Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    500s
  • max time network
    505s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/02/2023, 23:12

General

  • Target

    KeyboardSplitter.exe

  • Size

    6.4MB

  • MD5

    85be9314df40802ef6ca32b276389737

  • SHA1

    49e09df75179e4df7f435c5073478932b43fecb6

  • SHA256

    7e3cc838ab3aa1207957dbe39acf9379d00ed93c5cdf74a56a9e8a4f4453b3c8

  • SHA512

    9c90819c49db3170cb8e897b8b7c515727618999ea6d5b9a6f638ec8943a8cc208efa352f5029dd7b33e8fef46e869669b60d334c77ad117630ac47577237fb6

  • SSDEEP

    98304:Dnwz2f6G5rKvmZLJoW/HzZ2ans8GVoLd+GnltN0A0AZ4lBkCOX2r:Dwza642OZmW/d2ansBGdPnl4FECE2

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 5 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 23 IoCs
  • Drops file in Windows directory 6 IoCs
  • Checks SCSI registry key(s) 3 TTPs 62 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 42 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\KeyboardSplitter.exe
    "C:\Users\Admin\AppData\Local\Temp\KeyboardSplitter.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4928
    • C:\Users\Admin\AppData\Local\Temp\KeyboardSplitter 2.2.0.0 resources\keyboard_driver.exe
      "C:\Users\Admin\AppData\Local\Temp\KeyboardSplitter 2.2.0.0 resources\keyboard_driver.exe" /install
      2⤵
      • Drops file in Drivers directory
      • Executes dropped EXE
      PID:2260
    • C:\Users\Admin\AppData\Local\Temp\VirtualXbox 2.2.0.0 resources\devcon.exe
      "C:\Users\Admin\AppData\Local\Temp\VirtualXbox 2.2.0.0 resources\devcon.exe" install ScpVBus.inf Root\ScpVBus
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Checks SCSI registry key(s)
      • Modifies system certificate store
      • Suspicious use of AdjustPrivilegeToken
      PID:2384
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k DcomLaunch -p -s DeviceInstall
    1⤵
    • Drops file in Windows directory
    • Checks SCSI registry key(s)
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2188
    • C:\Windows\system32\DrvInst.exe
      DrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{b7b78d6b-91a3-8f4d-a077-db43ce87086b}\scpvbus.inf" "9" "4b5cfab93" "0000000000000148" "WinSta0\Default" "0000000000000158" "208" "c:\users\admin\appdata\local\temp\virtualxbox 2.2.0.0 resources"
      2⤵
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Checks SCSI registry key(s)
      • Modifies data under HKEY_USERS
      • Suspicious use of WriteProcessMemory
      PID:3484
      • C:\Windows\system32\rundll32.exe
        rundll32.exe C:\Windows\system32\pnpui.dll,InstallSecurityPromptRunDllW 20 Global\{8cfe2bdf-557b-9141-baff-2be7bed43da0} Global\{ded0535e-9aa1-5f40-a2d8-128ffc89ccd4} C:\Windows\System32\DriverStore\Temp\{b410558b-86fc-5547-b9a6-9f2cd708132d}\scpvbus.inf C:\Windows\System32\DriverStore\Temp\{b410558b-86fc-5547-b9a6-9f2cd708132d}\ScpVBus.cat
        3⤵
          PID:364
      • C:\Windows\system32\DrvInst.exe
        DrvInst.exe "2" "211" "ROOT\SYSTEM\0001" "C:\Windows\INF\oem2.inf" "oem2.inf:c14ce88487555a35:ScpVBus_Device:22.52.24.182:root\scpvbus," "4b5cfab93" "0000000000000148"
        2⤵
        • Drops file in Drivers directory
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Checks SCSI registry key(s)
        • Suspicious use of AdjustPrivilegeToken
        PID:852
    • C:\Windows\SysWOW64\DllHost.exe
      C:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}
      1⤵
        PID:3696
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,Control_RunDLL C:\Windows\System32\main.cpl,@1 ,
        1⤵
          PID:4988

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\KeyboardSplitter 2.2.0.0 resources\keyboard_driver.exe

          Filesize

          459KB

          MD5

          0485d7466d93b687fa90e1644b2aacbb

          SHA1

          8a2b8cea2500a9e04c7472fa052f71db78db5813

          SHA256

          41362f9a019e55a63e4efe5761f703ffdcb06ca185bf2e36092f8e1bf5a264ff

          SHA512

          3240511701e954a349c7017bdfb35dd65e822f29abcb7371669cb1ca7e5d0b86ee60c716c6d1e24a859d1003cf2bd8efba8958ee0f6ff3f6cdf72cf5a2b2fd54

        • C:\Users\Admin\AppData\Local\Temp\KeyboardSplitter 2.2.0.0 resources\keyboard_driver.exe

          Filesize

          459KB

          MD5

          0485d7466d93b687fa90e1644b2aacbb

          SHA1

          8a2b8cea2500a9e04c7472fa052f71db78db5813

          SHA256

          41362f9a019e55a63e4efe5761f703ffdcb06ca185bf2e36092f8e1bf5a264ff

          SHA512

          3240511701e954a349c7017bdfb35dd65e822f29abcb7371669cb1ca7e5d0b86ee60c716c6d1e24a859d1003cf2bd8efba8958ee0f6ff3f6cdf72cf5a2b2fd54

        • C:\Users\Admin\AppData\Local\Temp\VirtualXbox 2.2.0.0 resources\ScpVBus.inf

          Filesize

          2KB

          MD5

          c554a925eb6c46da1a6e221aacec157b

          SHA1

          a934a3f41d6cf87af41df8c40e8be89c2ed56d9e

          SHA256

          db8367c5e7e9b0a857d9f4d220a08d475381440f793d9408071e16a865eccd51

          SHA512

          237010f6aee981439b236596db317c36d181a457aeb0e189676cdcbeda86e887249f2e080d56a8cc761c8545ed5eda8a92755b9b303ab90a3af102e80bf26812

        • C:\Users\Admin\AppData\Local\Temp\VirtualXbox 2.2.0.0 resources\devcon.exe

          Filesize

          80KB

          MD5

          7920632d06bda4f19f4815232796fd24

          SHA1

          0dbc86019e7b49eab75e70e3be07e6e78a41d3dd

          SHA256

          f4225d077a71787e8b98ed2e649aae8af1ae5c92e82414b59f71c9dd1784e729

          SHA512

          09eefce4be893c756b18a3044ee1b7a4207f9235e1be765e2f598e10ad962d18c6588bf3a44bb0d629f4c92f84b076da33292a2faa334a5380dee867a37fdf91

        • C:\Users\Admin\AppData\Local\Temp\djlastnight's Gaming Keyboard Splitter v2.2.0.0\VirtualXboxNative.dll

          Filesize

          14KB

          MD5

          c0a65fb87bff1b0bef9e26c9332b8658

          SHA1

          f7810afb38b850b73cb4af37ab097f1161393a38

          SHA256

          72625764cc1fe7a8f99c29019ad7839980bbe0565af7844ee9e821869cb0d02c

          SHA512

          2d55bb1681ca87a6524d1a98bb582391363eb6353c0ccb86028ac0a7aa710d96ef6f30064d73143efc9bd7cba14803f353902a98b697b1dd165b66d63aec37f3

        • C:\Users\Admin\AppData\Local\Temp\{B7B78~1\ScpVBus.cat

          Filesize

          8KB

          MD5

          f731eb640512970da863bb207c911afb

          SHA1

          7c853c5e237149b51a939bb3eb307f33ee010d95

          SHA256

          e7cd617710f38c80f0e8700780a92c97c5b2ddc42586de1d8afbd2e624225629

          SHA512

          f354b10ae68af37b153f9439709cb7712223e5d7bbeec278989f7f17fe5cf00b6ad253f29470795b50c62309bd0ad2e8662afaf73baaa5f691cad4a1015e0036

        • C:\Users\Admin\AppData\Local\Temp\{B7B78~1\ScpVBus.sys

          Filesize

          43KB

          MD5

          6011ab0ca3d08527cf2af246d792548f

          SHA1

          8e3216e7b8f7340dc0f14ab25db1b3b7e978ec1a

          SHA256

          2c363a38f474abe214d947f4e8c5d246a65228f4ff1f56c65ec66253a38f04e8

          SHA512

          8ef8d4309b095974e2d605756a452c6843df9f686552d8458540482d25f298c124c16bcd39499ea2d3ba65cab97cc1af529f735704742c77a7194dd4d96eedaa

        • C:\Users\Admin\AppData\Local\Temp\{B7B78~1\WdfCoInstaller01009.dll

          Filesize

          1.6MB

          MD5

          4da5da193e0e4f86f6f8fd43ef25329a

          SHA1

          68a44d37ff535a2c454f2440e1429833a1c6d810

          SHA256

          18487b4ff94edccc98ed59d9fca662d4a1331c5f1e14df8db3093256dd9f1c3e

          SHA512

          b3d73ed5e45d6f2908b2f3086390dd28c1631e298756cee9bdf26b185f0b77d1b8c03ad55e0495dba982c5bed4a03337b130c76f7112f3e19821127d2cf36853

        • C:\Users\Admin\AppData\Local\Temp\{b7b78d6b-91a3-8f4d-a077-db43ce87086b}\scpvbus.inf

          Filesize

          2KB

          MD5

          c554a925eb6c46da1a6e221aacec157b

          SHA1

          a934a3f41d6cf87af41df8c40e8be89c2ed56d9e

          SHA256

          db8367c5e7e9b0a857d9f4d220a08d475381440f793d9408071e16a865eccd51

          SHA512

          237010f6aee981439b236596db317c36d181a457aeb0e189676cdcbeda86e887249f2e080d56a8cc761c8545ed5eda8a92755b9b303ab90a3af102e80bf26812

        • C:\Windows\INF\oem2.inf

          Filesize

          2KB

          MD5

          c554a925eb6c46da1a6e221aacec157b

          SHA1

          a934a3f41d6cf87af41df8c40e8be89c2ed56d9e

          SHA256

          db8367c5e7e9b0a857d9f4d220a08d475381440f793d9408071e16a865eccd51

          SHA512

          237010f6aee981439b236596db317c36d181a457aeb0e189676cdcbeda86e887249f2e080d56a8cc761c8545ed5eda8a92755b9b303ab90a3af102e80bf26812

        • C:\Windows\System32\DriverStore\FileRepository\SCPVBU~1.INF\ScpVBus.sys

          Filesize

          43KB

          MD5

          6011ab0ca3d08527cf2af246d792548f

          SHA1

          8e3216e7b8f7340dc0f14ab25db1b3b7e978ec1a

          SHA256

          2c363a38f474abe214d947f4e8c5d246a65228f4ff1f56c65ec66253a38f04e8

          SHA512

          8ef8d4309b095974e2d605756a452c6843df9f686552d8458540482d25f298c124c16bcd39499ea2d3ba65cab97cc1af529f735704742c77a7194dd4d96eedaa

        • C:\Windows\System32\DriverStore\FileRepository\SCPVBU~1.INF\WdfCoInstaller01009.dll

          Filesize

          1.6MB

          MD5

          4da5da193e0e4f86f6f8fd43ef25329a

          SHA1

          68a44d37ff535a2c454f2440e1429833a1c6d810

          SHA256

          18487b4ff94edccc98ed59d9fca662d4a1331c5f1e14df8db3093256dd9f1c3e

          SHA512

          b3d73ed5e45d6f2908b2f3086390dd28c1631e298756cee9bdf26b185f0b77d1b8c03ad55e0495dba982c5bed4a03337b130c76f7112f3e19821127d2cf36853

        • C:\Windows\System32\DriverStore\Temp\{b410558b-86fc-5547-b9a6-9f2cd708132d}\ScpVBus.cat

          Filesize

          8KB

          MD5

          f731eb640512970da863bb207c911afb

          SHA1

          7c853c5e237149b51a939bb3eb307f33ee010d95

          SHA256

          e7cd617710f38c80f0e8700780a92c97c5b2ddc42586de1d8afbd2e624225629

          SHA512

          f354b10ae68af37b153f9439709cb7712223e5d7bbeec278989f7f17fe5cf00b6ad253f29470795b50c62309bd0ad2e8662afaf73baaa5f691cad4a1015e0036

        • C:\Windows\System32\DriverStore\Temp\{b410558b-86fc-5547-b9a6-9f2cd708132d}\scpvbus.inf

          Filesize

          2KB

          MD5

          c554a925eb6c46da1a6e221aacec157b

          SHA1

          a934a3f41d6cf87af41df8c40e8be89c2ed56d9e

          SHA256

          db8367c5e7e9b0a857d9f4d220a08d475381440f793d9408071e16a865eccd51

          SHA512

          237010f6aee981439b236596db317c36d181a457aeb0e189676cdcbeda86e887249f2e080d56a8cc761c8545ed5eda8a92755b9b303ab90a3af102e80bf26812

        • C:\Windows\system32\drivers\keyboard.sys

          Filesize

          18KB

          MD5

          9d39232310190dc8c0cb7472db523a1e

          SHA1

          e32cb026441aa952d70fac7f9f6495d850ebd82e

          SHA256

          2cb5ec142cfac879bce4a2f9549258db972aebbd24f4551b6b748b464eb7dba9

          SHA512

          9bf0c2cd1af6bee3ca9a50cc3b07c429b526c08d7ef94ae507e4dcf864a6216c1527294902e4266d45ccd85c54ed975361307a8b6ef00a21af22e0a941e83d52

        • \??\c:\users\admin\appdata\local\temp\VIRTUA~1.0RE\ScpVBus.sys

          Filesize

          43KB

          MD5

          6011ab0ca3d08527cf2af246d792548f

          SHA1

          8e3216e7b8f7340dc0f14ab25db1b3b7e978ec1a

          SHA256

          2c363a38f474abe214d947f4e8c5d246a65228f4ff1f56c65ec66253a38f04e8

          SHA512

          8ef8d4309b095974e2d605756a452c6843df9f686552d8458540482d25f298c124c16bcd39499ea2d3ba65cab97cc1af529f735704742c77a7194dd4d96eedaa

        • \??\c:\users\admin\appdata\local\temp\VIRTUA~1.0RE\WDFCOI~1.DLL

          Filesize

          1.6MB

          MD5

          4da5da193e0e4f86f6f8fd43ef25329a

          SHA1

          68a44d37ff535a2c454f2440e1429833a1c6d810

          SHA256

          18487b4ff94edccc98ed59d9fca662d4a1331c5f1e14df8db3093256dd9f1c3e

          SHA512

          b3d73ed5e45d6f2908b2f3086390dd28c1631e298756cee9bdf26b185f0b77d1b8c03ad55e0495dba982c5bed4a03337b130c76f7112f3e19821127d2cf36853

        • \??\c:\users\admin\appdata\local\temp\virtualxbox 2.2.0.0 resources\ScpVBus.cat

          Filesize

          8KB

          MD5

          f731eb640512970da863bb207c911afb

          SHA1

          7c853c5e237149b51a939bb3eb307f33ee010d95

          SHA256

          e7cd617710f38c80f0e8700780a92c97c5b2ddc42586de1d8afbd2e624225629

          SHA512

          f354b10ae68af37b153f9439709cb7712223e5d7bbeec278989f7f17fe5cf00b6ad253f29470795b50c62309bd0ad2e8662afaf73baaa5f691cad4a1015e0036

        • memory/4928-132-0x0000000000240000-0x00000000008A6000-memory.dmp

          Filesize

          6.4MB

        • memory/4928-139-0x000000000A930000-0x000000000A93E000-memory.dmp

          Filesize

          56KB

        • memory/4928-138-0x000000000AE90000-0x000000000AEC8000-memory.dmp

          Filesize

          224KB

        • memory/4928-137-0x0000000008DA0000-0x0000000008DA8000-memory.dmp

          Filesize

          32KB

        • memory/4928-136-0x0000000006650000-0x00000000066E2000-memory.dmp

          Filesize

          584KB

        • memory/4928-134-0x0000000006200000-0x0000000006266000-memory.dmp

          Filesize

          408KB

        • memory/4928-133-0x0000000005870000-0x0000000005E14000-memory.dmp

          Filesize

          5.6MB