Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
100s -
max time network
104s -
platform
windows10-1703_x64 -
resource
win10-20230621-en -
resource tags
arch:x64arch:x86image:win10-20230621-enlocale:en-usos:windows10-1703-x64system -
submitted
01/07/2023, 13:13
Static task
static1
Behavioral task
behavioral1
Sample
VengefulThief.exe
Resource
win10-20230621-en
Behavioral task
behavioral2
Sample
VengefulThief.exe
Resource
win10v2004-20230621-en
General
-
Target
VengefulThief.exe
-
Size
46.9MB
-
MD5
8ca39d3a95d589fec59cf526d294aed7
-
SHA1
bd07ff6f02a4cd5a28312f2af2eee61b281018e3
-
SHA256
ad3f75f14da732dd09ec8e391cced6c7657fa309863e440f8d68d34e22750017
-
SHA512
1718df8ed0956bb82e84ef9168c4a514b82cfe09bcffb2f8c212d43f4bf26b1f6606aa7113f1e5a016dcbe2223bc1d715b47c60c580b94955cda6098b7050d84
-
SSDEEP
786432:htakRWH1pL1gJqrYW1zC8MQFHx6IVswnbOo522U4AqE:hQkQPpaMpC8MQOnl12vAqE
Malware Config
Signatures
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\rescache\_merged\4183903823\810424605.pri taskmgr.exe File created C:\Windows\rescache\_merged\1601268389\3877292338.pri taskmgr.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 4416 powershell.exe 4416 powershell.exe 2088 powershell.exe 2088 powershell.exe 2088 powershell.exe 4416 powershell.exe 872 powershell.exe 872 powershell.exe 872 powershell.exe 2380 powershell.exe 2380 powershell.exe 2380 powershell.exe 4704 powershell.exe 4716 powershell.exe 2904 powershell.exe 2904 powershell.exe 4704 powershell.exe 4716 powershell.exe 2904 powershell.exe 4704 powershell.exe 4716 powershell.exe 2992 powershell.exe 2992 powershell.exe 2992 powershell.exe 1276 taskmgr.exe 1276 taskmgr.exe 1276 taskmgr.exe 1276 taskmgr.exe 1276 taskmgr.exe 1276 taskmgr.exe 1276 taskmgr.exe 1276 taskmgr.exe 1276 taskmgr.exe 1276 taskmgr.exe 1276 taskmgr.exe 1276 taskmgr.exe 1276 taskmgr.exe 1276 taskmgr.exe 1276 taskmgr.exe 1276 taskmgr.exe 1276 taskmgr.exe 1276 taskmgr.exe 1276 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4416 powershell.exe Token: SeDebugPrivilege 2088 powershell.exe Token: SeIncreaseQuotaPrivilege 4416 powershell.exe Token: SeSecurityPrivilege 4416 powershell.exe Token: SeTakeOwnershipPrivilege 4416 powershell.exe Token: SeLoadDriverPrivilege 4416 powershell.exe Token: SeSystemProfilePrivilege 4416 powershell.exe Token: SeSystemtimePrivilege 4416 powershell.exe Token: SeProfSingleProcessPrivilege 4416 powershell.exe Token: SeIncBasePriorityPrivilege 4416 powershell.exe Token: SeCreatePagefilePrivilege 4416 powershell.exe Token: SeBackupPrivilege 4416 powershell.exe Token: SeRestorePrivilege 4416 powershell.exe Token: SeShutdownPrivilege 4416 powershell.exe Token: SeDebugPrivilege 4416 powershell.exe Token: SeSystemEnvironmentPrivilege 4416 powershell.exe Token: SeRemoteShutdownPrivilege 4416 powershell.exe Token: SeUndockPrivilege 4416 powershell.exe Token: SeManageVolumePrivilege 4416 powershell.exe Token: 33 4416 powershell.exe Token: 34 4416 powershell.exe Token: 35 4416 powershell.exe Token: 36 4416 powershell.exe Token: SeDebugPrivilege 872 powershell.exe Token: SeIncreaseQuotaPrivilege 872 powershell.exe Token: SeSecurityPrivilege 872 powershell.exe Token: SeTakeOwnershipPrivilege 872 powershell.exe Token: SeLoadDriverPrivilege 872 powershell.exe Token: SeSystemProfilePrivilege 872 powershell.exe Token: SeSystemtimePrivilege 872 powershell.exe Token: SeProfSingleProcessPrivilege 872 powershell.exe Token: SeIncBasePriorityPrivilege 872 powershell.exe Token: SeCreatePagefilePrivilege 872 powershell.exe Token: SeBackupPrivilege 872 powershell.exe Token: SeRestorePrivilege 872 powershell.exe Token: SeShutdownPrivilege 872 powershell.exe Token: SeDebugPrivilege 872 powershell.exe Token: SeSystemEnvironmentPrivilege 872 powershell.exe Token: SeRemoteShutdownPrivilege 872 powershell.exe Token: SeUndockPrivilege 872 powershell.exe Token: SeManageVolumePrivilege 872 powershell.exe Token: 33 872 powershell.exe Token: 34 872 powershell.exe Token: 35 872 powershell.exe Token: 36 872 powershell.exe Token: SeDebugPrivilege 2380 powershell.exe Token: SeIncreaseQuotaPrivilege 2380 powershell.exe Token: SeSecurityPrivilege 2380 powershell.exe Token: SeTakeOwnershipPrivilege 2380 powershell.exe Token: SeLoadDriverPrivilege 2380 powershell.exe Token: SeSystemProfilePrivilege 2380 powershell.exe Token: SeSystemtimePrivilege 2380 powershell.exe Token: SeProfSingleProcessPrivilege 2380 powershell.exe Token: SeIncBasePriorityPrivilege 2380 powershell.exe Token: SeCreatePagefilePrivilege 2380 powershell.exe Token: SeBackupPrivilege 2380 powershell.exe Token: SeRestorePrivilege 2380 powershell.exe Token: SeShutdownPrivilege 2380 powershell.exe Token: SeDebugPrivilege 2380 powershell.exe Token: SeSystemEnvironmentPrivilege 2380 powershell.exe Token: SeRemoteShutdownPrivilege 2380 powershell.exe Token: SeUndockPrivilege 2380 powershell.exe Token: SeManageVolumePrivilege 2380 powershell.exe Token: 33 2380 powershell.exe -
Suspicious use of FindShellTrayWindow 31 IoCs
pid Process 1276 taskmgr.exe 1276 taskmgr.exe 1276 taskmgr.exe 1276 taskmgr.exe 1276 taskmgr.exe 1276 taskmgr.exe 1276 taskmgr.exe 1276 taskmgr.exe 1276 taskmgr.exe 1276 taskmgr.exe 1276 taskmgr.exe 1276 taskmgr.exe 1276 taskmgr.exe 1276 taskmgr.exe 1276 taskmgr.exe 1276 taskmgr.exe 1276 taskmgr.exe 1276 taskmgr.exe 1276 taskmgr.exe 1276 taskmgr.exe 1276 taskmgr.exe 1276 taskmgr.exe 1276 taskmgr.exe 1276 taskmgr.exe 1276 taskmgr.exe 1276 taskmgr.exe 1276 taskmgr.exe 1276 taskmgr.exe 1276 taskmgr.exe 1276 taskmgr.exe 1276 taskmgr.exe -
Suspicious use of SendNotifyMessage 31 IoCs
pid Process 1276 taskmgr.exe 1276 taskmgr.exe 1276 taskmgr.exe 1276 taskmgr.exe 1276 taskmgr.exe 1276 taskmgr.exe 1276 taskmgr.exe 1276 taskmgr.exe 1276 taskmgr.exe 1276 taskmgr.exe 1276 taskmgr.exe 1276 taskmgr.exe 1276 taskmgr.exe 1276 taskmgr.exe 1276 taskmgr.exe 1276 taskmgr.exe 1276 taskmgr.exe 1276 taskmgr.exe 1276 taskmgr.exe 1276 taskmgr.exe 1276 taskmgr.exe 1276 taskmgr.exe 1276 taskmgr.exe 1276 taskmgr.exe 1276 taskmgr.exe 1276 taskmgr.exe 1276 taskmgr.exe 1276 taskmgr.exe 1276 taskmgr.exe 1276 taskmgr.exe 1276 taskmgr.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2040 wrote to memory of 4248 2040 VengefulThief.exe 67 PID 2040 wrote to memory of 4248 2040 VengefulThief.exe 67 PID 4248 wrote to memory of 360 4248 cmd.exe 69 PID 4248 wrote to memory of 360 4248 cmd.exe 69 PID 2040 wrote to memory of 2088 2040 VengefulThief.exe 72 PID 2040 wrote to memory of 2088 2040 VengefulThief.exe 72 PID 2040 wrote to memory of 4416 2040 VengefulThief.exe 70 PID 2040 wrote to memory of 4416 2040 VengefulThief.exe 70 PID 2088 wrote to memory of 2988 2088 powershell.exe 73 PID 2088 wrote to memory of 2988 2088 powershell.exe 73 PID 2988 wrote to memory of 4276 2988 csc.exe 74 PID 2988 wrote to memory of 4276 2988 csc.exe 74 PID 2040 wrote to memory of 872 2040 VengefulThief.exe 76 PID 2040 wrote to memory of 872 2040 VengefulThief.exe 76 PID 2040 wrote to memory of 2380 2040 VengefulThief.exe 79 PID 2040 wrote to memory of 2380 2040 VengefulThief.exe 79 PID 2040 wrote to memory of 2984 2040 VengefulThief.exe 81 PID 2040 wrote to memory of 2984 2040 VengefulThief.exe 81 PID 2040 wrote to memory of 4716 2040 VengefulThief.exe 83 PID 2040 wrote to memory of 4716 2040 VengefulThief.exe 83 PID 2040 wrote to memory of 4704 2040 VengefulThief.exe 84 PID 2040 wrote to memory of 4704 2040 VengefulThief.exe 84 PID 2040 wrote to memory of 2904 2040 VengefulThief.exe 85 PID 2040 wrote to memory of 2904 2040 VengefulThief.exe 85 PID 2040 wrote to memory of 3648 2040 VengefulThief.exe 89 PID 2040 wrote to memory of 3648 2040 VengefulThief.exe 89 PID 3648 wrote to memory of 4320 3648 cmd.exe 91 PID 3648 wrote to memory of 4320 3648 cmd.exe 91 PID 2040 wrote to memory of 2992 2040 VengefulThief.exe 92 PID 2040 wrote to memory of 2992 2040 VengefulThief.exe 92 PID 2040 wrote to memory of 3244 2040 VengefulThief.exe 94 PID 2040 wrote to memory of 3244 2040 VengefulThief.exe 94 PID 3244 wrote to memory of 4052 3244 cmd.exe 96 PID 3244 wrote to memory of 4052 3244 cmd.exe 96 PID 2040 wrote to memory of 1052 2040 VengefulThief.exe 97 PID 2040 wrote to memory of 1052 2040 VengefulThief.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\VengefulThief.exe"C:\Users\Admin\AppData\Local\Temp\VengefulThief.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "chcp"2⤵
- Suspicious use of WriteProcessMemory
PID:4248 -
C:\Windows\system32\chcp.comchcp3⤵PID:360
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4416
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -c "Add-Type -Name Window -Namespace Console -MemberDefinition ' [DllImport(\"Kernel32.dll\")] public static extern IntPtr GetConsoleWindow(); [DllImport(\"user32.dll\")] public static extern bool ShowWindow(IntPtr hWnd, Int32 nCmdShow); ' $consolePtr = [Console.Window]::GetConsoleWindow() #0 hide [Console.Window]::ShowWindow($consolePtr, 0) "2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\oneqxh5j\oneqxh5j.cmdline"3⤵
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA1C3.tmp" "c:\Users\Admin\AppData\Local\Temp\oneqxh5j\CSC142D40853D6A4794BF1CB6F49E146C12.TMP"4⤵PID:4276
-
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:872
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2380
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "echo %COMPUTERNAME%.%USERDNSDOMAIN%"2⤵PID:2984
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4716
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4704
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2904
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "findstr /C:"Detected boot environment" "%windir%\Panther\setupact.log""2⤵
- Suspicious use of WriteProcessMemory
PID:3648 -
C:\Windows\system32\findstr.exefindstr /C:"Detected boot environment" "C:\Windows\Panther\setupact.log"3⤵PID:4320
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2992
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "%windir%\System32\reg query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography" /v MachineGuid"2⤵
- Suspicious use of WriteProcessMemory
PID:3244 -
C:\Windows\System32\reg.exeC:\Windows\System32\reg query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography" /v MachineGuid3⤵PID:4052
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c ""undefined\VBoxManage.exe" list vms --long"2⤵PID:1052
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1276
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD556efdb5a0f10b5eece165de4f8c9d799
SHA1fa5de7ca343b018c3bfeab692545eb544c244e16
SHA2566c4e3fefc4faa1876a72c0964373c5fa08d3ab074eec7b1313b3e8410b9cb108
SHA51291e50779bbae7013c492ea48211d6b181175bfed38bf4b451925d5812e887c555528502316bbd4c4ab1f21693d77b700c44786429f88f60f7d92f21e46ea5ddc
-
Filesize
2KB
MD5915716538410fb006f41cc0d34f699c0
SHA1c461632e0a1b71fadaa6a44487d3a29db11d1ec7
SHA256b333c6db4819aa36904ff71051309ee7bd1a66e27a4f0070b73d9d718c4dea38
SHA512263236abcd5c5d914acf4c820b6ea6b3a53f983a7ef97eb641cbdf2354c2c0ed4f921bc5db633a10fe82e5ed6da1240cd67d7379c65dd1652ea938cd91e771aa
-
Filesize
2KB
MD5b8cafb651af8c2bec881cd821010bedc
SHA1f918f2ab0ef9bcbeeef424fe6f9d35eacb7b1837
SHA256bb4f640b0ee95e3c16cbf9ebc699c018a5e4971d11af9ab058100cd526b83296
SHA5125797843e40c8d4089ff00c1019d56ec56790f1472618cf00489e7184b6f779785bc3894d7934283687fe204c7b9d5f3ac32062cb3b3aeb562521d1a856289d87
-
Filesize
2KB
MD5b8cafb651af8c2bec881cd821010bedc
SHA1f918f2ab0ef9bcbeeef424fe6f9d35eacb7b1837
SHA256bb4f640b0ee95e3c16cbf9ebc699c018a5e4971d11af9ab058100cd526b83296
SHA5125797843e40c8d4089ff00c1019d56ec56790f1472618cf00489e7184b6f779785bc3894d7934283687fe204c7b9d5f3ac32062cb3b3aeb562521d1a856289d87
-
Filesize
2KB
MD580ef418749393790b80930b9d1b1ed38
SHA1baae03cf53c24cb4b4e16618f69dd770e75b17f5
SHA256a9116390b696f61a4e6fb4887cc9e1cd896c2dbdc92693d247ccaa3ee590cfbb
SHA512935c42409d95d6e35082cdad292e85d938988c5957e05b81c7473ce7b149457b3d47047c1eeba985d4b1f87b240cdb426537989d4dbf2621143c2090df2abcd1
-
Filesize
2KB
MD5495d92528a91b9c65588484f07ce5912
SHA18220646c0634e7bd0890b4a6af30788d8f27f92b
SHA25676b25621413a119d9a18a0a9d46a35abcda02bdc7019159a8d16b48b9e6dd32f
SHA512e948e1fd37086c22d68466eca6e9d65250eef279235d4970d9d157956161e7b578e7038fe641f619c1938c0469406ebaa94b4451278948cae910ddb2e5a6c144
-
Filesize
2KB
MD5a0387f92cee18e82fa3794664bf425e8
SHA1545b79722a63f7e4213f44c7a56e1f1aaf93c50c
SHA256c4ec89b9621e7371dd40cff1a1cb6acd657dce40f636f762d4e3cfe5cf405734
SHA51280b618b90d79db389b50c22ae6ec6e4acd68336a34cf646f8145f3eb2745efc6c8df54a8e9c16e36c219275cd0dc1717c07c0ad5e70fd4db20a3906720bc1dd1
-
Filesize
1KB
MD5ab11b700a39187da1ebabd5f04229b60
SHA1a067aa8ee77b4e0cd495705ec9a09379638a868d
SHA256b77a2d9b1cce0fdec61bdfd4e7a67fa70abfd73ac5552c42fb11cf4c1d2db4db
SHA512387e7c7212111d95c03a49a72068fdbce1fce3646a86bf4d5383ffe20710a4280df0e5ed8178c1aa558e955b261365d087c698fee1ca8859482e043fd998ff35
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
3KB
MD5622d2c7267f106cf4574c8f730c1b791
SHA13b7b3d35421850922fb5db11348c87230d9ea738
SHA256ecf7138a1bb688cbe8ec0f96f3f1a3ca7910daf883bf8cbfb9d99d1e36a6361f
SHA51270cd411cc32afccda7ff1e2c2548e69e2ea71720b1bd09278c7ad02825651f112234585c532bab6ecb37e93ab6523401742d6fcf5c4da8b976234ae75b795a83
-
Filesize
652B
MD5021f66327c7585af2f663a215062547a
SHA1148bfd5ed33885ad13c59d75814295e2a7907a55
SHA25661555f5eb918c4330ab8f3e74ec68223e25248ab012e51319d63f03f6416b3f3
SHA5126cfa7a7b03d131ceafe00af2fcb1b41346a32a22a6f4efa1b4abf99184996ad6f2a13306134fe0f08da1ab5b2065723b5c6121ffa0ed30a87d742699fbcc2adc
-
Filesize
312B
MD5ecbf151f81ff98f7dff196304a40239e
SHA1ccf6b97b6f8276656b042d64f0595963fe9ec79c
SHA256295ca195631c485c876e7c468ddcbb3fe7cd219d3e5005a2441be2de54e62ac8
SHA5124526a59055a18af6c0c13fb9f55a9a9bc15aa1407b697849e19b6cc32c88ee7206b3efff806bd154d36bce144ae1d9c407c6ea0f5077c54fbe92cd172c203720
-
Filesize
369B
MD514da4fd59e036274030f9403bf1209a6
SHA1c18f4df4231052fa7f5ca2d7a2bded1c78375d84
SHA2567da569d3395b11aff3edf255a0541dcd427b5926cf60f753ed11d3cc777f26d2
SHA512fdba1606ee07b8edaaa781a8653227a6d0f2f9792e64967a3d8254bdb953ecae778b6f2aea15d74fc0a7ad2648dea22ad254b483b710e1a5e5771907359de06a