Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    140s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2024, 15:51 UTC

General

  • Target

    964a805a94e838ec7981e546f4ac79d522a88784757740b1375e39a08e833c9d.exe

  • Size

    15.2MB

  • MD5

    07b97630f5cb4c47a65a31f8d4d2b725

  • SHA1

    506c6f6855e45bb3ac53c1431395b7060308b86e

  • SHA256

    964a805a94e838ec7981e546f4ac79d522a88784757740b1375e39a08e833c9d

  • SHA512

    322918f6373c33c4a941c47d266958c87b849df5fa0ff3a2ee02db39749784f26fda9b8e0d20f3655b1fbd7bfe90964feb25566139399e132dd33130b459a3a1

  • SSDEEP

    393216:xzRcVmqWE9O8Vy2GcM2zjzovmCUopNK8GZbYEpkz7:xEPqTcZX0+CUop2xA

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Themida packer 19 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\964a805a94e838ec7981e546f4ac79d522a88784757740b1375e39a08e833c9d.exe
    "C:\Users\Admin\AppData\Local\Temp\964a805a94e838ec7981e546f4ac79d522a88784757740b1375e39a08e833c9d.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: RenamesItself
    • Suspicious use of SetWindowsHookEx
    PID:2572

Network

  • flag-us
    GET
    http://67.198.240.32/361.txt
    964a805a94e838ec7981e546f4ac79d522a88784757740b1375e39a08e833c9d.exe
    Remote address:
    67.198.240.32:80
    Request
    GET /361.txt HTTP/1.1
    User-Agent: HTTPREAD
    Host: 67.198.240.32
    Cache-Control: no-cache
    Response
    HTTP/1.1 200 OK
    Content-Type: text/plain
    Last-Modified: Thu, 19 Sep 2024 15:51:47 GMT
    Accept-Ranges: bytes
    ETag: "63f645d5abadb1:0"
    Server: Microsoft-IIS/10.0
    Date: Thu, 19 Sep 2024 15:51:57 GMT
    Content-Length: 6
  • flag-us
    GET
    http://67.198.240.32/apexbanben.txt
    964a805a94e838ec7981e546f4ac79d522a88784757740b1375e39a08e833c9d.exe
    Remote address:
    67.198.240.32:80
    Request
    GET /apexbanben.txt HTTP/1.1
    User-Agent: HTTPREAD
    Host: 67.198.240.32
    Cache-Control: no-cache
    Response
    HTTP/1.1 200 OK
    Content-Type: text/plain
    Last-Modified: Thu, 11 Aug 2022 17:03:18 GMT
    Accept-Ranges: bytes
    ETag: "0fc040a4add81:0"
    Server: Microsoft-IIS/10.0
    Date: Thu, 19 Sep 2024 15:51:57 GMT
    Content-Length: 1
  • 67.198.240.32:2056
    964a805a94e838ec7981e546f4ac79d522a88784757740b1375e39a08e833c9d.exe
    411 B
    456 B
    7
    6
  • 67.198.240.32:80
    http://67.198.240.32/apexbanben.txt
    http
    964a805a94e838ec7981e546f4ac79d522a88784757740b1375e39a08e833c9d.exe
    561 B
    887 B
    8
    5

    HTTP Request

    GET http://67.198.240.32/361.txt

    HTTP Response

    200

    HTTP Request

    GET http://67.198.240.32/apexbanben.txt

    HTTP Response

    200
No results found

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2572-1-0x0000000077940000-0x0000000077942000-memory.dmp

    Filesize

    8KB

  • memory/2572-0-0x0000000140000000-0x00000001416F6000-memory.dmp

    Filesize

    23.0MB

  • memory/2572-2-0x0000000140000000-0x00000001416F6000-memory.dmp

    Filesize

    23.0MB

  • memory/2572-4-0x0000000140000000-0x00000001416F6000-memory.dmp

    Filesize

    23.0MB

  • memory/2572-3-0x0000000140000000-0x00000001416F6000-memory.dmp

    Filesize

    23.0MB

  • memory/2572-5-0x0000000001BC0000-0x0000000001BC1000-memory.dmp

    Filesize

    4KB

  • memory/2572-6-0x0000000001BC0000-0x0000000001BC1000-memory.dmp

    Filesize

    4KB

  • memory/2572-11-0x0000000140000000-0x00000001416F6000-memory.dmp

    Filesize

    23.0MB

  • memory/2572-12-0x0000000140000000-0x00000001416F6000-memory.dmp

    Filesize

    23.0MB

  • memory/2572-13-0x0000000140000000-0x00000001416F6000-memory.dmp

    Filesize

    23.0MB

  • memory/2572-14-0x0000000140000000-0x00000001416F6000-memory.dmp

    Filesize

    23.0MB

  • memory/2572-15-0x0000000140000000-0x00000001416F6000-memory.dmp

    Filesize

    23.0MB

  • memory/2572-16-0x0000000140000000-0x00000001416F6000-memory.dmp

    Filesize

    23.0MB

  • memory/2572-17-0x0000000140000000-0x00000001416F6000-memory.dmp

    Filesize

    23.0MB

  • memory/2572-18-0x0000000140000000-0x00000001416F6000-memory.dmp

    Filesize

    23.0MB

  • memory/2572-19-0x0000000140000000-0x00000001416F6000-memory.dmp

    Filesize

    23.0MB

  • memory/2572-20-0x0000000140000000-0x00000001416F6000-memory.dmp

    Filesize

    23.0MB

  • memory/2572-21-0x0000000140000000-0x00000001416F6000-memory.dmp

    Filesize

    23.0MB

  • memory/2572-22-0x0000000140000000-0x00000001416F6000-memory.dmp

    Filesize

    23.0MB

  • memory/2572-23-0x0000000140000000-0x00000001416F6000-memory.dmp

    Filesize

    23.0MB

  • memory/2572-24-0x0000000140000000-0x00000001416F6000-memory.dmp

    Filesize

    23.0MB

  • memory/2572-25-0x0000000140000000-0x00000001416F6000-memory.dmp

    Filesize

    23.0MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.