Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    93s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/09/2024, 22:45

General

  • Target

    a04537c8928883ec8cf9f3ed9890b120N.exe

  • Size

    2.6MB

  • MD5

    a04537c8928883ec8cf9f3ed9890b120

  • SHA1

    8081424a63548f6c4e489b0bdd6f62010363b4e8

  • SHA256

    12d27fc722e34327a41d5da56a159fb2998e7cc679efe3143a4cae04162bb02b

  • SHA512

    f04b128681fa279cc3334c8203f52c953c995265876d0652d42d1e452611b43f8109bb66b3d3ef703f6a7e7b87461bd11e1f6b708e3f432c1694c9ed7ae568fa

  • SSDEEP

    49152:WXzhpDtKSK1cb8PGK+Tfuqmpc3elWo8GnQAsYZEVA:WXzhW148Pd+Tf1mpcOldJQ3/VA

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
  • Checks BIOS information in registry 2 TTPs 10 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 4 IoCs
  • Themida packer 17 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks whether UAC is enabled 1 TTPs 5 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
  • Drops file in Windows directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a04537c8928883ec8cf9f3ed9890b120N.exe
    "C:\Users\Admin\AppData\Local\Temp\a04537c8928883ec8cf9f3ed9890b120N.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3532
    • \??\c:\windows\resources\themes\explorer.exe
      c:\windows\resources\themes\explorer.exe
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Drops file in System32 directory
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1520
      • \??\c:\windows\resources\spoolsv.exe
        c:\windows\resources\spoolsv.exe SE
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Checks whether UAC is enabled
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4928
        • \??\c:\windows\resources\svchost.exe
          c:\windows\resources\svchost.exe
          4⤵
          • Modifies visiblity of hidden/system files in Explorer
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Adds Run key to start application
          • Checks whether UAC is enabled
          • Drops file in System32 directory
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:216
          • \??\c:\windows\resources\spoolsv.exe
            c:\windows\resources\spoolsv.exe PR
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Checks whether UAC is enabled
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            PID:4624

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\Resources\Themes\explorer.exe

    Filesize

    2.6MB

    MD5

    e21333bdddf5f93412432aef4834537a

    SHA1

    b64257f1a75dc45d0255bd1485930c8815c23f4e

    SHA256

    15aa7e1f9236b4ae23b4f8f920e32d3a728f499e548848f66033173472b60c52

    SHA512

    23980ee3907f162c8db3f5cd8490732618e312622c446275a40c625116fb07a806affa3afe12cf31b3fba86cba43a4b0ff5df0b393b36821673f8f685a573be1

  • C:\Windows\Resources\spoolsv.exe

    Filesize

    2.6MB

    MD5

    8351b4ea443a2e3cc7e421536876a16d

    SHA1

    26b920b0e0dc13da9293bfd5078ae69a2abbc6df

    SHA256

    ab1d5cf0ccb3a090ad0e88852952539acece33cc49a854019311ba9981612f59

    SHA512

    1765c7bebfc204e610bc4573c64eea3f59008e8625829126e07265d6362259af0c6fec983f09ccf885f3f7ca12f9c3efa54ccbb03167c362ea286f83d6a4b880

  • C:\Windows\Resources\svchost.exe

    Filesize

    2.6MB

    MD5

    3d698eb6fd87e8c71520f24e34322a76

    SHA1

    83be08d3a3fba251ba4042891516f607a7f86f75

    SHA256

    286e63953b5ea8da509ab51adbdebf9cd5a3d603b3b0ad21cb4a7129b9ede903

    SHA512

    e609e7cb94ade89983d23e87bc1cf88ee3576890fef7b5c28529ee2362da300927fba12ffa614774093514f4f11aae1981f705d1ff88216c944eb1278ecbc52c

  • memory/216-54-0x0000000000400000-0x0000000000A16000-memory.dmp

    Filesize

    6.1MB

  • memory/216-44-0x0000000000400000-0x0000000000A16000-memory.dmp

    Filesize

    6.1MB

  • memory/216-28-0x0000000000400000-0x0000000000A16000-memory.dmp

    Filesize

    6.1MB

  • memory/1520-43-0x0000000000400000-0x0000000000A16000-memory.dmp

    Filesize

    6.1MB

  • memory/1520-10-0x0000000000400000-0x0000000000A16000-memory.dmp

    Filesize

    6.1MB

  • memory/1520-45-0x0000000000400000-0x0000000000A16000-memory.dmp

    Filesize

    6.1MB

  • memory/1520-53-0x0000000000400000-0x0000000000A16000-memory.dmp

    Filesize

    6.1MB

  • memory/1520-57-0x0000000000400000-0x0000000000A16000-memory.dmp

    Filesize

    6.1MB

  • memory/3532-42-0x0000000000400000-0x0000000000A16000-memory.dmp

    Filesize

    6.1MB

  • memory/3532-0-0x0000000000400000-0x0000000000A16000-memory.dmp

    Filesize

    6.1MB

  • memory/3532-1-0x0000000077374000-0x0000000077376000-memory.dmp

    Filesize

    8KB

  • memory/4624-33-0x0000000000400000-0x0000000000A16000-memory.dmp

    Filesize

    6.1MB

  • memory/4624-38-0x0000000000400000-0x0000000000A16000-memory.dmp

    Filesize

    6.1MB

  • memory/4928-19-0x0000000000400000-0x0000000000A16000-memory.dmp

    Filesize

    6.1MB

  • memory/4928-40-0x0000000000400000-0x0000000000A16000-memory.dmp

    Filesize

    6.1MB