Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    140s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    10/11/2024, 20:26 UTC

General

  • Target

    Hypnoz Generator.exe

  • Size

    5.7MB

  • MD5

    61bf8c7f6d368f10fe841fed2d51bb46

  • SHA1

    6cc3b59948586329194743e2f984414bdef49477

  • SHA256

    f6abc86539aafb08e53c52674b929683ce5b21581c226d77795042e7e0bb1655

  • SHA512

    d5fec7094c3915abbbd90039c9a68ebac4b47498ffc65a24ed64267114d14de37a104ca4766599d337a494c53094a07088ee45df48543d28861d66c8f5c30c9b

  • SSDEEP

    98304:wx4HucwlTpqQfWLs7aGaOjmD/wBCeN1XEPDUnH10ViukqIkPCl23IL:wx4XoIvw7ha5oBCYOPDUH6Euo23IL

Malware Config

Signatures

  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 2 IoCs
  • Sectoprat family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Themida packer 2 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Hypnoz Generator.exe
    "C:\Users\Admin\AppData\Local\Temp\Hypnoz Generator.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    PID:2232

Network

    No results found
  • 109.248.203.72:49046
    Hypnoz Generator.exe
    152 B
    3
  • 109.248.203.72:49046
    Hypnoz Generator.exe
    152 B
    3
  • 109.248.203.72:49046
    Hypnoz Generator.exe
    152 B
    3
  • 109.248.203.72:49046
    Hypnoz Generator.exe
    152 B
    3
  • 109.248.203.72:49046
    Hypnoz Generator.exe
    152 B
    3
  • 109.248.203.72:49046
    Hypnoz Generator.exe
    152 B
    3
No results found

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2232-0-0x00000000010F0000-0x0000000002010000-memory.dmp

    Filesize

    15.1MB

  • memory/2232-1-0x0000000076861000-0x0000000076862000-memory.dmp

    Filesize

    4KB

  • memory/2232-2-0x0000000076850000-0x0000000076960000-memory.dmp

    Filesize

    1.1MB

  • memory/2232-5-0x0000000076850000-0x0000000076960000-memory.dmp

    Filesize

    1.1MB

  • memory/2232-4-0x0000000076850000-0x0000000076960000-memory.dmp

    Filesize

    1.1MB

  • memory/2232-3-0x0000000076850000-0x0000000076960000-memory.dmp

    Filesize

    1.1MB

  • memory/2232-6-0x0000000076850000-0x0000000076960000-memory.dmp

    Filesize

    1.1MB

  • memory/2232-25-0x0000000076850000-0x0000000076960000-memory.dmp

    Filesize

    1.1MB

  • memory/2232-24-0x0000000076850000-0x0000000076960000-memory.dmp

    Filesize

    1.1MB

  • memory/2232-23-0x0000000076850000-0x0000000076960000-memory.dmp

    Filesize

    1.1MB

  • memory/2232-22-0x0000000076850000-0x0000000076960000-memory.dmp

    Filesize

    1.1MB

  • memory/2232-21-0x0000000076850000-0x0000000076960000-memory.dmp

    Filesize

    1.1MB

  • memory/2232-20-0x0000000076850000-0x0000000076960000-memory.dmp

    Filesize

    1.1MB

  • memory/2232-19-0x0000000076850000-0x0000000076960000-memory.dmp

    Filesize

    1.1MB

  • memory/2232-18-0x0000000076850000-0x0000000076960000-memory.dmp

    Filesize

    1.1MB

  • memory/2232-17-0x0000000076850000-0x0000000076960000-memory.dmp

    Filesize

    1.1MB

  • memory/2232-16-0x0000000076850000-0x0000000076960000-memory.dmp

    Filesize

    1.1MB

  • memory/2232-15-0x0000000076850000-0x0000000076960000-memory.dmp

    Filesize

    1.1MB

  • memory/2232-11-0x0000000076850000-0x0000000076960000-memory.dmp

    Filesize

    1.1MB

  • memory/2232-10-0x0000000076850000-0x0000000076960000-memory.dmp

    Filesize

    1.1MB

  • memory/2232-9-0x0000000076850000-0x0000000076960000-memory.dmp

    Filesize

    1.1MB

  • memory/2232-8-0x0000000076850000-0x0000000076960000-memory.dmp

    Filesize

    1.1MB

  • memory/2232-7-0x0000000076850000-0x0000000076960000-memory.dmp

    Filesize

    1.1MB

  • memory/2232-26-0x00000000010F0000-0x0000000002010000-memory.dmp

    Filesize

    15.1MB

  • memory/2232-27-0x00000000010F0000-0x0000000002010000-memory.dmp

    Filesize

    15.1MB

  • memory/2232-28-0x00000000010F0000-0x0000000002010000-memory.dmp

    Filesize

    15.1MB

  • memory/2232-29-0x0000000076861000-0x0000000076862000-memory.dmp

    Filesize

    4KB

  • memory/2232-30-0x0000000076850000-0x0000000076960000-memory.dmp

    Filesize

    1.1MB

  • memory/2232-31-0x0000000076850000-0x0000000076960000-memory.dmp

    Filesize

    1.1MB

  • memory/2232-32-0x0000000076850000-0x0000000076960000-memory.dmp

    Filesize

    1.1MB

  • memory/2232-34-0x0000000076850000-0x0000000076960000-memory.dmp

    Filesize

    1.1MB

  • memory/2232-35-0x0000000076850000-0x0000000076960000-memory.dmp

    Filesize

    1.1MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.