Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

01/07/2023, 13:13

230701-qgk85agh26 5

01/07/2023, 13:11

230701-qfcwcsaa6y 3

Analysis

  • max time kernel
    100s
  • max time network
    104s
  • platform
    windows10-1703_x64
  • resource
    win10-20230621-en
  • resource tags

    arch:x64arch:x86image:win10-20230621-enlocale:en-usos:windows10-1703-x64system
  • submitted
    01/07/2023, 13:13

General

  • Target

    VengefulThief.exe

  • Size

    46.9MB

  • MD5

    8ca39d3a95d589fec59cf526d294aed7

  • SHA1

    bd07ff6f02a4cd5a28312f2af2eee61b281018e3

  • SHA256

    ad3f75f14da732dd09ec8e391cced6c7657fa309863e440f8d68d34e22750017

  • SHA512

    1718df8ed0956bb82e84ef9168c4a514b82cfe09bcffb2f8c212d43f4bf26b1f6606aa7113f1e5a016dcbe2223bc1d715b47c60c580b94955cda6098b7050d84

  • SSDEEP

    786432:htakRWH1pL1gJqrYW1zC8MQFHx6IVswnbOo522U4AqE:hQkQPpaMpC8MQOnl12vAqE

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 43 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 31 IoCs
  • Suspicious use of SendNotifyMessage 31 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\VengefulThief.exe
    "C:\Users\Admin\AppData\Local\Temp\VengefulThief.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2040
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /d /s /c "chcp"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4248
      • C:\Windows\system32\chcp.com
        chcp
        3⤵
          PID:360
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4416
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell.exe -c "Add-Type -Name Window -Namespace Console -MemberDefinition ' [DllImport(\"Kernel32.dll\")] public static extern IntPtr GetConsoleWindow(); [DllImport(\"user32.dll\")] public static extern bool ShowWindow(IntPtr hWnd, Int32 nCmdShow); ' $consolePtr = [Console.Window]::GetConsoleWindow() #0 hide [Console.Window]::ShowWindow($consolePtr, 0) "
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2088
        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
          "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\oneqxh5j\oneqxh5j.cmdline"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2988
          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
            C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA1C3.tmp" "c:\Users\Admin\AppData\Local\Temp\oneqxh5j\CSC142D40853D6A4794BF1CB6F49E146C12.TMP"
            4⤵
              PID:4276
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:872
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2380
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /d /s /c "echo %COMPUTERNAME%.%USERDNSDOMAIN%"
          2⤵
            PID:2984
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
            2⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:4716
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
            2⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:4704
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
            2⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:2904
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /d /s /c "findstr /C:"Detected boot environment" "%windir%\Panther\setupact.log""
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:3648
            • C:\Windows\system32\findstr.exe
              findstr /C:"Detected boot environment" "C:\Windows\Panther\setupact.log"
              3⤵
                PID:4320
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
              2⤵
              • Suspicious behavior: EnumeratesProcesses
              PID:2992
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /d /s /c "%windir%\System32\reg query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography" /v MachineGuid"
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:3244
              • C:\Windows\System32\reg.exe
                C:\Windows\System32\reg query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography" /v MachineGuid
                3⤵
                  PID:4052
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /d /s /c ""undefined\VBoxManage.exe" list vms --long"
                2⤵
                  PID:1052
              • C:\Windows\system32\taskmgr.exe
                "C:\Windows\system32\taskmgr.exe" /4
                1⤵
                • Drops file in Windows directory
                • Checks SCSI registry key(s)
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SendNotifyMessage
                PID:1276

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                Filesize

                3KB

                MD5

                56efdb5a0f10b5eece165de4f8c9d799

                SHA1

                fa5de7ca343b018c3bfeab692545eb544c244e16

                SHA256

                6c4e3fefc4faa1876a72c0964373c5fa08d3ab074eec7b1313b3e8410b9cb108

                SHA512

                91e50779bbae7013c492ea48211d6b181175bfed38bf4b451925d5812e887c555528502316bbd4c4ab1f21693d77b700c44786429f88f60f7d92f21e46ea5ddc

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                Filesize

                2KB

                MD5

                915716538410fb006f41cc0d34f699c0

                SHA1

                c461632e0a1b71fadaa6a44487d3a29db11d1ec7

                SHA256

                b333c6db4819aa36904ff71051309ee7bd1a66e27a4f0070b73d9d718c4dea38

                SHA512

                263236abcd5c5d914acf4c820b6ea6b3a53f983a7ef97eb641cbdf2354c2c0ed4f921bc5db633a10fe82e5ed6da1240cd67d7379c65dd1652ea938cd91e771aa

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                Filesize

                2KB

                MD5

                b8cafb651af8c2bec881cd821010bedc

                SHA1

                f918f2ab0ef9bcbeeef424fe6f9d35eacb7b1837

                SHA256

                bb4f640b0ee95e3c16cbf9ebc699c018a5e4971d11af9ab058100cd526b83296

                SHA512

                5797843e40c8d4089ff00c1019d56ec56790f1472618cf00489e7184b6f779785bc3894d7934283687fe204c7b9d5f3ac32062cb3b3aeb562521d1a856289d87

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                Filesize

                2KB

                MD5

                b8cafb651af8c2bec881cd821010bedc

                SHA1

                f918f2ab0ef9bcbeeef424fe6f9d35eacb7b1837

                SHA256

                bb4f640b0ee95e3c16cbf9ebc699c018a5e4971d11af9ab058100cd526b83296

                SHA512

                5797843e40c8d4089ff00c1019d56ec56790f1472618cf00489e7184b6f779785bc3894d7934283687fe204c7b9d5f3ac32062cb3b3aeb562521d1a856289d87

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                Filesize

                2KB

                MD5

                80ef418749393790b80930b9d1b1ed38

                SHA1

                baae03cf53c24cb4b4e16618f69dd770e75b17f5

                SHA256

                a9116390b696f61a4e6fb4887cc9e1cd896c2dbdc92693d247ccaa3ee590cfbb

                SHA512

                935c42409d95d6e35082cdad292e85d938988c5957e05b81c7473ce7b149457b3d47047c1eeba985d4b1f87b240cdb426537989d4dbf2621143c2090df2abcd1

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                Filesize

                2KB

                MD5

                495d92528a91b9c65588484f07ce5912

                SHA1

                8220646c0634e7bd0890b4a6af30788d8f27f92b

                SHA256

                76b25621413a119d9a18a0a9d46a35abcda02bdc7019159a8d16b48b9e6dd32f

                SHA512

                e948e1fd37086c22d68466eca6e9d65250eef279235d4970d9d157956161e7b578e7038fe641f619c1938c0469406ebaa94b4451278948cae910ddb2e5a6c144

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                Filesize

                2KB

                MD5

                a0387f92cee18e82fa3794664bf425e8

                SHA1

                545b79722a63f7e4213f44c7a56e1f1aaf93c50c

                SHA256

                c4ec89b9621e7371dd40cff1a1cb6acd657dce40f636f762d4e3cfe5cf405734

                SHA512

                80b618b90d79db389b50c22ae6ec6e4acd68336a34cf646f8145f3eb2745efc6c8df54a8e9c16e36c219275cd0dc1717c07c0ad5e70fd4db20a3906720bc1dd1

              • C:\Users\Admin\AppData\Local\Temp\RESA1C3.tmp

                Filesize

                1KB

                MD5

                ab11b700a39187da1ebabd5f04229b60

                SHA1

                a067aa8ee77b4e0cd495705ec9a09379638a868d

                SHA256

                b77a2d9b1cce0fdec61bdfd4e7a67fa70abfd73ac5552c42fb11cf4c1d2db4db

                SHA512

                387e7c7212111d95c03a49a72068fdbce1fce3646a86bf4d5383ffe20710a4280df0e5ed8178c1aa558e955b261365d087c698fee1ca8859482e043fd998ff35

              • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_s45ewk3z.jwg.ps1

                Filesize

                1B

                MD5

                c4ca4238a0b923820dcc509a6f75849b

                SHA1

                356a192b7913b04c54574d18c28d46e6395428ab

                SHA256

                6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

                SHA512

                4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

              • C:\Users\Admin\AppData\Local\Temp\oneqxh5j\oneqxh5j.dll

                Filesize

                3KB

                MD5

                622d2c7267f106cf4574c8f730c1b791

                SHA1

                3b7b3d35421850922fb5db11348c87230d9ea738

                SHA256

                ecf7138a1bb688cbe8ec0f96f3f1a3ca7910daf883bf8cbfb9d99d1e36a6361f

                SHA512

                70cd411cc32afccda7ff1e2c2548e69e2ea71720b1bd09278c7ad02825651f112234585c532bab6ecb37e93ab6523401742d6fcf5c4da8b976234ae75b795a83

              • \??\c:\Users\Admin\AppData\Local\Temp\oneqxh5j\CSC142D40853D6A4794BF1CB6F49E146C12.TMP

                Filesize

                652B

                MD5

                021f66327c7585af2f663a215062547a

                SHA1

                148bfd5ed33885ad13c59d75814295e2a7907a55

                SHA256

                61555f5eb918c4330ab8f3e74ec68223e25248ab012e51319d63f03f6416b3f3

                SHA512

                6cfa7a7b03d131ceafe00af2fcb1b41346a32a22a6f4efa1b4abf99184996ad6f2a13306134fe0f08da1ab5b2065723b5c6121ffa0ed30a87d742699fbcc2adc

              • \??\c:\Users\Admin\AppData\Local\Temp\oneqxh5j\oneqxh5j.0.cs

                Filesize

                312B

                MD5

                ecbf151f81ff98f7dff196304a40239e

                SHA1

                ccf6b97b6f8276656b042d64f0595963fe9ec79c

                SHA256

                295ca195631c485c876e7c468ddcbb3fe7cd219d3e5005a2441be2de54e62ac8

                SHA512

                4526a59055a18af6c0c13fb9f55a9a9bc15aa1407b697849e19b6cc32c88ee7206b3efff806bd154d36bce144ae1d9c407c6ea0f5077c54fbe92cd172c203720

              • \??\c:\Users\Admin\AppData\Local\Temp\oneqxh5j\oneqxh5j.cmdline

                Filesize

                369B

                MD5

                14da4fd59e036274030f9403bf1209a6

                SHA1

                c18f4df4231052fa7f5ca2d7a2bded1c78375d84

                SHA256

                7da569d3395b11aff3edf255a0541dcd427b5926cf60f753ed11d3cc777f26d2

                SHA512

                fdba1606ee07b8edaaa781a8653227a6d0f2f9792e64967a3d8254bdb953ecae778b6f2aea15d74fc0a7ad2648dea22ad254b483b710e1a5e5771907359de06a

              • memory/872-464-0x00000279F8F10000-0x00000279F8F20000-memory.dmp

                Filesize

                64KB

              • memory/872-463-0x00000279F8F10000-0x00000279F8F20000-memory.dmp

                Filesize

                64KB

              • memory/2088-142-0x000002191E8C0000-0x000002191E936000-memory.dmp

                Filesize

                472KB

              • memory/2088-204-0x000002191E4A0000-0x000002191E4A8000-memory.dmp

                Filesize

                32KB

              • memory/2088-186-0x000002191E4C0000-0x000002191E4D0000-memory.dmp

                Filesize

                64KB

              • memory/2380-904-0x000001CAD8890000-0x000001CAD88A0000-memory.dmp

                Filesize

                64KB

              • memory/2380-679-0x000001CAD8890000-0x000001CAD88A0000-memory.dmp

                Filesize

                64KB

              • memory/2380-677-0x000001CAD8890000-0x000001CAD88A0000-memory.dmp

                Filesize

                64KB

              • memory/2904-983-0x000001DC70250000-0x000001DC70260000-memory.dmp

                Filesize

                64KB

              • memory/2904-987-0x000001DC70250000-0x000001DC70260000-memory.dmp

                Filesize

                64KB

              • memory/2992-1551-0x0000013C772B0000-0x0000013C772C0000-memory.dmp

                Filesize

                64KB

              • memory/2992-1550-0x0000013C772B0000-0x0000013C772C0000-memory.dmp

                Filesize

                64KB

              • memory/4416-180-0x000001655CE80000-0x000001655CEBC000-memory.dmp

                Filesize

                240KB

              • memory/4416-374-0x000001655CEC0000-0x000001655CEEA000-memory.dmp

                Filesize

                168KB

              • memory/4416-132-0x00000165446C0000-0x00000165446D0000-memory.dmp

                Filesize

                64KB

              • memory/4416-134-0x00000165446C0000-0x00000165446D0000-memory.dmp

                Filesize

                64KB

              • memory/4416-130-0x000001655C880000-0x000001655C8A2000-memory.dmp

                Filesize

                136KB

              • memory/4416-393-0x000001655CEC0000-0x000001655CEE2000-memory.dmp

                Filesize

                136KB

              • memory/4704-960-0x000001E12A4C0000-0x000001E12A4D0000-memory.dmp

                Filesize

                64KB

              • memory/4704-1460-0x000001E12A4C0000-0x000001E12A4D0000-memory.dmp

                Filesize

                64KB

              • memory/4704-1462-0x000001E12A4C0000-0x000001E12A4D0000-memory.dmp

                Filesize

                64KB

              • memory/4716-979-0x000002AC29C90000-0x000002AC29CA0000-memory.dmp

                Filesize

                64KB