Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
131s -
platform
windows10-1703_x64 -
resource
win10-20231023-en -
resource tags
arch:x64arch:x86image:win10-20231023-enlocale:en-usos:windows10-1703-x64system -
submitted
16/11/2023, 13:50
Static task
static1
Behavioral task
behavioral1
Sample
tl-removebg-preview (1).png
Resource
win10-20231023-en
3 signatures
150 seconds
General
-
Target
tl-removebg-preview (1).png
-
Size
29KB
-
MD5
7a45e683f1af428a7fac8b233935b67d
-
SHA1
d28b85bac345afee03a240354c76a700fa38f555
-
SHA256
63ab55c42c7f366bf4c460af912c4722e48cf739da91a318eef631fa22516574
-
SHA512
908ab9d2585f44af5ca0401ec5e7cd9eb405c0b0c13a74017c35a22c0fa70bce9b9ed6895c82faceb936a42900add571631ce13ca7838f31bdf43489fc0442ad
-
SSDEEP
768:QUn9ge3qJJpyIdB59ZQr3PfJIkLWo/De1oEID:sJJQmB5k3XFWobe+EID
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 4 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 vds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName vds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 vds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\FriendlyName vds.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2152 wrote to memory of 1704 2152 cmd.exe 75 PID 2152 wrote to memory of 1704 2152 cmd.exe 75 PID 2152 wrote to memory of 3180 2152 cmd.exe 79 PID 2152 wrote to memory of 3180 2152 cmd.exe 79
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\tl-removebg-preview (1).png"1⤵PID:3860
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Windows\system32\diskpart.exediskpart disk 12⤵PID:1704
-
-
C:\Windows\system32\diskpart.exediskpart2⤵PID:3180
-
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:2012
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵
- Checks SCSI registry key(s)
PID:4404
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:1636