Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
28/12/2023, 10:23
Behavioral task
behavioral1
Sample
d8a977071676464fe8d540d72fc99acf.exe
Resource
win7-20231215-en
General
-
Target
d8a977071676464fe8d540d72fc99acf.exe
-
Size
6.9MB
-
MD5
d8a977071676464fe8d540d72fc99acf
-
SHA1
0f6e3e5023469f58c190e1c8563b95de87ea65b4
-
SHA256
b44304c86c1ed108574eab57a316b72d2602e473be5fcbff69fd4c8b067eb452
-
SHA512
66ac4b77e393340efa0d6155a0da50c876c8af50d883cbc9261dd26a6894aa2db74993f62f8aa7ae49177332949025b4c6efe863d5035291c5d148ff002a8cee
-
SSDEEP
196608:SHEJHZ/eTq1Gftof7bIj9yHyCkZZV5v/n1rS+slCCmFK:VpPGfiUTTBc+ymY
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d8a977071676464fe8d540d72fc99acf.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d8a977071676464fe8d540d72fc99acf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d8a977071676464fe8d540d72fc99acf.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation d8a977071676464fe8d540d72fc99acf.exe -
Loads dropped DLL 2 IoCs
pid Process 4768 d8a977071676464fe8d540d72fc99acf.exe 4768 d8a977071676464fe8d540d72fc99acf.exe -
resource yara_rule behavioral2/memory/4768-0-0x0000000000400000-0x0000000000B06000-memory.dmp themida behavioral2/memory/4768-16-0x0000000000400000-0x0000000000B06000-memory.dmp themida behavioral2/memory/4768-23-0x0000000000400000-0x0000000000B06000-memory.dmp themida behavioral2/memory/4768-39-0x0000000000400000-0x0000000000B06000-memory.dmp themida -
resource yara_rule behavioral2/memory/4768-10-0x0000000066000000-0x000000006618C000-memory.dmp upx behavioral2/memory/4768-14-0x0000000066000000-0x000000006618C000-memory.dmp upx behavioral2/memory/4768-13-0x0000000066000000-0x000000006618C000-memory.dmp upx behavioral2/memory/4768-15-0x0000000066000000-0x000000006618C000-memory.dmp upx behavioral2/memory/4768-41-0x0000000066000000-0x000000006618C000-memory.dmp upx -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA d8a977071676464fe8d540d72fc99acf.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini MSBuild.exe File opened for modification C:\Windows\assembly\Desktop.ini MSBuild.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4768 d8a977071676464fe8d540d72fc99acf.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4768 set thread context of 4532 4768 d8a977071676464fe8d540d72fc99acf.exe 131 -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\assembly MSBuild.exe File created C:\Windows\assembly\Desktop.ini MSBuild.exe File opened for modification C:\Windows\assembly\Desktop.ini MSBuild.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3100 schtasks.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{4495AD01-C993-11D1-A3E4-00A0C90AEA82}\TypeLib\Version = "6.0" d8a977071676464fe8d540d72fc99acf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B28FA150-0FF0-11CF-A911-00AA0062BB4C}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" d8a977071676464fe8d540d72fc99acf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{CBB76011-C508-11D1-A3E3-00A0C90AEA82} d8a977071676464fe8d540d72fc99acf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EB41E8C4-4442-11D1-8906-00A0C9110049}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" d8a977071676464fe8d540d72fc99acf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FCFB3D2B-A0FA-1068-A738-08002B3371B5}\TypeLib d8a977071676464fe8d540d72fc99acf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EB41E8C1-4442-11D1-8906-00A0C9110049}\ = "_DDataBoundClass" d8a977071676464fe8d540d72fc99acf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EB41E8C3-4442-11D1-8906-00A0C9110049}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" d8a977071676464fe8d540d72fc99acf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{41A7D760-6018-11CF-9016-00AA0068841E}\TypeLib\Version = "6.0" d8a977071676464fe8d540d72fc99acf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8284B8A2-A8A8-11D1-A3D2-00A0C90AEA82}\ = "LicenseInfo" d8a977071676464fe8d540d72fc99acf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{83C49FF0-B294-11D0-9488-00A0C91110ED} d8a977071676464fe8d540d72fc99acf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A4C466B8-499F-101B-BB78-00AA00383CBB}\ProxyStubClsid32 d8a977071676464fe8d540d72fc99acf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{EA544A21-C82D-11D1-A3E4-00A0C90AEA82}\6.0\9\win32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\REV_1907.DLL\\3" d8a977071676464fe8d540d72fc99acf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{4495AD01-C993-11D1-A3E4-00A0C90AEA82}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" d8a977071676464fe8d540d72fc99acf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D4E0F020-720A-11CF-8136-00AA00C14959}\TypeLib\ = "{EA544A21-C82D-11D1-A3E4-00A0C90AEA82}" d8a977071676464fe8d540d72fc99acf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FCFB3D2B-A0FA-1068-A738-08002B3371B5}\TypeLib\ = "{EA544A21-C82D-11D1-A3E4-00A0C90AEA82}" d8a977071676464fe8d540d72fc99acf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A4C46780-499F-101B-BB78-00AA00383CBB}\TypeLib d8a977071676464fe8d540d72fc99acf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{45046D60-08CA-11CF-A90F-00AA0062BB4C}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" d8a977071676464fe8d540d72fc99acf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B28FA150-0FF0-11CF-A911-00AA0062BB4C} d8a977071676464fe8d540d72fc99acf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B28FA150-0FF0-11CF-A911-00AA0062BB4C}\TypeLib d8a977071676464fe8d540d72fc99acf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EB41E8C3-4442-11D1-8906-00A0C9110049}\TypeLib\Version = "6.0" d8a977071676464fe8d540d72fc99acf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EB41E8C5-4442-11D1-8906-00A0C9110049}\ = "_DPersistableDataSourceClass" d8a977071676464fe8d540d72fc99acf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7500A6BA-EB65-11D1-938D-0000F87557C9} d8a977071676464fe8d540d72fc99acf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{83C49FF0-B294-11D0-9488-00A0C91110ED}\ProxyStubClsid32 d8a977071676464fe8d540d72fc99acf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{737361EC-467F-11D1-810F-0000F87557AA}\TypeLib\Version = "6.0" d8a977071676464fe8d540d72fc99acf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A4C46780-499F-101B-BB78-00AA00383CBB} d8a977071676464fe8d540d72fc99acf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A4C46780-499F-101B-BB78-00AA00383CBB}\ = "_Collection" d8a977071676464fe8d540d72fc99acf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C4D651F2-7697-11D1-A1E9-00A0C90F2731}\ProxyStubClsid32 d8a977071676464fe8d540d72fc99acf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C4D651F2-7697-11D1-A1E9-00A0C90F2731}\TypeLib\ = "{EA544A21-C82D-11D1-A3E4-00A0C90AEA82}" d8a977071676464fe8d540d72fc99acf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{888A5A60-B283-11CF-8AD5-00A0C90AEA82}\TypeLib d8a977071676464fe8d540d72fc99acf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EB41E8C2-4442-11D1-8906-00A0C9110049} d8a977071676464fe8d540d72fc99acf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EB41E8C5-4442-11D1-8906-00A0C9110049}\TypeLib d8a977071676464fe8d540d72fc99acf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BE8F9800-2AAA-11CF-AD67-00AA00614F3E}\ProxyStubClsid32 d8a977071676464fe8d540d72fc99acf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C0324960-2AAA-11CF-AD67-00AA00614F3E}\TypeLib d8a977071676464fe8d540d72fc99acf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C4D651F0-7697-11D1-A1E9-00A0C90F2731}\ = "EventParameter" d8a977071676464fe8d540d72fc99acf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EB41E8C1-4442-11D1-8906-00A0C9110049}\TypeLib\ = "{EA544A21-C82D-11D1-A3E4-00A0C90AEA82}" d8a977071676464fe8d540d72fc99acf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{83C49FF0-B294-11D0-9488-00A0C91110ED}\TypeLib d8a977071676464fe8d540d72fc99acf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A4C466B8-499F-101B-BB78-00AA00383CBB}\TypeLib d8a977071676464fe8d540d72fc99acf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A4C46780-499F-101B-BB78-00AA00383CBB}\TypeLib\Version = "6.0" d8a977071676464fe8d540d72fc99acf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{888A5A60-B283-11CF-8AD5-00A0C90AEA82} d8a977071676464fe8d540d72fc99acf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EB41E8C2-4442-11D1-8906-00A0C9110049}\ProxyStubClsid32 d8a977071676464fe8d540d72fc99acf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7500A6BA-EB65-11D1-938D-0000F87557C9}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" d8a977071676464fe8d540d72fc99acf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8284B8A2-A8A8-11D1-A3D2-00A0C90AEA82} d8a977071676464fe8d540d72fc99acf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D5DE8D20-5BB8-11D1-A1E3-00A0C90F2731}\InProcServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\REV_1907.DLL" d8a977071676464fe8d540d72fc99acf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C4D651F2-7697-11D1-A1E9-00A0C90F2731}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" d8a977071676464fe8d540d72fc99acf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{888A5A60-B283-11CF-8AD5-00A0C90AEA82}\ProxyStubClsid32 d8a977071676464fe8d540d72fc99acf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{14E469E0-BF61-11CF-8385-8F69D8F1350B} d8a977071676464fe8d540d72fc99acf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{14E469E0-BF61-11CF-8385-8F69D8F1350B}\ = "AsyncProperty_VB5" d8a977071676464fe8d540d72fc99acf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{737361EC-467F-11D1-810F-0000F87557AA} d8a977071676464fe8d540d72fc99acf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E43FD401-8715-11D1-98E7-00A0C9702442}\ProxyStubClsid32 d8a977071676464fe8d540d72fc99acf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C4D651F0-7697-11D1-A1E9-00A0C90F2731}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" d8a977071676464fe8d540d72fc99acf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EB41E8C5-4442-11D1-8906-00A0C9110049}\TypeLib\Version = "6.0" d8a977071676464fe8d540d72fc99acf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EB41E8C1-4442-11D1-8906-00A0C9110049}\TypeLib d8a977071676464fe8d540d72fc99acf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B28FA150-0FF0-11CF-A911-00AA0062BB4C}\TypeLib\Version = "6.0" d8a977071676464fe8d540d72fc99acf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{CBB76011-C508-11D1-A3E3-00A0C90AEA82}\TypeLib\Version = "6.0" d8a977071676464fe8d540d72fc99acf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{83C49FF0-B294-11D0-9488-00A0C91110ED}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" d8a977071676464fe8d540d72fc99acf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A4C46780-499F-101B-BB78-00AA00383CBB}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" d8a977071676464fe8d540d72fc99acf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{41A7D761-6018-11CF-9016-00AA0068841E}\TypeLib\Version = "6.0" d8a977071676464fe8d540d72fc99acf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B28FA150-0FF0-11CF-A911-00AA0062BB4C}\ = "AmbientProperties" d8a977071676464fe8d540d72fc99acf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8284B8A2-A8A8-11D1-A3D2-00A0C90AEA82}\TypeLib d8a977071676464fe8d540d72fc99acf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C4D651F2-7697-11D1-A1E9-00A0C90F2731}\TypeLib\Version = "6.0" d8a977071676464fe8d540d72fc99acf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{83C49FF0-B294-11D0-9488-00A0C91110ED}\TypeLib\Version = "6.0" d8a977071676464fe8d540d72fc99acf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EB41E8C4-4442-11D1-8906-00A0C9110049}\ = "_DPersistableClass" d8a977071676464fe8d540d72fc99acf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{737361EC-467F-11D1-810F-0000F87557AA}\ProxyStubClsid32 d8a977071676464fe8d540d72fc99acf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2CE46480-1A08-11CF-AD63-00AA00614F3E}\TypeLib\Version = "6.0" d8a977071676464fe8d540d72fc99acf.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4768 d8a977071676464fe8d540d72fc99acf.exe 4768 d8a977071676464fe8d540d72fc99acf.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4532 MSBuild.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4532 MSBuild.exe Token: 33 4532 MSBuild.exe Token: SeIncBasePriorityPrivilege 4532 MSBuild.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4768 d8a977071676464fe8d540d72fc99acf.exe 4532 MSBuild.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4768 wrote to memory of 3100 4768 d8a977071676464fe8d540d72fc99acf.exe 97 PID 4768 wrote to memory of 3100 4768 d8a977071676464fe8d540d72fc99acf.exe 97 PID 4768 wrote to memory of 3100 4768 d8a977071676464fe8d540d72fc99acf.exe 97 PID 4768 wrote to memory of 4840 4768 d8a977071676464fe8d540d72fc99acf.exe 100 PID 4768 wrote to memory of 4840 4768 d8a977071676464fe8d540d72fc99acf.exe 100 PID 4768 wrote to memory of 4840 4768 d8a977071676464fe8d540d72fc99acf.exe 100 PID 4768 wrote to memory of 2176 4768 d8a977071676464fe8d540d72fc99acf.exe 101 PID 4768 wrote to memory of 2176 4768 d8a977071676464fe8d540d72fc99acf.exe 101 PID 4768 wrote to memory of 2176 4768 d8a977071676464fe8d540d72fc99acf.exe 101 PID 4768 wrote to memory of 3668 4768 d8a977071676464fe8d540d72fc99acf.exe 102 PID 4768 wrote to memory of 3668 4768 d8a977071676464fe8d540d72fc99acf.exe 102 PID 4768 wrote to memory of 3668 4768 d8a977071676464fe8d540d72fc99acf.exe 102 PID 4768 wrote to memory of 3400 4768 d8a977071676464fe8d540d72fc99acf.exe 103 PID 4768 wrote to memory of 3400 4768 d8a977071676464fe8d540d72fc99acf.exe 103 PID 4768 wrote to memory of 3400 4768 d8a977071676464fe8d540d72fc99acf.exe 103 PID 4768 wrote to memory of 3316 4768 d8a977071676464fe8d540d72fc99acf.exe 123 PID 4768 wrote to memory of 3316 4768 d8a977071676464fe8d540d72fc99acf.exe 123 PID 4768 wrote to memory of 3316 4768 d8a977071676464fe8d540d72fc99acf.exe 123 PID 4768 wrote to memory of 4500 4768 d8a977071676464fe8d540d72fc99acf.exe 122 PID 4768 wrote to memory of 4500 4768 d8a977071676464fe8d540d72fc99acf.exe 122 PID 4768 wrote to memory of 4500 4768 d8a977071676464fe8d540d72fc99acf.exe 122 PID 4768 wrote to memory of 2076 4768 d8a977071676464fe8d540d72fc99acf.exe 121 PID 4768 wrote to memory of 2076 4768 d8a977071676464fe8d540d72fc99acf.exe 121 PID 4768 wrote to memory of 2076 4768 d8a977071676464fe8d540d72fc99acf.exe 121 PID 4768 wrote to memory of 4396 4768 d8a977071676464fe8d540d72fc99acf.exe 120 PID 4768 wrote to memory of 4396 4768 d8a977071676464fe8d540d72fc99acf.exe 120 PID 4768 wrote to memory of 4396 4768 d8a977071676464fe8d540d72fc99acf.exe 120 PID 4768 wrote to memory of 4932 4768 d8a977071676464fe8d540d72fc99acf.exe 119 PID 4768 wrote to memory of 4932 4768 d8a977071676464fe8d540d72fc99acf.exe 119 PID 4768 wrote to memory of 4932 4768 d8a977071676464fe8d540d72fc99acf.exe 119 PID 4768 wrote to memory of 2608 4768 d8a977071676464fe8d540d72fc99acf.exe 118 PID 4768 wrote to memory of 2608 4768 d8a977071676464fe8d540d72fc99acf.exe 118 PID 4768 wrote to memory of 2608 4768 d8a977071676464fe8d540d72fc99acf.exe 118 PID 4768 wrote to memory of 4312 4768 d8a977071676464fe8d540d72fc99acf.exe 104 PID 4768 wrote to memory of 4312 4768 d8a977071676464fe8d540d72fc99acf.exe 104 PID 4768 wrote to memory of 4312 4768 d8a977071676464fe8d540d72fc99acf.exe 104 PID 4768 wrote to memory of 2256 4768 d8a977071676464fe8d540d72fc99acf.exe 117 PID 4768 wrote to memory of 2256 4768 d8a977071676464fe8d540d72fc99acf.exe 117 PID 4768 wrote to memory of 2256 4768 d8a977071676464fe8d540d72fc99acf.exe 117 PID 4768 wrote to memory of 4760 4768 d8a977071676464fe8d540d72fc99acf.exe 116 PID 4768 wrote to memory of 4760 4768 d8a977071676464fe8d540d72fc99acf.exe 116 PID 4768 wrote to memory of 4760 4768 d8a977071676464fe8d540d72fc99acf.exe 116 PID 4768 wrote to memory of 3744 4768 d8a977071676464fe8d540d72fc99acf.exe 115 PID 4768 wrote to memory of 3744 4768 d8a977071676464fe8d540d72fc99acf.exe 115 PID 4768 wrote to memory of 3744 4768 d8a977071676464fe8d540d72fc99acf.exe 115 PID 4768 wrote to memory of 4180 4768 d8a977071676464fe8d540d72fc99acf.exe 108 PID 4768 wrote to memory of 4180 4768 d8a977071676464fe8d540d72fc99acf.exe 108 PID 4768 wrote to memory of 4180 4768 d8a977071676464fe8d540d72fc99acf.exe 108 PID 4768 wrote to memory of 4152 4768 d8a977071676464fe8d540d72fc99acf.exe 106 PID 4768 wrote to memory of 4152 4768 d8a977071676464fe8d540d72fc99acf.exe 106 PID 4768 wrote to memory of 4152 4768 d8a977071676464fe8d540d72fc99acf.exe 106 PID 4768 wrote to memory of 4588 4768 d8a977071676464fe8d540d72fc99acf.exe 105 PID 4768 wrote to memory of 4588 4768 d8a977071676464fe8d540d72fc99acf.exe 105 PID 4768 wrote to memory of 4588 4768 d8a977071676464fe8d540d72fc99acf.exe 105 PID 4768 wrote to memory of 636 4768 d8a977071676464fe8d540d72fc99acf.exe 107 PID 4768 wrote to memory of 636 4768 d8a977071676464fe8d540d72fc99acf.exe 107 PID 4768 wrote to memory of 636 4768 d8a977071676464fe8d540d72fc99acf.exe 107 PID 4768 wrote to memory of 1872 4768 d8a977071676464fe8d540d72fc99acf.exe 114 PID 4768 wrote to memory of 1872 4768 d8a977071676464fe8d540d72fc99acf.exe 114 PID 4768 wrote to memory of 1872 4768 d8a977071676464fe8d540d72fc99acf.exe 114 PID 4768 wrote to memory of 456 4768 d8a977071676464fe8d540d72fc99acf.exe 113 PID 4768 wrote to memory of 456 4768 d8a977071676464fe8d540d72fc99acf.exe 113 PID 4768 wrote to memory of 456 4768 d8a977071676464fe8d540d72fc99acf.exe 113 PID 4768 wrote to memory of 4756 4768 d8a977071676464fe8d540d72fc99acf.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\d8a977071676464fe8d540d72fc99acf.exe"C:\Users\Admin\AppData\Local\Temp\d8a977071676464fe8d540d72fc99acf.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /TN REV_3576 /TR "'wscript.exe' C:\Users\Admin\AppData\Roaming\{SWR2-FK23-IDQR-PRXQ-JDF9-6YT9}\\Silent.vbs C:\Users\Admin\AppData\Roaming\{SWR2-FK23-IDQR-PRXQ-JDF9-6YT9}\\REV_2807.cmd" /sc ONLOGON /RL HIGHEST /F2⤵
- Creates scheduled task(s)
PID:3100
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe"2⤵PID:4840
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe"2⤵PID:2176
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe"2⤵PID:3668
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe"2⤵PID:3400
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe"2⤵PID:4312
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe"2⤵PID:4588
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe"2⤵PID:4152
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe"2⤵PID:636
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe"2⤵PID:4180
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe"2⤵PID:3124
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe"2⤵PID:1412
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe"2⤵PID:1940
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe"2⤵PID:4756
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe"2⤵PID:456
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe"2⤵PID:1872
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe"2⤵PID:3744
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe"2⤵PID:4760
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe"2⤵PID:2256
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe"2⤵PID:2608
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe"2⤵PID:4932
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe"2⤵PID:4396
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe"2⤵PID:2076
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe"2⤵PID:4500
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe"2⤵PID:3316
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe"2⤵PID:2488
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe"2⤵PID:3292
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe"2⤵PID:3520
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe"2⤵PID:4608
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe"2⤵PID:1424
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe"2⤵PID:4916
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe"2⤵PID:3652
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe"2⤵
- Drops desktop.ini file(s)
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4532
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe"2⤵PID:3724
-
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:1048
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
625KB
MD5eccf28d7e5ccec24119b88edd160f8f4
SHA198509587a3d37a20b56b50fd57f823a1691a034c
SHA256820c83c0533cfce2928e29edeaf6c255bc19ac9718b25a5656d99ffac30a03d6
SHA512c1c94bbb781625b2317f0a8178d3a10d891fb71bca8f82cd831c484e8ab125301b82a14fe2ff070dc99a496cc00234300fa5536401018c40d49d44ae89409670
-
Filesize
1.6MB
MD54f3387277ccbd6d1f21ac5c07fe4ca68
SHA1e16506f662dc92023bf82def1d621497c8ab5890
SHA256767a3fc4a7a6818cdc3f0b99aaa95db694f6bcde719d2057a88b3d4df3d74fac
SHA5129da199ac69e3c0d4e0c6307e0ab8178f12cc25cb2f14c3511f6b64e6e60a925c860f3263cb38353a97b55a71ef4d27f8cb7fa3cfc08e7c1a349fd8d209dfa219