800ed096efe3b6e4d02c7ad9e3bdf1f71a66ed47ae479662e.exe"C:\Users\Admin\AppData\Local\Temp\b87554d3b5377f3800ed096efe3b6e4d02c7ad9e3bdf1f71a66ed47ae479662e.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:776 -
C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe"C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Users\Admin\AppData\Roaming\1000026000\d693e7cb58.exe"C:\Users\Admin\AppData\Roaming\1000026000\d693e7cb58.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1196
-
-
C:\Users\Admin\AppData\Roaming\1000027000\46a5adc0fd.exe"C:\Users\Admin\AppData\Roaming\1000027000\46a5adc0fd.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1728
-
-
C:\Users\Admin\AppData\Local\Temp\1000028001\520257e734.exe"C:\Users\Admin\AppData\Local\Temp\1000028001\520257e734.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1960
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5770569784896b9f4265199290d40887b
SHA1bee501ab46012b693f825446bc92f0b5a21f8851
SHA256b87554d3b5377f3800ed096efe3b6e4d02c7ad9e3bdf1f71a66ed47ae479662e
SHA512ffbbdab985370c1ed504b796ff956f789f3dbb2fb7f75cb8dc740d773e082d3db1ca67781c6e78930592e4d06d431053339b1885cda8207fe516542be1a262ce
-
Filesize
896KB
MD58a9ad4f8bd8c551d33a535fd15cd3a0b
SHA1eff90fe4949bc37c511aa3795822435f9182a3e7
SHA2568b01cff608f4625233e56ee33347e12ece06141046133c2cf38beffcd658b7db
SHA512358b0c9e08747de3974587591ba4bfb0d111ee4ac277249898ef1e99a4029816e997a33023d04f48ecf6f26c7197fec30df6b2a29f7cb884978b9d7b0dc6edf9
-
Filesize
1.7MB
MD5a0f1a3fb687a03fc519f656904fa3c3a
SHA12e38364f4ee4e4306895ccbada109c9c960fb303
SHA256f8366120d820594290cca65aa7165b6582a5f3442fb66d7992929c821c217c3c
SHA512c0e4488765d0e1e4f8d5a1218439bb73a6d4e4deacd5f5c7e0f90d137aa8d85021ae0ce385934933b942b47fb56438e4d70e8cdab2853fc7d3a1e97fd7dfab1f