Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03/01/2025, 14:01
Static task
static1
Behavioral task
behavioral1
Sample
ad5abae92c52f988a942ad0c899d37e08bf289da54461e0772a2d02dc98665e7N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ad5abae92c52f988a942ad0c899d37e08bf289da54461e0772a2d02dc98665e7N.exe
Resource
win10v2004-20241007-en
General
-
Target
ad5abae92c52f988a942ad0c899d37e08bf289da54461e0772a2d02dc98665e7N.exe
-
Size
3.1MB
-
MD5
51689aa36665dae2c30193725ab9e3c0
-
SHA1
d9820f5f8ca72c7a887b6290d41596c1a30a79a0
-
SHA256
ad5abae92c52f988a942ad0c899d37e08bf289da54461e0772a2d02dc98665e7
-
SHA512
5c8dee0fc069747b3781304888ab094b0db52b042ca847b0ead6177ad1141bb25036b9c6f0a92a701c8c788aea11cf3891f855ddcdc4f519146204ecff64e4f1
-
SSDEEP
49152:RVvn8Q5CHCtE4jPTTm4uBLq9gtMyMpy7nEvV47RIgompnfMNJO:RF8QUitE4iLqaPWGnEvK7RCO
Malware Config
Signatures
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Banload family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ad5abae92c52f988a942ad0c899d37e08bf289da54461e0772a2d02dc98665e7N.exe -
Renames multiple (214) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ad5abae92c52f988a942ad0c899d37e08bf289da54461e0772a2d02dc98665e7N.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate ad5abae92c52f988a942ad0c899d37e08bf289da54461e0772a2d02dc98665e7N.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\7-Zip\Lang\en.ttt.tmp ad5abae92c52f988a942ad0c899d37e08bf289da54461e0772a2d02dc98665e7N.exe File created C:\Program Files\7-Zip\Lang\hr.txt.tmp ad5abae92c52f988a942ad0c899d37e08bf289da54461e0772a2d02dc98665e7N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\InkWatson.exe.mui.tmp ad5abae92c52f988a942ad0c899d37e08bf289da54461e0772a2d02dc98665e7N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\FlickLearningWizard.exe.mui.tmp ad5abae92c52f988a942ad0c899d37e08bf289da54461e0772a2d02dc98665e7N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\zh-dayi.xml.tmp ad5abae92c52f988a942ad0c899d37e08bf289da54461e0772a2d02dc98665e7N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\tabskb.dll.mui.tmp ad5abae92c52f988a942ad0c899d37e08bf289da54461e0772a2d02dc98665e7N.exe File created C:\Program Files\7-Zip\Lang\sw.txt.tmp ad5abae92c52f988a942ad0c899d37e08bf289da54461e0772a2d02dc98665e7N.exe File created C:\Program Files\7-Zip\Lang\th.txt.tmp ad5abae92c52f988a942ad0c899d37e08bf289da54461e0772a2d02dc98665e7N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\tipresx.dll.mui.tmp ad5abae92c52f988a942ad0c899d37e08bf289da54461e0772a2d02dc98665e7N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\FlickLearningWizard.exe.mui.tmp ad5abae92c52f988a942ad0c899d37e08bf289da54461e0772a2d02dc98665e7N.exe File created C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\msinfo32.exe.mui.tmp ad5abae92c52f988a942ad0c899d37e08bf289da54461e0772a2d02dc98665e7N.exe File created C:\Program Files\7-Zip\Lang\de.txt.tmp ad5abae92c52f988a942ad0c899d37e08bf289da54461e0772a2d02dc98665e7N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\hwrespsh.dat.tmp ad5abae92c52f988a942ad0c899d37e08bf289da54461e0772a2d02dc98665e7N.exe File created C:\Program Files\7-Zip\Lang\nn.txt.tmp ad5abae92c52f988a942ad0c899d37e08bf289da54461e0772a2d02dc98665e7N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\TipBand.dll.mui.tmp ad5abae92c52f988a942ad0c899d37e08bf289da54461e0772a2d02dc98665e7N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\en-US\InkObj.dll.mui.tmp ad5abae92c52f988a942ad0c899d37e08bf289da54461e0772a2d02dc98665e7N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\ko-kr.xml.tmp ad5abae92c52f988a942ad0c899d37e08bf289da54461e0772a2d02dc98665e7N.exe File created C:\Program Files\7-Zip\7-zip.chm.tmp ad5abae92c52f988a942ad0c899d37e08bf289da54461e0772a2d02dc98665e7N.exe File created C:\Program Files\7-Zip\Lang\nb.txt.tmp ad5abae92c52f988a942ad0c899d37e08bf289da54461e0772a2d02dc98665e7N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\InkWatson.exe.mui.tmp ad5abae92c52f988a942ad0c899d37e08bf289da54461e0772a2d02dc98665e7N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\IPSEventLogMsg.dll.mui.tmp ad5abae92c52f988a942ad0c899d37e08bf289da54461e0772a2d02dc98665e7N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\TipBand.dll.mui.tmp ad5abae92c52f988a942ad0c899d37e08bf289da54461e0772a2d02dc98665e7N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\tabskb.dll.tmp ad5abae92c52f988a942ad0c899d37e08bf289da54461e0772a2d02dc98665e7N.exe File created C:\Program Files\Common Files\Microsoft Shared\Stationery\Connectivity.gif.tmp ad5abae92c52f988a942ad0c899d37e08bf289da54461e0772a2d02dc98665e7N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\InputPersonalization.exe.mui.tmp ad5abae92c52f988a942ad0c899d37e08bf289da54461e0772a2d02dc98665e7N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\ShapeCollector.exe.mui.tmp ad5abae92c52f988a942ad0c899d37e08bf289da54461e0772a2d02dc98665e7N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\micaut.dll.mui.tmp ad5abae92c52f988a942ad0c899d37e08bf289da54461e0772a2d02dc98665e7N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\tabskb.dll.mui.tmp ad5abae92c52f988a942ad0c899d37e08bf289da54461e0772a2d02dc98665e7N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\hwrusalm.dat.tmp ad5abae92c52f988a942ad0c899d37e08bf289da54461e0772a2d02dc98665e7N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\ja-jp-sym.xml.tmp ad5abae92c52f988a942ad0c899d37e08bf289da54461e0772a2d02dc98665e7N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\hwruklm.dat.tmp ad5abae92c52f988a942ad0c899d37e08bf289da54461e0772a2d02dc98665e7N.exe File created C:\Program Files\7-Zip\Lang\sr-spc.txt.tmp ad5abae92c52f988a942ad0c899d37e08bf289da54461e0772a2d02dc98665e7N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\tiptsf.dll.tmp ad5abae92c52f988a942ad0c899d37e08bf289da54461e0772a2d02dc98665e7N.exe File created C:\Program Files\Common Files\Microsoft Shared\Stationery\OrangeCircles.jpg.tmp ad5abae92c52f988a942ad0c899d37e08bf289da54461e0772a2d02dc98665e7N.exe File created C:\Program Files\7-Zip\Lang\gl.txt.tmp ad5abae92c52f988a942ad0c899d37e08bf289da54461e0772a2d02dc98665e7N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\hwrenclm.dat.tmp ad5abae92c52f988a942ad0c899d37e08bf289da54461e0772a2d02dc98665e7N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\IPSEventLogMsg.dll.mui.tmp ad5abae92c52f988a942ad0c899d37e08bf289da54461e0772a2d02dc98665e7N.exe File created C:\Program Files\7-Zip\7-zip.dll.tmp ad5abae92c52f988a942ad0c899d37e08bf289da54461e0772a2d02dc98665e7N.exe File created C:\Program Files\7-Zip\Lang\bn.txt.tmp ad5abae92c52f988a942ad0c899d37e08bf289da54461e0772a2d02dc98665e7N.exe File created C:\Program Files\7-Zip\Lang\pt-br.txt.tmp ad5abae92c52f988a942ad0c899d37e08bf289da54461e0772a2d02dc98665e7N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web.xml.tmp ad5abae92c52f988a942ad0c899d37e08bf289da54461e0772a2d02dc98665e7N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\ipsrom.xml.tmp ad5abae92c52f988a942ad0c899d37e08bf289da54461e0772a2d02dc98665e7N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\ea.xml.tmp ad5abae92c52f988a942ad0c899d37e08bf289da54461e0772a2d02dc98665e7N.exe File created C:\Program Files\7-Zip\Lang\co.txt.tmp ad5abae92c52f988a942ad0c899d37e08bf289da54461e0772a2d02dc98665e7N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\TipBand.dll.mui.tmp ad5abae92c52f988a942ad0c899d37e08bf289da54461e0772a2d02dc98665e7N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\base_kor.xml.tmp ad5abae92c52f988a942ad0c899d37e08bf289da54461e0772a2d02dc98665e7N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\ipsrus.xml.tmp ad5abae92c52f988a942ad0c899d37e08bf289da54461e0772a2d02dc98665e7N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\webbase.xml.tmp ad5abae92c52f988a942ad0c899d37e08bf289da54461e0772a2d02dc98665e7N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\hwresslm.dat.tmp ad5abae92c52f988a942ad0c899d37e08bf289da54461e0772a2d02dc98665e7N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\ipshrv.xml.tmp ad5abae92c52f988a942ad0c899d37e08bf289da54461e0772a2d02dc98665e7N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\ipsesp.xml.tmp ad5abae92c52f988a942ad0c899d37e08bf289da54461e0772a2d02dc98665e7N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\ShapeCollector.exe.tmp ad5abae92c52f988a942ad0c899d37e08bf289da54461e0772a2d02dc98665e7N.exe File created C:\Program Files\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE.tmp ad5abae92c52f988a942ad0c899d37e08bf289da54461e0772a2d02dc98665e7N.exe File created C:\Program Files\7-Zip\7z.sfx.tmp ad5abae92c52f988a942ad0c899d37e08bf289da54461e0772a2d02dc98665e7N.exe File created C:\Program Files\7-Zip\Lang\uz.txt.tmp ad5abae92c52f988a942ad0c899d37e08bf289da54461e0772a2d02dc98665e7N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\tipresx.dll.mui.tmp ad5abae92c52f988a942ad0c899d37e08bf289da54461e0772a2d02dc98665e7N.exe File created C:\Program Files\7-Zip\Lang\ast.txt.tmp ad5abae92c52f988a942ad0c899d37e08bf289da54461e0772a2d02dc98665e7N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred.xml.tmp ad5abae92c52f988a942ad0c899d37e08bf289da54461e0772a2d02dc98665e7N.exe File created C:\Program Files\7-Zip\descript.ion.tmp ad5abae92c52f988a942ad0c899d37e08bf289da54461e0772a2d02dc98665e7N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\InputPersonalization.exe.mui.tmp ad5abae92c52f988a942ad0c899d37e08bf289da54461e0772a2d02dc98665e7N.exe File created C:\Program Files\Common Files\Microsoft Shared\Stationery\GreenBubbles.jpg.tmp ad5abae92c52f988a942ad0c899d37e08bf289da54461e0772a2d02dc98665e7N.exe File created C:\Program Files\Common Files\Microsoft Shared\MSInfo\msinfo32.exe.tmp ad5abae92c52f988a942ad0c899d37e08bf289da54461e0772a2d02dc98665e7N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\base_altgr.xml.tmp ad5abae92c52f988a942ad0c899d37e08bf289da54461e0772a2d02dc98665e7N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\hwrdeslm.dat.tmp ad5abae92c52f988a942ad0c899d37e08bf289da54461e0772a2d02dc98665e7N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ad5abae92c52f988a942ad0c899d37e08bf289da54461e0772a2d02dc98665e7N.exe -
Modifies registry class 10 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\InprocServer32\ = "%CommonProgramFiles(x86)%\\Microsoft Shared\\DAO\\dao360.dll" ad5abae92c52f988a942ad0c899d37e08bf289da54461e0772a2d02dc98665e7N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\InprocServer32\Class = "dao.IndexClass" ad5abae92c52f988a942ad0c899d37e08bf289da54461e0772a2d02dc98665e7N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\InprocServer32\ThreadingModel = "Apartment" ad5abae92c52f988a942ad0c899d37e08bf289da54461e0772a2d02dc98665e7N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\ProgID\ = "DAO.Index.36" ad5abae92c52f988a942ad0c899d37e08bf289da54461e0772a2d02dc98665e7N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2} ad5abae92c52f988a942ad0c899d37e08bf289da54461e0772a2d02dc98665e7N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\ = "DAO.Index.36" ad5abae92c52f988a942ad0c899d37e08bf289da54461e0772a2d02dc98665e7N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\InprocServer32 ad5abae92c52f988a942ad0c899d37e08bf289da54461e0772a2d02dc98665e7N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\InprocServer32\Assembly = "dao, Version=10.0.4504.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35" ad5abae92c52f988a942ad0c899d37e08bf289da54461e0772a2d02dc98665e7N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\InprocServer32\RuntimeVersion = "v1.0.3705" ad5abae92c52f988a942ad0c899d37e08bf289da54461e0772a2d02dc98665e7N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\ProgID ad5abae92c52f988a942ad0c899d37e08bf289da54461e0772a2d02dc98665e7N.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 2132 ad5abae92c52f988a942ad0c899d37e08bf289da54461e0772a2d02dc98665e7N.exe Token: SeIncBasePriorityPrivilege 2132 ad5abae92c52f988a942ad0c899d37e08bf289da54461e0772a2d02dc98665e7N.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad5abae92c52f988a942ad0c899d37e08bf289da54461e0772a2d02dc98665e7N.exe"C:\Users\Admin\AppData\Local\Temp\ad5abae92c52f988a942ad0c899d37e08bf289da54461e0772a2d02dc98665e7N.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2132
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.2MB
MD5f81a66bb74a3372ddbdfc1d3ee386565
SHA1c13142e8f1278dba5d3adbc4d50313f3de776583
SHA25622f2060df6ad5d4663ad4b90d03b2d93c79fb4bc5c72c7e0d45ea7e753de886f
SHA5126c6742b246db2a1bc1cee800d5e654b11d879f70f3def012db816340776db46ca089fc9573c9d7d42e499b6aed7d4e4b8ba89dfb0a6f97c38209a96bdbda4085
-
Filesize
3.2MB
MD5eddbdbf83a346044ed03549a5bf52a00
SHA109d0f2987ca8adfff94b627513764f129a6c9f93
SHA25653c4e72c02990d5a5049bac60cdb2367c208b93c97436255ce3092d0a6413f62
SHA51275db7eecc0c4a928140b92ec6aea8b956a100be97b82efcce75d36fa887960c339dc830c18dbbc3b11617e5741d0366783f0e730db525e5dc249ef588a8f330a