Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    140s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/03/2025, 00:44

General

  • Target

    Cryptic Ware Perm.exe

  • Size

    4.4MB

  • MD5

    609bd04323c87ac5b9ef563bb517508d

  • SHA1

    4bd292594f7e3867a3ae62f19b8a5728fb541aad

  • SHA256

    f62d4ee2fb48f64e69bfbc3c2a467245da06b67feafe3fec54e4e80f5b32b350

  • SHA512

    1e49def2e8c824a5bb9de3df1dec5a08a4a00cc988f3120d526e7ebfa261c937839b4318b7c3e8abba254946fd349531771d3d1c27295c3f9be97444e82a8e59

  • SSDEEP

    98304:VbQ0IUsAcJNoQNUxyses8FmyqU2Yv35Dl6duhUt:VV+J2SUTmqUX9lHit

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Themida packer 4 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Cryptic Ware Perm.exe
    "C:\Users\Admin\AppData\Local\Temp\Cryptic Ware Perm.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    PID:6044

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/6044-0-0x0000000140000000-0x0000000140BBF000-memory.dmp

    Filesize

    11.7MB

  • memory/6044-1-0x00007FFB4E5D0000-0x00007FFB4E5D2000-memory.dmp

    Filesize

    8KB

  • memory/6044-2-0x0000000140000000-0x0000000140BBF000-memory.dmp

    Filesize

    11.7MB

  • memory/6044-3-0x0000000140000000-0x0000000140BBF000-memory.dmp

    Filesize

    11.7MB

  • memory/6044-4-0x0000000140000000-0x0000000140BBF000-memory.dmp

    Filesize

    11.7MB