Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    1798s
  • max time network
    1227s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230621-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/07/2023, 15:36

General

  • Target

    controlloid-server-master/dist/windows/start.bat

  • Size

    659B

  • MD5

    d2952fa301d050c22172944800b2dd5d

  • SHA1

    9a9fa11795afb9447073067a30b3fa5dbda9ae59

  • SHA256

    af0bc1eb93d7c7f491860b86c5988675a00ffd5efad8a230e1e09a5749a4d0a5

  • SHA512

    d031363f281b010b4fc82c7b02af945aa39e9e8333f1dd6221bd3d34e7d30f4fb2f82a5b7a5728b3489eecabbcc3fcb5f766b12f9824afb1c5a82579a5e5e3c5

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Drops file in System32 directory 23 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 26 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 42 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\controlloid-server-master\dist\windows\start.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3692
    • C:\Windows\system32\where.exe
      where /q /r "C:\Program Files" vjoyconfig.exe
      2⤵
        PID:3652
      • C:\Users\Admin\AppData\Local\Temp\controlloid-server-master\dist\windows\vjoy\elevate.exe
        .\vjoy\elevate.exe -wait cmd /c "C:\Users\Admin\AppData\Local\Temp\controlloid-server-master\dist\windows\vjoy\setup.bat"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4592
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\controlloid-server-master\dist\windows\vjoy\setup.bat
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1696
          • C:\Users\Admin\AppData\Local\Temp\controlloid-server-master\dist\windows\vjoy\vJoySetup.exe
            .\vJoySetup.exe /silent
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:3900
            • C:\Users\Admin\AppData\Local\Temp\is-G43SO.tmp\vJoySetup.tmp
              "C:\Users\Admin\AppData\Local\Temp\is-G43SO.tmp\vJoySetup.tmp" /SL5="$30118,10110716,383488,C:\Users\Admin\AppData\Local\Temp\controlloid-server-master\dist\windows\vjoy\vJoySetup.exe" /silent
              5⤵
              • Executes dropped EXE
              • Drops file in Program Files directory
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of WriteProcessMemory
              PID:1588
              • C:\Program Files\vJoy\vJoyInstall.exe
                "C:\Program Files\vJoy\vJoyInstall.exe" Q
                6⤵
                • Executes dropped EXE
                • Drops file in Program Files directory
                • Drops file in Windows directory
                • Checks SCSI registry key(s)
                • Modifies system certificate store
                PID:4676
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k DcomLaunch -p -s DeviceInstall
      1⤵
      • Drops file in Windows directory
      • Checks SCSI registry key(s)
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:736
      • C:\Windows\system32\DrvInst.exe
        DrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{4c830428-6c0f-ba47-ac2e-37338cde3572}\vjoy.inf" "9" "4170f47b7" "0000000000000140" "WinSta0\Default" "0000000000000158" "208" "c:\program files\vjoy"
        2⤵
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Modifies data under HKEY_USERS
        • Suspicious use of WriteProcessMemory
        PID:4268
        • C:\Windows\system32\rundll32.exe
          rundll32.exe C:\Windows\system32\pnpui.dll,InstallSecurityPromptRunDllW 20 Global\{701950dc-177d-bc4c-b230-17b6d6a56f4f} Global\{8e305fef-6a16-bb4b-ad67-49a312fa4edb} C:\Windows\System32\DriverStore\Temp\{bba3f726-e40a-7e45-a4ad-3cf6506af00f}\vjoy.inf C:\Windows\System32\DriverStore\Temp\{bba3f726-e40a-7e45-a4ad-3cf6506af00f}\vJoy.cat
          3⤵
            PID:2432
      • C:\Windows\System32\svchost.exe
        C:\Windows\System32\svchost.exe -k netsvcs -p
        1⤵
        • Drops file in System32 directory
        PID:4976

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files\vJoy\vJoy.inf

        Filesize

        10KB

        MD5

        460c34649150136c91c1e4b9d48b12cc

        SHA1

        4d57ae74eb2422b6b33d6214f25674fa243537fe

        SHA256

        3a4990e6462dbea0d925a64fc07a0c107e3e04b77755b9f6ff8222e92c617078

        SHA512

        1a85af0aeac1014acbc97941e1e2a23ecabc005ab38dfbb5667adbbe822c913526a34bee69f39102cc4bd3a39dc3f0d63e0be4d35934979699f06c204f7e832c

      • C:\Program Files\vJoy\vJoyInstall.exe

        Filesize

        137KB

        MD5

        4725f34695dc281aea1df512c3152f6a

        SHA1

        3b5b9a6f2bdb262a25b518cd9edf9805ede1a330

        SHA256

        668741cb856ef4b3e10c36c11a65c2749ed2693cba3a1657e002ff0a721f628b

        SHA512

        93a50fe54cffdc796e66b90ed84fea662965d7e30a39ce71d346141f4671849c30e66468aa5c20e49085cb70b76486e4c5158ccda871916bfbe8bcabc943e42b

      • C:\Program Files\vJoy\x64\LBIndustrialCtrls.dll

        Filesize

        40KB

        MD5

        74fd55b0a678af4d4df0f8e291630f7a

        SHA1

        b5bbb0601c83b72e5178a0688fc55e96e48e53b9

        SHA256

        7bc7422dafa1272f9c528a6fb2195a6e0f0816178bbe841cbac2e916b71f58e8

        SHA512

        5b86b3dfc3e5d463215cb623b64abff8393d1136598f4a02056fc57e9dbe43126c0f81feb3a9a0a0fe01c9a75800c2a769aed55a2d19ee7f13f4953e6978aaaf

      • C:\Users\Admin\AppData\Local\Temp\is-G43SO.tmp\vJoySetup.tmp

        Filesize

        1.4MB

        MD5

        c3be0ffc6ff04b4e16cdc67e1987363c

        SHA1

        abf2a820517f076272dd036dcb03478e81e9c9ec

        SHA256

        721eb854c625fd85837f513e0a9e816adab8c2913fb31f97f3ebc015698307a4

        SHA512

        f080efd43f9d0419676e68c3a614760cf1db1907ef8ff9e30f9ec8e76f510d2c96bb1a9c2a5a221268fbd03faf1d9096a49d8ab40442c030c1ebb32eff9ffc08

      • C:\Users\Admin\AppData\Local\Temp\is-G43SO.tmp\vJoySetup.tmp

        Filesize

        1.4MB

        MD5

        c3be0ffc6ff04b4e16cdc67e1987363c

        SHA1

        abf2a820517f076272dd036dcb03478e81e9c9ec

        SHA256

        721eb854c625fd85837f513e0a9e816adab8c2913fb31f97f3ebc015698307a4

        SHA512

        f080efd43f9d0419676e68c3a614760cf1db1907ef8ff9e30f9ec8e76f510d2c96bb1a9c2a5a221268fbd03faf1d9096a49d8ab40442c030c1ebb32eff9ffc08

      • C:\Users\Admin\AppData\Local\Temp\{4C830~1\WdfCoInstaller01009.dll

        Filesize

        1.6MB

        MD5

        4da5da193e0e4f86f6f8fd43ef25329a

        SHA1

        68a44d37ff535a2c454f2440e1429833a1c6d810

        SHA256

        18487b4ff94edccc98ed59d9fca662d4a1331c5f1e14df8db3093256dd9f1c3e

        SHA512

        b3d73ed5e45d6f2908b2f3086390dd28c1631e298756cee9bdf26b185f0b77d1b8c03ad55e0495dba982c5bed4a03337b130c76f7112f3e19821127d2cf36853

      • C:\Users\Admin\AppData\Local\Temp\{4C830~1\hidkmdf.sys

        Filesize

        10KB

        MD5

        de50a50fd52a2bacb72f159aea6e3a38

        SHA1

        2bad3a7e7516e9fc68e2ab4c5d9a7ac60a576154

        SHA256

        8fe4cac56e0ed66e5fc60f1468e1911196cadac49f0e350cfe7820c7ec7fcd7e

        SHA512

        c7542cf3b45d1d0ccbe87b5c220ecac6c4e9a8c1c171d5ce95f5bf76c1a3ffb576226486ed498ee12eedad9b1beed1d17a0f14d922df21287a70f69354c6a924

      • C:\Users\Admin\AppData\Local\Temp\{4C830~1\vJoy.cat

        Filesize

        9KB

        MD5

        8ade7a899a6d5f2d34b9a0e32e8e881c

        SHA1

        01e7961bc2ba41bd8794da2b2d2e967172cfd739

        SHA256

        09f859c2ac093ff4fab365ecead64c47c763230b091918be5abcc040579126ec

        SHA512

        b1ef251b258bf2fc7cb10d2f8ad64c60d01a7da81df31fb362998b62c5f423a202ee067ba6d4f69b8935292a55a91d1d0199b4a08cd0e7f15a96420f6ea9c6b2

      • C:\Users\Admin\AppData\Local\Temp\{4C830~1\vjoy.sys

        Filesize

        56KB

        MD5

        cb09581d30179ef1d9cac51717afa04f

        SHA1

        e3f54c575bb3daed87bccff8a207c7e9634ad7f0

        SHA256

        58e5cafbb5c3cc69c23ad85c3093b247208e3e5c43fe09aa06a6b7ec40fc3d1b

        SHA512

        a961e9ece89adb83d4c81c601aa3d91c39b277b9a27233d9894caf46cd5b92c6cdc55aaa689e55408303607bac3012296b67bd1dbdb8d71c10d1ac9ec3178e25

      • C:\Users\Admin\AppData\Local\Temp\{4c830428-6c0f-ba47-ac2e-37338cde3572}\WdfCoInstaller01009.dll

        Filesize

        1.6MB

        MD5

        4da5da193e0e4f86f6f8fd43ef25329a

        SHA1

        68a44d37ff535a2c454f2440e1429833a1c6d810

        SHA256

        18487b4ff94edccc98ed59d9fca662d4a1331c5f1e14df8db3093256dd9f1c3e

        SHA512

        b3d73ed5e45d6f2908b2f3086390dd28c1631e298756cee9bdf26b185f0b77d1b8c03ad55e0495dba982c5bed4a03337b130c76f7112f3e19821127d2cf36853

      • C:\Users\Admin\AppData\Local\Temp\{4c830428-6c0f-ba47-ac2e-37338cde3572}\hidkmdf.sys

        Filesize

        10KB

        MD5

        de50a50fd52a2bacb72f159aea6e3a38

        SHA1

        2bad3a7e7516e9fc68e2ab4c5d9a7ac60a576154

        SHA256

        8fe4cac56e0ed66e5fc60f1468e1911196cadac49f0e350cfe7820c7ec7fcd7e

        SHA512

        c7542cf3b45d1d0ccbe87b5c220ecac6c4e9a8c1c171d5ce95f5bf76c1a3ffb576226486ed498ee12eedad9b1beed1d17a0f14d922df21287a70f69354c6a924

      • C:\Users\Admin\AppData\Local\Temp\{4c830428-6c0f-ba47-ac2e-37338cde3572}\vJoy.cat

        Filesize

        9KB

        MD5

        8ade7a899a6d5f2d34b9a0e32e8e881c

        SHA1

        01e7961bc2ba41bd8794da2b2d2e967172cfd739

        SHA256

        09f859c2ac093ff4fab365ecead64c47c763230b091918be5abcc040579126ec

        SHA512

        b1ef251b258bf2fc7cb10d2f8ad64c60d01a7da81df31fb362998b62c5f423a202ee067ba6d4f69b8935292a55a91d1d0199b4a08cd0e7f15a96420f6ea9c6b2

      • C:\Users\Admin\AppData\Local\Temp\{4c830428-6c0f-ba47-ac2e-37338cde3572}\vjoy.inf

        Filesize

        10KB

        MD5

        460c34649150136c91c1e4b9d48b12cc

        SHA1

        4d57ae74eb2422b6b33d6214f25674fa243537fe

        SHA256

        3a4990e6462dbea0d925a64fc07a0c107e3e04b77755b9f6ff8222e92c617078

        SHA512

        1a85af0aeac1014acbc97941e1e2a23ecabc005ab38dfbb5667adbbe822c913526a34bee69f39102cc4bd3a39dc3f0d63e0be4d35934979699f06c204f7e832c

      • C:\Users\Admin\AppData\Local\Temp\{4c830428-6c0f-ba47-ac2e-37338cde3572}\vjoy.inf

        Filesize

        10KB

        MD5

        460c34649150136c91c1e4b9d48b12cc

        SHA1

        4d57ae74eb2422b6b33d6214f25674fa243537fe

        SHA256

        3a4990e6462dbea0d925a64fc07a0c107e3e04b77755b9f6ff8222e92c617078

        SHA512

        1a85af0aeac1014acbc97941e1e2a23ecabc005ab38dfbb5667adbbe822c913526a34bee69f39102cc4bd3a39dc3f0d63e0be4d35934979699f06c204f7e832c

      • C:\Users\Admin\AppData\Local\Temp\{4c830428-6c0f-ba47-ac2e-37338cde3572}\vjoy.sys

        Filesize

        56KB

        MD5

        cb09581d30179ef1d9cac51717afa04f

        SHA1

        e3f54c575bb3daed87bccff8a207c7e9634ad7f0

        SHA256

        58e5cafbb5c3cc69c23ad85c3093b247208e3e5c43fe09aa06a6b7ec40fc3d1b

        SHA512

        a961e9ece89adb83d4c81c601aa3d91c39b277b9a27233d9894caf46cd5b92c6cdc55aaa689e55408303607bac3012296b67bd1dbdb8d71c10d1ac9ec3178e25

      • C:\Windows\System32\DriverStore\Temp\{bba3f726-e40a-7e45-a4ad-3cf6506af00f}\vJoy.cat

        Filesize

        9KB

        MD5

        8ade7a899a6d5f2d34b9a0e32e8e881c

        SHA1

        01e7961bc2ba41bd8794da2b2d2e967172cfd739

        SHA256

        09f859c2ac093ff4fab365ecead64c47c763230b091918be5abcc040579126ec

        SHA512

        b1ef251b258bf2fc7cb10d2f8ad64c60d01a7da81df31fb362998b62c5f423a202ee067ba6d4f69b8935292a55a91d1d0199b4a08cd0e7f15a96420f6ea9c6b2

      • C:\Windows\System32\DriverStore\Temp\{bba3f726-e40a-7e45-a4ad-3cf6506af00f}\vjoy.inf

        Filesize

        10KB

        MD5

        460c34649150136c91c1e4b9d48b12cc

        SHA1

        4d57ae74eb2422b6b33d6214f25674fa243537fe

        SHA256

        3a4990e6462dbea0d925a64fc07a0c107e3e04b77755b9f6ff8222e92c617078

        SHA512

        1a85af0aeac1014acbc97941e1e2a23ecabc005ab38dfbb5667adbbe822c913526a34bee69f39102cc4bd3a39dc3f0d63e0be4d35934979699f06c204f7e832c

      • \??\c:\PROGRA~1\vjoy\WDFCOI~1.DLL

        Filesize

        1.6MB

        MD5

        4da5da193e0e4f86f6f8fd43ef25329a

        SHA1

        68a44d37ff535a2c454f2440e1429833a1c6d810

        SHA256

        18487b4ff94edccc98ed59d9fca662d4a1331c5f1e14df8db3093256dd9f1c3e

        SHA512

        b3d73ed5e45d6f2908b2f3086390dd28c1631e298756cee9bdf26b185f0b77d1b8c03ad55e0495dba982c5bed4a03337b130c76f7112f3e19821127d2cf36853

      • \??\c:\PROGRA~1\vjoy\hidkmdf.sys

        Filesize

        10KB

        MD5

        de50a50fd52a2bacb72f159aea6e3a38

        SHA1

        2bad3a7e7516e9fc68e2ab4c5d9a7ac60a576154

        SHA256

        8fe4cac56e0ed66e5fc60f1468e1911196cadac49f0e350cfe7820c7ec7fcd7e

        SHA512

        c7542cf3b45d1d0ccbe87b5c220ecac6c4e9a8c1c171d5ce95f5bf76c1a3ffb576226486ed498ee12eedad9b1beed1d17a0f14d922df21287a70f69354c6a924

      • \??\c:\PROGRA~1\vjoy\vjoy.sys

        Filesize

        56KB

        MD5

        cb09581d30179ef1d9cac51717afa04f

        SHA1

        e3f54c575bb3daed87bccff8a207c7e9634ad7f0

        SHA256

        58e5cafbb5c3cc69c23ad85c3093b247208e3e5c43fe09aa06a6b7ec40fc3d1b

        SHA512

        a961e9ece89adb83d4c81c601aa3d91c39b277b9a27233d9894caf46cd5b92c6cdc55aaa689e55408303607bac3012296b67bd1dbdb8d71c10d1ac9ec3178e25

      • \??\c:\program files\vjoy\vJoy.cat

        Filesize

        9KB

        MD5

        8ade7a899a6d5f2d34b9a0e32e8e881c

        SHA1

        01e7961bc2ba41bd8794da2b2d2e967172cfd739

        SHA256

        09f859c2ac093ff4fab365ecead64c47c763230b091918be5abcc040579126ec

        SHA512

        b1ef251b258bf2fc7cb10d2f8ad64c60d01a7da81df31fb362998b62c5f423a202ee067ba6d4f69b8935292a55a91d1d0199b4a08cd0e7f15a96420f6ea9c6b2

      • memory/1588-138-0x0000000002300000-0x0000000002301000-memory.dmp

        Filesize

        4KB

      • memory/1588-292-0x0000000000400000-0x000000000056D000-memory.dmp

        Filesize

        1.4MB

      • memory/1588-293-0x0000000002300000-0x0000000002301000-memory.dmp

        Filesize

        4KB

      • memory/3900-133-0x0000000000400000-0x0000000000468000-memory.dmp

        Filesize

        416KB

      • memory/3900-291-0x0000000000400000-0x0000000000468000-memory.dmp

        Filesize

        416KB