Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21/09/2024, 05:16

General

  • Target

    ExeToolsVGBypass2PC.exe

  • Size

    4.2MB

  • MD5

    8675adcd1c579fbc35b39727ac782587

  • SHA1

    310e6c01ada0529791cc0655359874ebf8f94d9d

  • SHA256

    c7cd7a8939eeeef530992a9ecd73c9874282009527657b7886a56122cba047bd

  • SHA512

    b063ee51782f722ba604ea90f92fa862b1b34e4d59d60ab61ecca466bca2793ee4e24f00390981963545cf59b34cfb308bd46872b1ff8b0326d33ae23dddbbc0

  • SSDEEP

    98304:tM3sumlm7Kja4WS9WHV9I90dmlJktRHb945YQgM2:tmsnyJMd9hlCD79456M2

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Stops running service(s) 4 TTPs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Themida packer 20 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Launches sc.exe 8 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Kills process with taskkill 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 15 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ExeToolsVGBypass2PC.exe
    "C:\Users\Admin\AppData\Local\Temp\ExeToolsVGBypass2PC.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:580
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c taskkill /f /im HTTPDebuggerUI.exe >nul 2>&1
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3044
      • C:\Windows\system32\taskkill.exe
        taskkill /f /im HTTPDebuggerUI.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:2700
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\ExeToolsVGBypass2PC.exe" MD5 | find /i /v "md5" | find /i /v "certutil"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1580
      • C:\Windows\system32\certutil.exe
        certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\ExeToolsVGBypass2PC.exe" MD5
        3⤵
          PID:2008
        • C:\Windows\system32\find.exe
          find /i /v "md5"
          3⤵
            PID:2032
          • C:\Windows\system32\find.exe
            find /i /v "certutil"
            3⤵
              PID:2716
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c taskkill /f /im HTTPDebuggerSvc.exe >nul 2>&1
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:2732
            • C:\Windows\system32\taskkill.exe
              taskkill /f /im HTTPDebuggerSvc.exe
              3⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:2616
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:2972
            • C:\Windows\system32\sc.exe
              sc stop HTTPDebuggerPro
              3⤵
              • Launches sc.exe
              PID:2976
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T >nul 2>&1
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:3008
            • C:\Windows\system32\taskkill.exe
              taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T
              3⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:2880
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:2656
            • C:\Windows\system32\taskkill.exe
              taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
              3⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:2892
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T >nul 2>&1
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:2604
            • C:\Windows\system32\taskkill.exe
              taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T
              3⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:2624
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c taskkill /f /im HTTPDebuggerUI.exe >nul 2>&1
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:2728
            • C:\Windows\system32\taskkill.exe
              taskkill /f /im HTTPDebuggerUI.exe
              3⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:2776
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c taskkill /f /im HTTPDebuggerSvc.exe >nul 2>&1
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:840
            • C:\Windows\system32\taskkill.exe
              taskkill /f /im HTTPDebuggerSvc.exe
              3⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:292
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:1036
            • C:\Windows\system32\sc.exe
              sc stop HTTPDebuggerPro
              3⤵
              • Launches sc.exe
              PID:608
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1
            2⤵
              PID:2808
              • C:\Windows\system32\taskkill.exe
                taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
                3⤵
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:1956
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1
              2⤵
                PID:2844
                • C:\Windows\system32\taskkill.exe
                  taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
                  3⤵
                  • Kills process with taskkill
                  • Suspicious use of AdjustPrivilegeToken
                  PID:3024
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq rawshark*" /IM * /F /T >nul 2>&1
                2⤵
                  PID:2596
                  • C:\Windows\system32\taskkill.exe
                    taskkill /FI "IMAGENAME eq rawshark*" /IM * /F /T
                    3⤵
                    • Kills process with taskkill
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2820
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq charles*" /IM * /F /T >nul 2>&1
                  2⤵
                    PID:2832
                    • C:\Windows\system32\taskkill.exe
                      taskkill /FI "IMAGENAME eq charles*" /IM * /F /T
                      3⤵
                      • Kills process with taskkill
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2916
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T >nul 2>&1
                    2⤵
                      PID:2348
                      • C:\Windows\system32\taskkill.exe
                        taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T
                        3⤵
                        • Kills process with taskkill
                        • Suspicious use of AdjustPrivilegeToken
                        PID:1512
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq ida*" /IM * /F /T >nul 2>&1
                      2⤵
                        PID:1432
                        • C:\Windows\system32\taskkill.exe
                          taskkill /FI "IMAGENAME eq ida*" /IM * /F /T
                          3⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2904
                      • C:\Windows\system32\cmd.exe
                        C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
                        2⤵
                          PID:1988
                          • C:\Windows\system32\taskkill.exe
                            taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
                            3⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1196
                        • C:\Windows\system32\cmd.exe
                          C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T >nul 2>&1
                          2⤵
                            PID:1516
                            • C:\Windows\system32\taskkill.exe
                              taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T
                              3⤵
                              • Kills process with taskkill
                              • Suspicious use of AdjustPrivilegeToken
                              PID:1244
                          • C:\Windows\system32\cmd.exe
                            C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
                            2⤵
                              PID:2460
                              • C:\Windows\system32\sc.exe
                                sc stop HTTPDebuggerPro
                                3⤵
                                • Launches sc.exe
                                PID:2272
                            • C:\Windows\system32\cmd.exe
                              C:\Windows\system32\cmd.exe /c sc stop KProcessHacker3 >nul 2>&1
                              2⤵
                                PID:768
                                • C:\Windows\system32\sc.exe
                                  sc stop KProcessHacker3
                                  3⤵
                                  • Launches sc.exe
                                  PID:3040
                              • C:\Windows\system32\cmd.exe
                                C:\Windows\system32\cmd.exe /c sc stop KProcessHacker2 >nul 2>&1
                                2⤵
                                  PID:3036
                                  • C:\Windows\system32\sc.exe
                                    sc stop KProcessHacker2
                                    3⤵
                                    • Launches sc.exe
                                    PID:2192
                                • C:\Windows\system32\cmd.exe
                                  C:\Windows\system32\cmd.exe /c sc stop KProcessHacker1 >nul 2>&1
                                  2⤵
                                    PID:2408
                                    • C:\Windows\system32\sc.exe
                                      sc stop KProcessHacker1
                                      3⤵
                                      • Launches sc.exe
                                      PID:2092
                                  • C:\Windows\system32\cmd.exe
                                    C:\Windows\system32\cmd.exe /c sc stop wireshark >nul 2>&1
                                    2⤵
                                      PID:1920
                                      • C:\Windows\system32\sc.exe
                                        sc stop wireshark
                                        3⤵
                                        • Launches sc.exe
                                        PID:2704
                                    • C:\Windows\system32\cmd.exe
                                      C:\Windows\system32\cmd.exe /c sc stop npf >nul 2>&1
                                      2⤵
                                        PID:2520
                                        • C:\Windows\system32\sc.exe
                                          sc stop npf
                                          3⤵
                                          • Launches sc.exe
                                          PID:2404

                                    Network

                                    MITRE ATT&CK Enterprise v15

                                    Replay Monitor

                                    Loading Replay Monitor...

                                    Downloads

                                    • memory/580-0-0x0000000140000000-0x0000000140AF1000-memory.dmp

                                      Filesize

                                      10.9MB

                                    • memory/580-1-0x00000000773D0000-0x00000000773D2000-memory.dmp

                                      Filesize

                                      8KB

                                    • memory/580-5-0x0000000140000000-0x0000000140AF1000-memory.dmp

                                      Filesize

                                      10.9MB

                                    • memory/580-4-0x0000000140000000-0x0000000140AF1000-memory.dmp

                                      Filesize

                                      10.9MB

                                    • memory/580-3-0x0000000140000000-0x0000000140AF1000-memory.dmp

                                      Filesize

                                      10.9MB

                                    • memory/580-2-0x0000000140000000-0x0000000140AF1000-memory.dmp

                                      Filesize

                                      10.9MB

                                    • memory/580-6-0x0000000140000000-0x0000000140AF1000-memory.dmp

                                      Filesize

                                      10.9MB

                                    • memory/580-7-0x0000000140000000-0x0000000140AF1000-memory.dmp

                                      Filesize

                                      10.9MB

                                    • memory/580-8-0x0000000140000000-0x0000000140AF1000-memory.dmp

                                      Filesize

                                      10.9MB

                                    • memory/580-9-0x0000000140000000-0x0000000140AF1000-memory.dmp

                                      Filesize

                                      10.9MB

                                    • memory/580-10-0x0000000140000000-0x0000000140AF1000-memory.dmp

                                      Filesize

                                      10.9MB

                                    • memory/580-11-0x0000000140000000-0x0000000140AF1000-memory.dmp

                                      Filesize

                                      10.9MB

                                    • memory/580-12-0x0000000140000000-0x0000000140AF1000-memory.dmp

                                      Filesize

                                      10.9MB

                                    • memory/580-13-0x0000000140000000-0x0000000140AF1000-memory.dmp

                                      Filesize

                                      10.9MB

                                    • memory/580-14-0x0000000140000000-0x0000000140AF1000-memory.dmp

                                      Filesize

                                      10.9MB

                                    • memory/580-15-0x0000000140000000-0x0000000140AF1000-memory.dmp

                                      Filesize

                                      10.9MB

                                    • memory/580-16-0x0000000140000000-0x0000000140AF1000-memory.dmp

                                      Filesize

                                      10.9MB

                                    • memory/580-17-0x0000000140000000-0x0000000140AF1000-memory.dmp

                                      Filesize

                                      10.9MB

                                    • memory/580-18-0x0000000140000000-0x0000000140AF1000-memory.dmp

                                      Filesize

                                      10.9MB

                                    • memory/580-19-0x0000000140000000-0x0000000140AF1000-memory.dmp

                                      Filesize

                                      10.9MB

                                    • memory/580-20-0x0000000140000000-0x0000000140AF1000-memory.dmp

                                      Filesize

                                      10.9MB