Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
14s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 09:49
Behavioral task
behavioral1
Sample
SynapseLauncher.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
SynapseLauncher.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
redeem.cmd
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
redeem.cmd
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
resethwid.cmd
Resource
win7-20240903-en
General
-
Target
redeem.cmd
-
Size
43B
-
MD5
6c7844cefb607abaed7207a6234eda71
-
SHA1
37902ed907569d60dfab37f2b4a137975ef47978
-
SHA256
fd66f408540d64c25248487c6380430b21672eace2782d2b3039a2ce1e766aef
-
SHA512
c127a21bf7ef1dc5c34c4fdcf6b11790d6130e3c903e8b0a3b60280bd499879ae9abad3c97722a4859e17cf0639809456a186a3c0f2590cfebf4adb226bcb385
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ SynapseLauncher.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion SynapseLauncher.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion SynapseLauncher.exe -
resource yara_rule behavioral3/memory/2096-1-0x000000013F1F0000-0x000000013FCB2000-memory.dmp themida behavioral3/memory/2096-4-0x000000013F1F0000-0x000000013FCB2000-memory.dmp themida behavioral3/memory/2096-3-0x000000013F1F0000-0x000000013FCB2000-memory.dmp themida behavioral3/memory/2096-5-0x000000013F1F0000-0x000000013FCB2000-memory.dmp themida behavioral3/memory/2096-6-0x000000013F1F0000-0x000000013FCB2000-memory.dmp themida behavioral3/memory/2096-7-0x000000013F1F0000-0x000000013FCB2000-memory.dmp themida -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2096 SynapseLauncher.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 904 wrote to memory of 2096 904 cmd.exe 30 PID 904 wrote to memory of 2096 904 cmd.exe 30 PID 904 wrote to memory of 2096 904 cmd.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\redeem.cmd"1⤵
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Users\Admin\AppData\Local\Temp\SynapseLauncher.exeSynapseLauncher.exe redeem2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2096
-