Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    40s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    25/09/2024, 19:51

General

  • Target

    SolarisLoader.exe

  • Size

    3.2MB

  • MD5

    0bcad67b64ad0450bb0493cb9c843763

  • SHA1

    f1bd479efbba27a2207376e4dee75e50a8d7894e

  • SHA256

    05e7c6e07e56087211ed50e79587181f8ca0d0195f130d2d5e15e90931708665

  • SHA512

    1fbea4edc275b25e99c4a27c228085d2fe937afe942300b487fd2be0e91b218c57b6e3036e4f98e3c1536209cf604d84308dbd46302eb92a5e2b1affdaa0e15b

  • SSDEEP

    98304:wsmjK0LZDp9Sj4AUvrCP/ybS+YsVQ/B0:+GkL9Frw/c6iQ

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Themida packer 2 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SolarisLoader.exe
    "C:\Users\Admin\AppData\Local\Temp\SolarisLoader.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2544

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2544-0-0x00000000012B0000-0x0000000001B6E000-memory.dmp

    Filesize

    8.7MB

  • memory/2544-4-0x0000000076100000-0x0000000076210000-memory.dmp

    Filesize

    1.1MB

  • memory/2544-3-0x0000000076100000-0x0000000076210000-memory.dmp

    Filesize

    1.1MB

  • memory/2544-2-0x0000000076100000-0x0000000076210000-memory.dmp

    Filesize

    1.1MB

  • memory/2544-1-0x0000000076111000-0x0000000076112000-memory.dmp

    Filesize

    4KB

  • memory/2544-9-0x0000000076100000-0x0000000076210000-memory.dmp

    Filesize

    1.1MB

  • memory/2544-10-0x0000000076100000-0x0000000076210000-memory.dmp

    Filesize

    1.1MB

  • memory/2544-8-0x0000000076100000-0x0000000076210000-memory.dmp

    Filesize

    1.1MB

  • memory/2544-7-0x0000000076100000-0x0000000076210000-memory.dmp

    Filesize

    1.1MB

  • memory/2544-6-0x0000000076100000-0x0000000076210000-memory.dmp

    Filesize

    1.1MB

  • memory/2544-14-0x0000000076100000-0x0000000076210000-memory.dmp

    Filesize

    1.1MB

  • memory/2544-13-0x0000000076100000-0x0000000076210000-memory.dmp

    Filesize

    1.1MB

  • memory/2544-19-0x0000000076100000-0x0000000076210000-memory.dmp

    Filesize

    1.1MB

  • memory/2544-26-0x0000000076100000-0x0000000076210000-memory.dmp

    Filesize

    1.1MB

  • memory/2544-25-0x0000000076100000-0x0000000076210000-memory.dmp

    Filesize

    1.1MB

  • memory/2544-24-0x0000000076100000-0x0000000076210000-memory.dmp

    Filesize

    1.1MB

  • memory/2544-23-0x0000000076100000-0x0000000076210000-memory.dmp

    Filesize

    1.1MB

  • memory/2544-22-0x0000000076100000-0x0000000076210000-memory.dmp

    Filesize

    1.1MB

  • memory/2544-21-0x0000000076100000-0x0000000076210000-memory.dmp

    Filesize

    1.1MB

  • memory/2544-20-0x0000000076100000-0x0000000076210000-memory.dmp

    Filesize

    1.1MB

  • memory/2544-27-0x0000000076100000-0x0000000076210000-memory.dmp

    Filesize

    1.1MB

  • memory/2544-18-0x0000000076100000-0x0000000076210000-memory.dmp

    Filesize

    1.1MB

  • memory/2544-17-0x0000000076100000-0x0000000076210000-memory.dmp

    Filesize

    1.1MB

  • memory/2544-16-0x0000000076100000-0x0000000076210000-memory.dmp

    Filesize

    1.1MB

  • memory/2544-15-0x0000000076100000-0x0000000076210000-memory.dmp

    Filesize

    1.1MB

  • memory/2544-12-0x0000000076100000-0x0000000076210000-memory.dmp

    Filesize

    1.1MB

  • memory/2544-11-0x0000000076100000-0x0000000076210000-memory.dmp

    Filesize

    1.1MB

  • memory/2544-5-0x0000000076100000-0x0000000076210000-memory.dmp

    Filesize

    1.1MB

  • memory/2544-28-0x00000000012B0000-0x0000000001B6E000-memory.dmp

    Filesize

    8.7MB

  • memory/2544-29-0x00000000012B0000-0x0000000001B6E000-memory.dmp

    Filesize

    8.7MB

  • memory/2544-30-0x0000000076100000-0x0000000076210000-memory.dmp

    Filesize

    1.1MB

  • memory/2544-31-0x00000000012B0000-0x0000000001B6E000-memory.dmp

    Filesize

    8.7MB

  • memory/2544-32-0x0000000076100000-0x0000000076210000-memory.dmp

    Filesize

    1.1MB

  • memory/2544-33-0x0000000076111000-0x0000000076112000-memory.dmp

    Filesize

    4KB

  • memory/2544-34-0x0000000076100000-0x0000000076210000-memory.dmp

    Filesize

    1.1MB

  • memory/2544-35-0x0000000076100000-0x0000000076210000-memory.dmp

    Filesize

    1.1MB

  • memory/2544-37-0x0000000076100000-0x0000000076210000-memory.dmp

    Filesize

    1.1MB