Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
22/03/2025, 00:44
Behavioral task
behavioral1
Sample
Cryptic Ware Perm.exe
Resource
win7-20240903-en
15 signatures
150 seconds
Behavioral task
behavioral2
Sample
Cryptic Ware Perm.exe
Resource
win10v2004-20250314-en
5 signatures
150 seconds
General
-
Target
Cryptic Ware Perm.exe
-
Size
4.4MB
-
MD5
609bd04323c87ac5b9ef563bb517508d
-
SHA1
4bd292594f7e3867a3ae62f19b8a5728fb541aad
-
SHA256
f62d4ee2fb48f64e69bfbc3c2a467245da06b67feafe3fec54e4e80f5b32b350
-
SHA512
1e49def2e8c824a5bb9de3df1dec5a08a4a00cc988f3120d526e7ebfa261c937839b4318b7c3e8abba254946fd349531771d3d1c27295c3f9be97444e82a8e59
-
SSDEEP
98304:VbQ0IUsAcJNoQNUxyses8FmyqU2Yv35Dl6duhUt:VV+J2SUTmqUX9lHit
Score
9/10
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Cryptic Ware Perm.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Cryptic Ware Perm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Cryptic Ware Perm.exe -
resource yara_rule behavioral2/memory/6044-0-0x0000000140000000-0x0000000140BBF000-memory.dmp themida behavioral2/memory/6044-2-0x0000000140000000-0x0000000140BBF000-memory.dmp themida behavioral2/memory/6044-3-0x0000000140000000-0x0000000140BBF000-memory.dmp themida behavioral2/memory/6044-4-0x0000000140000000-0x0000000140BBF000-memory.dmp themida -
Checks whether UAC is enabled 1 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Cryptic Ware Perm.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 6044 Cryptic Ware Perm.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Cryptic Ware Perm.exe"C:\Users\Admin\AppData\Local\Temp\Cryptic Ware Perm.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:6044