Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    95s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/10/2024, 12:55

General

  • Target

    cheat.exe

  • Size

    4.0MB

  • MD5

    b85d921021263f9de8c46b7c1540d746

  • SHA1

    9ebac0f8f2c3b25ee97eba8690059314e051da63

  • SHA256

    e96975a0736f3451cd0ef2209c1a0de060232d6eceaf9c1febcf62917a1dbcb1

  • SHA512

    1d2d71dcddfc0d03e9f5c1f4ecc3da1eb3d1ec3ffd3ca11919cde9c91114da94a192206e3c4a4d28f80aee176634d1cbce358ed71e116a53d834c25b3ef936fa

  • SSDEEP

    98304:Et/x+ZwFGgE9sZ0jXj/9IZGnezACcOGKM7wp+d5mzVk:Et5N8Y0jXjhYY6qwk

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Themida packer 11 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cheat.exe
    "C:\Users\Admin\AppData\Local\Temp\cheat.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Sets service image path in registry
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: LoadsDriver
    • Suspicious use of AdjustPrivilegeToken
    PID:4980

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4980-0-0x00007FF6C3D60000-0x00007FF6C4807000-memory.dmp

    Filesize

    10.7MB

  • memory/4980-1-0x00007FF97E430000-0x00007FF97E432000-memory.dmp

    Filesize

    8KB

  • memory/4980-3-0x00007FF6C3D60000-0x00007FF6C4807000-memory.dmp

    Filesize

    10.7MB

  • memory/4980-4-0x00007FF6C3D60000-0x00007FF6C4807000-memory.dmp

    Filesize

    10.7MB

  • memory/4980-2-0x00007FF6C3D60000-0x00007FF6C4807000-memory.dmp

    Filesize

    10.7MB

  • memory/4980-6-0x00007FF6C3D60000-0x00007FF6C4807000-memory.dmp

    Filesize

    10.7MB

  • memory/4980-5-0x00007FF6C3D60000-0x00007FF6C4807000-memory.dmp

    Filesize

    10.7MB

  • memory/4980-7-0x00007FF6C3D60000-0x00007FF6C4807000-memory.dmp

    Filesize

    10.7MB

  • memory/4980-8-0x00007FF6C3D60000-0x00007FF6C4807000-memory.dmp

    Filesize

    10.7MB

  • memory/4980-20-0x00007FF6C3D60000-0x00007FF6C4807000-memory.dmp

    Filesize

    10.7MB

  • memory/4980-21-0x00007FF6C3D60000-0x00007FF6C4807000-memory.dmp

    Filesize

    10.7MB

  • memory/4980-23-0x00007FF6C3D60000-0x00007FF6C4807000-memory.dmp

    Filesize

    10.7MB