Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    176s
  • max time network
    216s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/12/2022, 04:02

General

  • Target

    d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0.exe

  • Size

    469KB

  • MD5

    063b50add44b866d8614ce34bb6c1200

  • SHA1

    99705620cd8a111d14c61cbc4cd3beccc3293877

  • SHA256

    d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0

  • SHA512

    5470a2da68bff69321542d994150bb03f117100387b45aade5aa500f12c7cfb5a1e0d81cfbd95b50854993776ef5847bf7283a6c591edd20e3fe0383f7675def

  • SSDEEP

    12288:MEnCBHbmPATrvC4e5gK2b7kZGuqEwxq+YH:tZL15f2bQZG0aq+YH

Score
8/10

Malware Config

Signatures

  • Adds policy Run key to start application 2 TTPs 4 IoCs
  • Drops file in Drivers directory 4 IoCs
  • Executes dropped EXE 18 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Modifies data under HKEY_USERS 11 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0.exe
    "C:\Users\Admin\AppData\Local\Temp\d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0.exe"
    1⤵
    • Adds policy Run key to start application
    • Drops file in Drivers directory
    • Adds Run key to start application
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of WriteProcessMemory
    PID:3452
    • C:\Windows\System\rsvp.exe
      C:\Windows\System\rsvp.exe /c 88
      2⤵
      • Executes dropped EXE
      PID:4972
    • C:\Windows\SysWOW64\drivers\lsm.exe
      C:\Windows\System32\drivers\lsm.exe /c 92
      2⤵
      • Executes dropped EXE
      PID:3460
    • C:\Users\Admin\AppData\Roaming\MICROS~1\dllhost.exe
      C:\Users\Admin\AppData\Roaming\MICROS~1\dllhost.exe /c 56
      2⤵
      • Executes dropped EXE
      PID:3572
    • C:\Users\Admin\Local Settings\Application Data\Microsoft\spoolsv.exe
      "C:\Users\Admin\Local Settings\Application Data\Microsoft\spoolsv.exe" /c 61
      2⤵
      • Executes dropped EXE
      PID:1216
    • C:\Users\Admin\AppData\Roaming\MICROS~1\clipsrv.exe
      C:\Users\Admin\AppData\Roaming\MICROS~1\clipsrv.exe /c 44
      2⤵
      • Executes dropped EXE
      PID:1828
    • C:\Users\Admin\AppData\Roaming\MICROS~1\rsvp.exe
      C:\Users\Admin\AppData\Roaming\MICROS~1\rsvp.exe /c 85
      2⤵
      • Executes dropped EXE
      PID:4868
    • C:\Windows\SysWOW64\drivers\mqtgsvc.exe
      C:\Windows\System32\drivers\mqtgsvc.exe /c 43
      2⤵
      • Executes dropped EXE
      PID:4136
    • C:\Users\Admin\Local Settings\Application Data\Microsoft\Windows\rsvp.exe
      "C:\Users\Admin\Local Settings\Application Data\Microsoft\Windows\rsvp.exe" /c 51
      2⤵
      • Executes dropped EXE
      PID:3136
    • C:\Windows\System\rsvp.exe
      C:\Windows\System\rsvp.exe /c 5
      2⤵
      • Executes dropped EXE
      PID:312
    • C:\Windows\System\rsvp.exe
      C:\Windows\System\rsvp.exe /r
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3124
      • C:\Windows\System\rsvp.exe
        C:\Windows\System\rsvp.exe /c 13
        3⤵
        • Executes dropped EXE
        PID:1516
      • C:\Windows\SysWOW64\drivers\lsm.exe
        C:\Windows\System32\drivers\lsm.exe /c 5
        3⤵
        • Executes dropped EXE
        PID:2152
      • C:\Users\Admin\AppData\Roaming\MICROS~1\dllhost.exe
        C:\Users\Admin\AppData\Roaming\MICROS~1\dllhost.exe /c 89
        3⤵
        • Executes dropped EXE
        PID:1456
      • C:\Users\Admin\Local Settings\Application Data\Microsoft\spoolsv.exe
        "C:\Users\Admin\Local Settings\Application Data\Microsoft\spoolsv.exe" /c 50
        3⤵
        • Executes dropped EXE
        PID:4256
      • C:\Users\Admin\AppData\Roaming\MICROS~1\clipsrv.exe
        C:\Users\Admin\AppData\Roaming\MICROS~1\clipsrv.exe /c 63
        3⤵
        • Executes dropped EXE
        PID:3340
      • C:\Users\Admin\AppData\Roaming\MICROS~1\rsvp.exe
        C:\Users\Admin\AppData\Roaming\MICROS~1\rsvp.exe /c 59
        3⤵
        • Executes dropped EXE
        PID:772
      • C:\Windows\SysWOW64\drivers\mqtgsvc.exe
        C:\Windows\System32\drivers\mqtgsvc.exe /c 36
        3⤵
        • Executes dropped EXE
        PID:3592
      • C:\Users\Admin\Local Settings\Application Data\Microsoft\Windows\rsvp.exe
        "C:\Users\Admin\Local Settings\Application Data\Microsoft\Windows\rsvp.exe" /c 67
        3⤵
        • Executes dropped EXE
        PID:4880

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\rsvp.exe

    Filesize

    469KB

    MD5

    7acce1b8aace21c27dbe0ec2ec927010

    SHA1

    f14afbec79b387eafb50d433c058626c472e7121

    SHA256

    f0a49963ef2f0c42f50891a72475d9c55bdfaf962110d12bc0470372c9454f84

    SHA512

    f407143fe28370e3b30e031fda6be8b9992909c726ef527ab7801551ba6daddcf7ab3829482a354d785609662b1802af7fe9b3cb7a97dfcd791a421f55bacb82

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\rsvp.exe

    Filesize

    469KB

    MD5

    7acce1b8aace21c27dbe0ec2ec927010

    SHA1

    f14afbec79b387eafb50d433c058626c472e7121

    SHA256

    f0a49963ef2f0c42f50891a72475d9c55bdfaf962110d12bc0470372c9454f84

    SHA512

    f407143fe28370e3b30e031fda6be8b9992909c726ef527ab7801551ba6daddcf7ab3829482a354d785609662b1802af7fe9b3cb7a97dfcd791a421f55bacb82

  • C:\Users\Admin\AppData\Local\Microsoft\spoolsv.exe

    Filesize

    469KB

    MD5

    3ed52469b828ef1e943155b3406baab1

    SHA1

    8d88b98cc4659ecf7c070c010d0f7ba1fc9161f4

    SHA256

    70d77cf7d480e6a88756248451e35350308edaab1b312243cdf2c8bfe3b4e2e6

    SHA512

    329dc5cfb9918426fe237b53ade4e5651a3632ee2b639c7e552f8afd394d2883b01bd697a02fcae9d2e3f7fc2eed6fe586fcffbe12127ede7f0d51e5fd8f9fa4

  • C:\Users\Admin\AppData\Local\Microsoft\spoolsv.exe

    Filesize

    469KB

    MD5

    3ed52469b828ef1e943155b3406baab1

    SHA1

    8d88b98cc4659ecf7c070c010d0f7ba1fc9161f4

    SHA256

    70d77cf7d480e6a88756248451e35350308edaab1b312243cdf2c8bfe3b4e2e6

    SHA512

    329dc5cfb9918426fe237b53ade4e5651a3632ee2b639c7e552f8afd394d2883b01bd697a02fcae9d2e3f7fc2eed6fe586fcffbe12127ede7f0d51e5fd8f9fa4

  • C:\Users\Admin\AppData\Local\Temp\Twain002.Mtx

    Filesize

    10B

    MD5

    5a75adb761cacfc31fb569a9fd76b16e

    SHA1

    ab02bb5f79d3eb0879f757f6a6c2a87ba2a9c3cb

    SHA256

    1f87264f616a3dd5290ba0be58aec598ab38e47d5bb2bf04ec2efaf02be9bea2

    SHA512

    39f4602682c2d68fcc04a5a38208fb9817c795579dc58de85c92d9cd7181ef9aef83dac04fb8e2248cec11e4334e34a9fa45c62a97ee93f65099f85945f39fbf

  • C:\Users\Admin\AppData\Roaming\MICROS~1\clipsrv.exe

    Filesize

    469KB

    MD5

    2f086aaaf3fdaf7f7fd9cccf67b2d316

    SHA1

    b22836dfbe37257801a72d1729c779234155c7ab

    SHA256

    ca370ff2463964b8ed3eb69eab9f1fe786b6c6f148c3689ba4fde5b3269a2226

    SHA512

    22e724bdc1c92734a80a70cd6ba100678dbad08031a59545e893bc8da646a2d5db417aa1e364ab8f4a6827027501cf915ce5d42d999d780faa1221c99f78e730

  • C:\Users\Admin\AppData\Roaming\MICROS~1\dllhost.exe

    Filesize

    469KB

    MD5

    3c09386d95d4359a6bf73a4a46b8c038

    SHA1

    fa86548194d569dc1ee43adbf5519e0897732036

    SHA256

    7c6f8b737586e3cbc72b5bf685b2eb05e37985304fdc1d360a082b8aacf48091

    SHA512

    994c8f2bb3dd49ed2e6ec805be6fe4b2e1eb0d3f2629672f19fd326823f033f9034b1e4a82e9888a48158d9c7fadf14dc396d5f2d6d4d8b3a3fd74d7b9c16a71

  • C:\Users\Admin\AppData\Roaming\MICROS~1\rsvp.exe

    Filesize

    469KB

    MD5

    7acce1b8aace21c27dbe0ec2ec927010

    SHA1

    f14afbec79b387eafb50d433c058626c472e7121

    SHA256

    f0a49963ef2f0c42f50891a72475d9c55bdfaf962110d12bc0470372c9454f84

    SHA512

    f407143fe28370e3b30e031fda6be8b9992909c726ef527ab7801551ba6daddcf7ab3829482a354d785609662b1802af7fe9b3cb7a97dfcd791a421f55bacb82

  • C:\Users\Admin\AppData\Roaming\Microsoft\clipsrv.exe

    Filesize

    469KB

    MD5

    2f086aaaf3fdaf7f7fd9cccf67b2d316

    SHA1

    b22836dfbe37257801a72d1729c779234155c7ab

    SHA256

    ca370ff2463964b8ed3eb69eab9f1fe786b6c6f148c3689ba4fde5b3269a2226

    SHA512

    22e724bdc1c92734a80a70cd6ba100678dbad08031a59545e893bc8da646a2d5db417aa1e364ab8f4a6827027501cf915ce5d42d999d780faa1221c99f78e730

  • C:\Users\Admin\AppData\Roaming\Microsoft\clipsrv.exe

    Filesize

    469KB

    MD5

    2f086aaaf3fdaf7f7fd9cccf67b2d316

    SHA1

    b22836dfbe37257801a72d1729c779234155c7ab

    SHA256

    ca370ff2463964b8ed3eb69eab9f1fe786b6c6f148c3689ba4fde5b3269a2226

    SHA512

    22e724bdc1c92734a80a70cd6ba100678dbad08031a59545e893bc8da646a2d5db417aa1e364ab8f4a6827027501cf915ce5d42d999d780faa1221c99f78e730

  • C:\Users\Admin\AppData\Roaming\Microsoft\dllhost.exe

    Filesize

    469KB

    MD5

    3c09386d95d4359a6bf73a4a46b8c038

    SHA1

    fa86548194d569dc1ee43adbf5519e0897732036

    SHA256

    7c6f8b737586e3cbc72b5bf685b2eb05e37985304fdc1d360a082b8aacf48091

    SHA512

    994c8f2bb3dd49ed2e6ec805be6fe4b2e1eb0d3f2629672f19fd326823f033f9034b1e4a82e9888a48158d9c7fadf14dc396d5f2d6d4d8b3a3fd74d7b9c16a71

  • C:\Users\Admin\AppData\Roaming\Microsoft\dllhost.exe

    Filesize

    469KB

    MD5

    3c09386d95d4359a6bf73a4a46b8c038

    SHA1

    fa86548194d569dc1ee43adbf5519e0897732036

    SHA256

    7c6f8b737586e3cbc72b5bf685b2eb05e37985304fdc1d360a082b8aacf48091

    SHA512

    994c8f2bb3dd49ed2e6ec805be6fe4b2e1eb0d3f2629672f19fd326823f033f9034b1e4a82e9888a48158d9c7fadf14dc396d5f2d6d4d8b3a3fd74d7b9c16a71

  • C:\Users\Admin\AppData\Roaming\Microsoft\rsvp.exe

    Filesize

    469KB

    MD5

    7acce1b8aace21c27dbe0ec2ec927010

    SHA1

    f14afbec79b387eafb50d433c058626c472e7121

    SHA256

    f0a49963ef2f0c42f50891a72475d9c55bdfaf962110d12bc0470372c9454f84

    SHA512

    f407143fe28370e3b30e031fda6be8b9992909c726ef527ab7801551ba6daddcf7ab3829482a354d785609662b1802af7fe9b3cb7a97dfcd791a421f55bacb82

  • C:\Users\Admin\AppData\Roaming\Microsoft\rsvp.exe

    Filesize

    469KB

    MD5

    7acce1b8aace21c27dbe0ec2ec927010

    SHA1

    f14afbec79b387eafb50d433c058626c472e7121

    SHA256

    f0a49963ef2f0c42f50891a72475d9c55bdfaf962110d12bc0470372c9454f84

    SHA512

    f407143fe28370e3b30e031fda6be8b9992909c726ef527ab7801551ba6daddcf7ab3829482a354d785609662b1802af7fe9b3cb7a97dfcd791a421f55bacb82

  • C:\Users\Admin\Local Settings\Application Data\Microsoft\Windows\rsvp.exe

    Filesize

    469KB

    MD5

    7acce1b8aace21c27dbe0ec2ec927010

    SHA1

    f14afbec79b387eafb50d433c058626c472e7121

    SHA256

    f0a49963ef2f0c42f50891a72475d9c55bdfaf962110d12bc0470372c9454f84

    SHA512

    f407143fe28370e3b30e031fda6be8b9992909c726ef527ab7801551ba6daddcf7ab3829482a354d785609662b1802af7fe9b3cb7a97dfcd791a421f55bacb82

  • C:\Users\Admin\Local Settings\Application Data\Microsoft\spoolsv.exe

    Filesize

    469KB

    MD5

    3ed52469b828ef1e943155b3406baab1

    SHA1

    8d88b98cc4659ecf7c070c010d0f7ba1fc9161f4

    SHA256

    70d77cf7d480e6a88756248451e35350308edaab1b312243cdf2c8bfe3b4e2e6

    SHA512

    329dc5cfb9918426fe237b53ade4e5651a3632ee2b639c7e552f8afd394d2883b01bd697a02fcae9d2e3f7fc2eed6fe586fcffbe12127ede7f0d51e5fd8f9fa4

  • C:\Windows\SysWOW64\drivers\lsm.exe

    Filesize

    469KB

    MD5

    c29e9525a5cc4ade0f743ae0b5524463

    SHA1

    bd39dfdf3ccfd9acd07806251db3e76cb9df9c3c

    SHA256

    2d98213df132c4f937f2d25e2a5305ceee753a894c89ff3ba5de65b5fc94819f

    SHA512

    ba08e268539e78d8df9e19905e86e04cd3a7287d67984ade12715332efa3f3e994ea1d8cd333690838b6ceddea537e9a623040148073070b175798c69ac6eba0

  • C:\Windows\SysWOW64\drivers\lsm.exe

    Filesize

    469KB

    MD5

    c29e9525a5cc4ade0f743ae0b5524463

    SHA1

    bd39dfdf3ccfd9acd07806251db3e76cb9df9c3c

    SHA256

    2d98213df132c4f937f2d25e2a5305ceee753a894c89ff3ba5de65b5fc94819f

    SHA512

    ba08e268539e78d8df9e19905e86e04cd3a7287d67984ade12715332efa3f3e994ea1d8cd333690838b6ceddea537e9a623040148073070b175798c69ac6eba0

  • C:\Windows\SysWOW64\drivers\lsm.exe

    Filesize

    469KB

    MD5

    c29e9525a5cc4ade0f743ae0b5524463

    SHA1

    bd39dfdf3ccfd9acd07806251db3e76cb9df9c3c

    SHA256

    2d98213df132c4f937f2d25e2a5305ceee753a894c89ff3ba5de65b5fc94819f

    SHA512

    ba08e268539e78d8df9e19905e86e04cd3a7287d67984ade12715332efa3f3e994ea1d8cd333690838b6ceddea537e9a623040148073070b175798c69ac6eba0

  • C:\Windows\SysWOW64\drivers\mqtgsvc.exe

    Filesize

    469KB

    MD5

    0fb26f3c74df20b8168ac18bb7e05318

    SHA1

    f4aecc393de8e51e12897a664ef992e2485aae69

    SHA256

    a7de0e040b40db358ebe10c5a443f1dc9e7d2b35aa211d07624998dde72db822

    SHA512

    6e28858fb8dee211cea80d3cba36e8197c1638482365a5a51c8a49a9dd51169b56f82a580e72d0280ba9a81f005bfc5d4a2ba506044c8a993bf1d97b6f0a8890

  • C:\Windows\SysWOW64\drivers\mqtgsvc.exe

    Filesize

    469KB

    MD5

    0fb26f3c74df20b8168ac18bb7e05318

    SHA1

    f4aecc393de8e51e12897a664ef992e2485aae69

    SHA256

    a7de0e040b40db358ebe10c5a443f1dc9e7d2b35aa211d07624998dde72db822

    SHA512

    6e28858fb8dee211cea80d3cba36e8197c1638482365a5a51c8a49a9dd51169b56f82a580e72d0280ba9a81f005bfc5d4a2ba506044c8a993bf1d97b6f0a8890

  • C:\Windows\SysWOW64\drivers\mqtgsvc.exe

    Filesize

    469KB

    MD5

    0fb26f3c74df20b8168ac18bb7e05318

    SHA1

    f4aecc393de8e51e12897a664ef992e2485aae69

    SHA256

    a7de0e040b40db358ebe10c5a443f1dc9e7d2b35aa211d07624998dde72db822

    SHA512

    6e28858fb8dee211cea80d3cba36e8197c1638482365a5a51c8a49a9dd51169b56f82a580e72d0280ba9a81f005bfc5d4a2ba506044c8a993bf1d97b6f0a8890

  • C:\Windows\System\rsvp.exe

    Filesize

    469KB

    MD5

    7acce1b8aace21c27dbe0ec2ec927010

    SHA1

    f14afbec79b387eafb50d433c058626c472e7121

    SHA256

    f0a49963ef2f0c42f50891a72475d9c55bdfaf962110d12bc0470372c9454f84

    SHA512

    f407143fe28370e3b30e031fda6be8b9992909c726ef527ab7801551ba6daddcf7ab3829482a354d785609662b1802af7fe9b3cb7a97dfcd791a421f55bacb82

  • C:\Windows\System\rsvp.exe

    Filesize

    469KB

    MD5

    7acce1b8aace21c27dbe0ec2ec927010

    SHA1

    f14afbec79b387eafb50d433c058626c472e7121

    SHA256

    f0a49963ef2f0c42f50891a72475d9c55bdfaf962110d12bc0470372c9454f84

    SHA512

    f407143fe28370e3b30e031fda6be8b9992909c726ef527ab7801551ba6daddcf7ab3829482a354d785609662b1802af7fe9b3cb7a97dfcd791a421f55bacb82

  • C:\Windows\System\rsvp.exe

    Filesize

    469KB

    MD5

    7acce1b8aace21c27dbe0ec2ec927010

    SHA1

    f14afbec79b387eafb50d433c058626c472e7121

    SHA256

    f0a49963ef2f0c42f50891a72475d9c55bdfaf962110d12bc0470372c9454f84

    SHA512

    f407143fe28370e3b30e031fda6be8b9992909c726ef527ab7801551ba6daddcf7ab3829482a354d785609662b1802af7fe9b3cb7a97dfcd791a421f55bacb82

  • C:\Windows\System\rsvp.exe

    Filesize

    469KB

    MD5

    7acce1b8aace21c27dbe0ec2ec927010

    SHA1

    f14afbec79b387eafb50d433c058626c472e7121

    SHA256

    f0a49963ef2f0c42f50891a72475d9c55bdfaf962110d12bc0470372c9454f84

    SHA512

    f407143fe28370e3b30e031fda6be8b9992909c726ef527ab7801551ba6daddcf7ab3829482a354d785609662b1802af7fe9b3cb7a97dfcd791a421f55bacb82

  • C:\Windows\System\rsvp.exe

    Filesize

    469KB

    MD5

    7acce1b8aace21c27dbe0ec2ec927010

    SHA1

    f14afbec79b387eafb50d433c058626c472e7121

    SHA256

    f0a49963ef2f0c42f50891a72475d9c55bdfaf962110d12bc0470372c9454f84

    SHA512

    f407143fe28370e3b30e031fda6be8b9992909c726ef527ab7801551ba6daddcf7ab3829482a354d785609662b1802af7fe9b3cb7a97dfcd791a421f55bacb82