Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

13/02/2025, 01:26

250213-btppra1pcz 10

17/01/2025, 20:14

250117-yz7h3s1qfw 10

17/01/2025, 20:12

250117-yy9l2sslcr 10

17/01/2025, 17:25

250117-vy9p9sxpez 10

17/01/2025, 17:21

250117-vw8eesyjfp 10

17/01/2025, 14:16

250117-rk9ass1rhk 10

17/01/2025, 14:12

250117-rhv1ds1lds 10

16/01/2025, 12:52

250116-p4et7a1mez 10

Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20250113-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20250113-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    17/01/2025, 20:14

General

  • Target

    Malware-1-master/mo332.exe

  • Size

    14.0MB

  • MD5

    552326e3f16df1857e7918a569dcca50

  • SHA1

    3a3fd7027c65c75b3e8930535b27e29b4681814c

  • SHA256

    f5d20a2ef757dd374b1651a955a80113b33b87578e3484fd3589565d296d55cc

  • SHA512

    a3d00cc28de8131484ebe29d1addfc9e27c9e782a6ec07bee2a19c88ee3afe0f867f8c0c933b6a83946266d46606483d87c8d57b5679cafeeae09eeae1ba41f3

  • SSDEEP

    196608:OSfbf3vp28hgy4ohRID4CUAq52Zdm4nKJJmbmChthPtbSttLPSwYJQ:ffT3XhgQRI8C82ZP+MblGttLSpJQ

Malware Config

Signatures

  • UAC bypass 3 TTPs 2 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • Checks BIOS information in registry 2 TTPs 6 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 3 IoCs
  • Identifies Wine through registry keys 2 TTPs 2 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Drops file in Windows directory 11 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs
  • System policy modification 1 TTPs 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Malware-1-master\mo332.exe
    "C:\Users\Admin\AppData\Local\Temp\Malware-1-master\mo332.exe"
    1⤵
    • UAC bypass
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:2504
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c "C:\Windows\kfjrrveg\vpauhftihy.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3548
      • C:\Windows\kfjrrveg\vpauhftihy.exe
        C:\Windows\kfjrrveg\vpauhftihy.exe
        3⤵
        • UAC bypass
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Adds Run key to start application
        • Checks whether UAC is enabled
        • Drops file in System32 directory
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of WriteProcessMemory
        • System policy modification
        PID:2844
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c "C:\Windows\PLA\userplus.exe"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:640
          • C:\Windows\PLA\userplus.exe
            C:\Windows\PLA\userplus.exe
            5⤵
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Loads dropped DLL
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of SetWindowsHookEx
            PID:216

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Malware-1-master\Config.ini

    Filesize

    1KB

    MD5

    2db7a58f4892054c7077dab88fd68b86

    SHA1

    acf198a9160a872bc8633fc9185ad317e69bf2a4

    SHA256

    01701b302ab45f11729fac64ba33cd7b53abbc94963578d9813a1f5848e75618

    SHA512

    01926e211445f72f6637f7be04af33339f4acd78b3d2e8f4b6b4e0c28ea6c2662ea0aec976cc8a4f875ab1d12ca20eec7ebf59fe3704f76dc4adac3a0766511c

  • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2503671516-4119152987-701077851-1000\3310a4fa6cb9c60504498d7eea986fc2_7264cad5-f4a8-4395-bb28-e66de2b65256

    Filesize

    50B

    MD5

    45218adff3ea5bde8a8f61987f0f458b

    SHA1

    cf7fffa410795cc2f7703755f0acd17b51a44ad7

    SHA256

    f95361b82464704675f559b13c007c9567e5914984042f537122383e747194d4

    SHA512

    8442cac48931075ec5bd31ea82faffc4f64d7b6845d5c477d06fc3d7eefeac1fa366b6880a85709a520a343b5dd3771e69bc4b7482cde50e69e04215927a2018

  • C:\Windows\PLA\userplus.exe

    Filesize

    2.3MB

    MD5

    336cd9b9a8f4ce243c889407bcdcfa21

    SHA1

    4acf0664e7df5c87f9387bc7243b57050d7ce143

    SHA256

    c17d51aac55953b4ca8b3d8c4725528e1eef8f53ac78bd9bdda512daeb1cc3da

    SHA512

    033dd5bf02801ad34e6ea9b5571e9af74f5dc9e0aaf3b9f958a3052b0a579581da857269ddba3dd74f53e251dbcad396fba35ae5b4ae2d72e6e481b6eaa79fd0

  • C:\Windows\kfjrrveg\conf.ini

    Filesize

    4KB

    MD5

    61830234ea9c313c27d2891f333328f9

    SHA1

    95cc2252ea481dc7d54838cd67e35e387bc8eb79

    SHA256

    984f780ecbc97d108c0591f10acfb64866de14024626f07467d6c2d5156ed881

    SHA512

    dcce834d90c3fc9d25a5d2727d54e669b65629ffc84fc15b6fadac1b2534cd32d8b006afc086748b2a5d430ddfa95494561c5b2e7bd8d1ff3620e56fccebb921

  • C:\Windows\kfjrrveg\conf.ini

    Filesize

    4KB

    MD5

    c685dc1895bf128edc1c815ddc8d245b

    SHA1

    7d55c48b38844385ab3134bc60a88c4ba619b4bb

    SHA256

    083d4167ddbdcaddb02d6445447ec5604c5cab3ed39b105780287913aa553417

    SHA512

    ca9afa2c8b0fb9573dcb3d15e4d09890fcba0b5808de36309783436fb7d8303f95776dfc30930bc4993defb955e5c83e322f3a934351dd73434edb33a7717751

  • C:\Windows\kfjrrveg\vpauhftihy.exe

    Filesize

    6.7MB

    MD5

    9f1facb9f7dd07342a07b0856c5b48f2

    SHA1

    44a23fe809534a90b31ac0c290aee432edc542c2

    SHA256

    afbfdbfdda5fd42a6b4ea7b37f7222651e5461d8138355b9b233eba26766fa58

    SHA512

    868371102c2f4559b5316d85ce6ce197ad60566c9ea81c47707e57b64c5c2c5a18615d9918fee1fc1250996b86ba0a375bfa896f0b3145e9d451de046256745f

  • C:\Windows\system32\NlsLexicons00mmx.dll

    Filesize

    100KB

    MD5

    ca43974f638606af7259397a344e0434

    SHA1

    02b7cf6e2a7fd77f619e27c7584180a950aa7fe8

    SHA256

    4f394c128557a3f05c817aae8ddd005e2f462b298b858b1d49277fe574ce6752

    SHA512

    ab986229c156f1404895983399c64513cc13be3083309b9b61413024922fbf3322e203184e19bb5090c78b813a28362d345a1cb229e61e67d91dd803512a4786

  • C:\Windows\system32\NlsLexicons00ssx.dll

    Filesize

    67KB

    MD5

    b1a562ae50903a943e6e0884a7c3aa28

    SHA1

    57fcd5de222c7f99bd82372056127841fbc80e6e

    SHA256

    8402155eb3a3fb0fdc7ce7bbea87e8a59d81ae03e46d5d2ff041663d7051d3fc

    SHA512

    a1b7bcce916e80c2cf83029471f665bb0dfe411341c1817a0a3b0bdc758f24a45676b2b000890578320cbb6c4457ed23535188cff2d7fddcacedebcd8a414dab

  • memory/216-254-0x00007FF6E4910000-0x00007FF6E4F5B000-memory.dmp

    Filesize

    6.3MB

  • memory/216-216-0x00007FF6E4910000-0x00007FF6E4F5B000-memory.dmp

    Filesize

    6.3MB

  • memory/216-257-0x00007FF6E4910000-0x00007FF6E4F5B000-memory.dmp

    Filesize

    6.3MB

  • memory/216-224-0x00007FF6E4910000-0x00007FF6E4F5B000-memory.dmp

    Filesize

    6.3MB

  • memory/216-227-0x00007FF6E4910000-0x00007FF6E4F5B000-memory.dmp

    Filesize

    6.3MB

  • memory/216-200-0x00007FF6E4910000-0x00007FF6E4F5B000-memory.dmp

    Filesize

    6.3MB

  • memory/216-251-0x00007FF6E4910000-0x00007FF6E4F5B000-memory.dmp

    Filesize

    6.3MB

  • memory/216-205-0x00007FFB77F80000-0x00007FFB77F90000-memory.dmp

    Filesize

    64KB

  • memory/216-248-0x00007FF6E4910000-0x00007FF6E4F5B000-memory.dmp

    Filesize

    6.3MB

  • memory/216-230-0x00007FF6E4910000-0x00007FF6E4F5B000-memory.dmp

    Filesize

    6.3MB

  • memory/216-245-0x00007FF6E4910000-0x00007FF6E4F5B000-memory.dmp

    Filesize

    6.3MB

  • memory/216-233-0x00007FF6E4910000-0x00007FF6E4F5B000-memory.dmp

    Filesize

    6.3MB

  • memory/216-242-0x00007FF6E4910000-0x00007FF6E4F5B000-memory.dmp

    Filesize

    6.3MB

  • memory/216-221-0x00007FF6E4910000-0x00007FF6E4F5B000-memory.dmp

    Filesize

    6.3MB

  • memory/216-236-0x00007FF6E4910000-0x00007FF6E4F5B000-memory.dmp

    Filesize

    6.3MB

  • memory/216-239-0x00007FF6E4910000-0x00007FF6E4F5B000-memory.dmp

    Filesize

    6.3MB

  • memory/2504-255-0x0000000000EB0000-0x0000000001F74000-memory.dmp

    Filesize

    16.8MB

  • memory/2504-25-0x0000000000EB0000-0x0000000001F74000-memory.dmp

    Filesize

    16.8MB

  • memory/2504-55-0x00000000057C0000-0x00000000057C1000-memory.dmp

    Filesize

    4KB

  • memory/2504-237-0x0000000000EB0000-0x0000000001F74000-memory.dmp

    Filesize

    16.8MB

  • memory/2504-240-0x0000000000EB0000-0x0000000001F74000-memory.dmp

    Filesize

    16.8MB

  • memory/2504-234-0x0000000000EB0000-0x0000000001F74000-memory.dmp

    Filesize

    16.8MB

  • memory/2504-0-0x0000000000EB0000-0x0000000001F74000-memory.dmp

    Filesize

    16.8MB

  • memory/2504-243-0x0000000000EB0000-0x0000000001F74000-memory.dmp

    Filesize

    16.8MB

  • memory/2504-231-0x0000000000EB0000-0x0000000001F74000-memory.dmp

    Filesize

    16.8MB

  • memory/2504-246-0x0000000000EB0000-0x0000000001F74000-memory.dmp

    Filesize

    16.8MB

  • memory/2504-249-0x0000000000EB0000-0x0000000001F74000-memory.dmp

    Filesize

    16.8MB

  • memory/2504-252-0x0000000000EB0000-0x0000000001F74000-memory.dmp

    Filesize

    16.8MB

  • memory/2504-27-0x0000000000EB0000-0x0000000001F74000-memory.dmp

    Filesize

    16.8MB

  • memory/2504-54-0x00000000056E0000-0x00000000056E1000-memory.dmp

    Filesize

    4KB

  • memory/2504-22-0x0000000000EB0000-0x0000000001F74000-memory.dmp

    Filesize

    16.8MB

  • memory/2504-211-0x0000000000EB0000-0x0000000001F74000-memory.dmp

    Filesize

    16.8MB

  • memory/2504-212-0x0000000000EB0000-0x0000000001F74000-memory.dmp

    Filesize

    16.8MB

  • memory/2504-213-0x0000000000EB0000-0x0000000001F74000-memory.dmp

    Filesize

    16.8MB

  • memory/2504-228-0x0000000000EB0000-0x0000000001F74000-memory.dmp

    Filesize

    16.8MB

  • memory/2504-6-0x0000000000EB0000-0x0000000001F74000-memory.dmp

    Filesize

    16.8MB

  • memory/2504-2-0x0000000000EB1000-0x0000000000ECD000-memory.dmp

    Filesize

    112KB

  • memory/2504-217-0x0000000000EB0000-0x0000000001F74000-memory.dmp

    Filesize

    16.8MB

  • memory/2504-225-0x0000000000EB0000-0x0000000001F74000-memory.dmp

    Filesize

    16.8MB

  • memory/2504-219-0x0000000005850000-0x0000000005851000-memory.dmp

    Filesize

    4KB

  • memory/2504-220-0x0000000005810000-0x0000000005811000-memory.dmp

    Filesize

    4KB

  • memory/2504-1-0x0000000077CB5000-0x0000000077CB7000-memory.dmp

    Filesize

    8KB

  • memory/2504-222-0x0000000000EB0000-0x0000000001F74000-memory.dmp

    Filesize

    16.8MB

  • memory/2844-39-0x0000000005180000-0x0000000005181000-memory.dmp

    Filesize

    4KB

  • memory/2844-223-0x0000000000210000-0x0000000000BC6000-memory.dmp

    Filesize

    9.7MB

  • memory/2844-218-0x0000000000210000-0x0000000000BC6000-memory.dmp

    Filesize

    9.7MB

  • memory/2844-226-0x0000000000210000-0x0000000000BC6000-memory.dmp

    Filesize

    9.7MB

  • memory/2844-215-0x0000000000210000-0x0000000000BC6000-memory.dmp

    Filesize

    9.7MB

  • memory/2844-214-0x0000000000210000-0x0000000000BC6000-memory.dmp

    Filesize

    9.7MB

  • memory/2844-229-0x0000000000210000-0x0000000000BC6000-memory.dmp

    Filesize

    9.7MB

  • memory/2844-192-0x0000000005070000-0x0000000005071000-memory.dmp

    Filesize

    4KB

  • memory/2844-193-0x0000000005090000-0x0000000005091000-memory.dmp

    Filesize

    4KB

  • memory/2844-232-0x0000000000210000-0x0000000000BC6000-memory.dmp

    Filesize

    9.7MB

  • memory/2844-194-0x00000000050B0000-0x00000000050B1000-memory.dmp

    Filesize

    4KB

  • memory/2844-58-0x00000000050A0000-0x00000000050A1000-memory.dmp

    Filesize

    4KB

  • memory/2844-235-0x0000000000210000-0x0000000000BC6000-memory.dmp

    Filesize

    9.7MB

  • memory/2844-59-0x0000000005060000-0x0000000005061000-memory.dmp

    Filesize

    4KB

  • memory/2844-57-0x0000000005150000-0x0000000005151000-memory.dmp

    Filesize

    4KB

  • memory/2844-238-0x0000000000210000-0x0000000000BC6000-memory.dmp

    Filesize

    9.7MB

  • memory/2844-56-0x0000000000210000-0x0000000000BC6000-memory.dmp

    Filesize

    9.7MB

  • memory/2844-38-0x0000000005110000-0x0000000005111000-memory.dmp

    Filesize

    4KB

  • memory/2844-241-0x0000000000210000-0x0000000000BC6000-memory.dmp

    Filesize

    9.7MB

  • memory/2844-50-0x0000000000210000-0x0000000000BC6000-memory.dmp

    Filesize

    9.7MB

  • memory/2844-40-0x0000000005160000-0x0000000005162000-memory.dmp

    Filesize

    8KB

  • memory/2844-244-0x0000000000210000-0x0000000000BC6000-memory.dmp

    Filesize

    9.7MB

  • memory/2844-41-0x0000000005170000-0x0000000005171000-memory.dmp

    Filesize

    4KB

  • memory/2844-42-0x0000000005100000-0x0000000005101000-memory.dmp

    Filesize

    4KB

  • memory/2844-247-0x0000000000210000-0x0000000000BC6000-memory.dmp

    Filesize

    9.7MB

  • memory/2844-43-0x00000000050E0000-0x00000000050E1000-memory.dmp

    Filesize

    4KB

  • memory/2844-44-0x0000000005130000-0x0000000005131000-memory.dmp

    Filesize

    4KB

  • memory/2844-250-0x0000000000210000-0x0000000000BC6000-memory.dmp

    Filesize

    9.7MB

  • memory/2844-45-0x0000000005080000-0x0000000005082000-memory.dmp

    Filesize

    8KB

  • memory/2844-46-0x0000000005140000-0x0000000005141000-memory.dmp

    Filesize

    4KB

  • memory/2844-253-0x0000000000210000-0x0000000000BC6000-memory.dmp

    Filesize

    9.7MB

  • memory/2844-47-0x00000000050D0000-0x00000000050D1000-memory.dmp

    Filesize

    4KB

  • memory/2844-48-0x0000000005190000-0x0000000005191000-memory.dmp

    Filesize

    4KB

  • memory/2844-256-0x0000000000210000-0x0000000000BC6000-memory.dmp

    Filesize

    9.7MB

  • memory/2844-49-0x0000000000211000-0x0000000000239000-memory.dmp

    Filesize

    160KB