Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
19s -
max time network
20s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28/09/2024, 13:11
Static task
static1
Behavioral task
behavioral1
Sample
Loader.exe
Resource
win10v2004-20240802-en
General
-
Target
Loader.exe
-
Size
14.3MB
-
MD5
52798d5d0ade39da500ac05d8de57b90
-
SHA1
8926345091c43440778b79238efdeb3f51ff26af
-
SHA256
5c34e365737b1f0584f54caf50c55b1c30a7c062e8ce5d1ef584f6aa0f4f85ba
-
SHA512
a9b06437c25de5c0b425764aafff4bb590d58ca44cee21a39edcb58a23db7a6876a427f77166a1d0524a95b7adf9082bc48f2c1838d6c7c1b02964da6e24e9b7
-
SSDEEP
393216:JhMmSNm/0Ml+u5ytC3bmM6rR78YIQs7MeP7LIjCA:cmSw/0mjyA3bgrHGpPIjh
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Loader.exe -
Creates new service(s) 2 TTPs
-
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\System32\drivers\winhb.sys Loader.exe File opened for modification C:\Windows\System32\drivers\winhb.sys Loader.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Loader.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Loader.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation Loader.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Loader.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File opened for modification C:\Windows\System32\config\RegBack\{69CD1F2D-DF68-4E23-9108-1B70783F2444} Loader.exe File opened for modification C:\Windows\System32\config\RegBack\{69CD1F2D-DF68-4E23-9108-1B70783F2879} Loader.exe File opened for modification C:\Windows\System32\config\RegBack\{69CD1F2D-DF68-4E23-9108-1B70783F2859} Loader.exe File opened for modification C:\Windows\System32\config\RegBack\{69CD1F2D-DF68-4E23-9108-1B70783F2869} Loader.exe File opened for modification C:\Windows\System32\IME\IMETC\{69CD1F2D-DF68-4E23-9108-1B70783F2879} Loader.exe File opened for modification C:\Windows\System32\config\RegBack\{69CD1F2D-DF68-4E23-9108-1B70783F2899} Loader.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1360 Loader.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\schemas\Provisioning\{69CD1F2D-DF68-4E23-9108-UPDATE} Loader.exe File opened for modification C:\Windows\schemas\Provisioning\{69CD1F2D-DF68-4E23-9108-1B70783F2893} Loader.exe File opened for modification C:\Windows\schemas\Provisioning\{69CD1F2D-DF68-4E23-9108-1B70783F2892} Loader.exe File opened for modification C:\Windows\schemas\Provisioning\{69CD1F2D-DF68-4E23-9108-1B70783F2859} Loader.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1152 sc.exe 2556 sc.exe 1392 sc.exe 4420 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1360 Loader.exe 1360 Loader.exe 1360 Loader.exe 1360 Loader.exe 1360 Loader.exe 1360 Loader.exe 1360 Loader.exe 1360 Loader.exe 1360 Loader.exe 1360 Loader.exe 1360 Loader.exe 1360 Loader.exe 1360 Loader.exe 1360 Loader.exe 1360 Loader.exe 1360 Loader.exe 1360 Loader.exe 1360 Loader.exe 1360 Loader.exe 1360 Loader.exe 1360 Loader.exe 1360 Loader.exe 1360 Loader.exe 1360 Loader.exe 1360 Loader.exe 1360 Loader.exe 1360 Loader.exe 1360 Loader.exe 1360 Loader.exe 1360 Loader.exe 1360 Loader.exe 1360 Loader.exe 1360 Loader.exe 1360 Loader.exe 1360 Loader.exe 1360 Loader.exe 1360 Loader.exe 1360 Loader.exe 1360 Loader.exe 1360 Loader.exe 1360 Loader.exe 1360 Loader.exe 1360 Loader.exe 1360 Loader.exe 1360 Loader.exe 1360 Loader.exe 1360 Loader.exe 1360 Loader.exe 1360 Loader.exe 1360 Loader.exe 1360 Loader.exe 1360 Loader.exe 1360 Loader.exe 1360 Loader.exe 1360 Loader.exe 1360 Loader.exe 1360 Loader.exe 1360 Loader.exe 1360 Loader.exe 1360 Loader.exe 1360 Loader.exe 1360 Loader.exe 1360 Loader.exe 1360 Loader.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 660 Process not Found 660 Process not Found -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 1360 wrote to memory of 4984 1360 Loader.exe 83 PID 1360 wrote to memory of 4984 1360 Loader.exe 83 PID 1360 wrote to memory of 4896 1360 Loader.exe 85 PID 1360 wrote to memory of 4896 1360 Loader.exe 85 PID 1360 wrote to memory of 536 1360 Loader.exe 87 PID 1360 wrote to memory of 536 1360 Loader.exe 87 PID 1360 wrote to memory of 4116 1360 Loader.exe 89 PID 1360 wrote to memory of 4116 1360 Loader.exe 89 PID 4984 wrote to memory of 2556 4984 cmd.exe 90 PID 4984 wrote to memory of 2556 4984 cmd.exe 90 PID 4896 wrote to memory of 1392 4896 cmd.exe 92 PID 4896 wrote to memory of 1392 4896 cmd.exe 92 PID 4116 wrote to memory of 436 4116 cmd.exe 91 PID 4116 wrote to memory of 436 4116 cmd.exe 91 PID 4116 wrote to memory of 4964 4116 cmd.exe 93 PID 4116 wrote to memory of 4964 4116 cmd.exe 93 PID 4116 wrote to memory of 1064 4116 cmd.exe 94 PID 4116 wrote to memory of 1064 4116 cmd.exe 94 PID 536 wrote to memory of 4420 536 cmd.exe 95 PID 536 wrote to memory of 4420 536 cmd.exe 95 PID 1360 wrote to memory of 2004 1360 Loader.exe 96 PID 1360 wrote to memory of 2004 1360 Loader.exe 96 PID 2004 wrote to memory of 1152 2004 cmd.exe 98 PID 2004 wrote to memory of 1152 2004 cmd.exe 98 PID 1360 wrote to memory of 4592 1360 Loader.exe 100 PID 1360 wrote to memory of 4592 1360 Loader.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\Loader.exe"C:\Users\Admin\AppData\Local\Temp\Loader.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Drops file in Drivers directory
- Checks BIOS information in registry
- Checks computer location settings
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C sc create windowsproc type=kernel binpath=C:\Windows\System32\drivers\winhb.sys2⤵
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Windows\system32\sc.exesc create windowsproc type=kernel binpath=C:\Windows\System32\drivers\winhb.sys3⤵
- Launches sc.exe
PID:2556
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C sc start windowsproc2⤵
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Windows\system32\sc.exesc start windowsproc3⤵
- Launches sc.exe
PID:1392
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C sc create windowsproc type=kernel binpath=C:\Windows\System32\drivers\winhb.sys2⤵
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Windows\system32\sc.exesc create windowsproc type=kernel binpath=C:\Windows\System32\drivers\winhb.sys3⤵
- Launches sc.exe
PID:4420
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\Loader.exe" MD5 | find /i /v "md5" | find /i /v "certutil"2⤵
- Suspicious use of WriteProcessMemory
PID:4116 -
C:\Windows\system32\certutil.execertutil -hashfile "C:\Users\Admin\AppData\Local\Temp\Loader.exe" MD53⤵PID:436
-
-
C:\Windows\system32\find.exefind /i /v "md5"3⤵PID:4964
-
-
C:\Windows\system32\find.exefind /i /v "certutil"3⤵PID:1064
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C sc start windowsproc2⤵
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\system32\sc.exesc start windowsproc3⤵
- Launches sc.exe
PID:1152
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c pause2⤵PID:4592
-