Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
7DeskSpaceT...up.exe
windows7-x64
7DeskSpaceT...up.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDIR/UAC.dll
windows7-x64
3$PLUGINSDIR/UAC.dll
windows10-2004-x64
3deskspace.exe
windows7-x64
1deskspace.exe
windows10-2004-x64
7deskspace1554.dll
windows7-x64
1deskspace1554.dll
windows10-2004-x64
1deskspace1554_x64.dll
windows7-x64
1deskspace1554_x64.dll
windows10-2004-x64
1deskspace_x64.exe
windows7-x64
1deskspace_x64.exe
windows10-2004-x64
1help/html/...e.html
windows7-x64
1help/html/...e.html
windows10-2004-x64
1help/html/...d.html
windows7-x64
1help/html/...d.html
windows10-2004-x64
1help/html/...e.html
windows7-x64
1help/html/...e.html
windows10-2004-x64
1help/index.html
windows7-x64
1help/index.html
windows10-2004-x64
1uninstaller.exe
windows7-x64
7uninstaller.exe
windows10-2004-x64
7$PLUGINSDIR/UAC.dll
windows7-x64
3$PLUGINSDIR/UAC.dll
windows10-2004-x64
3新云软件.url
windows7-x64
1新云软件.url
windows10-2004-x64
1Analysis
-
max time kernel
7s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12/01/2024, 08:24
Behavioral task
behavioral1
Sample
DeskSpaceTrialSetup.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
DeskSpaceTrialSetup.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/UAC.dll
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/UAC.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
deskspace.exe
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
deskspace.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
deskspace1554.dll
Resource
win7-20231129-en
Behavioral task
behavioral10
Sample
deskspace1554.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
deskspace1554_x64.dll
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
deskspace1554_x64.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral13
Sample
deskspace_x64.exe
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
deskspace_x64.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral15
Sample
help/html/configuring_deskspace.html
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
help/html/configuring_deskspace.html
Resource
win10v2004-20231215-en
Behavioral task
behavioral17
Sample
help/html/getting_started.html
Resource
win7-20231215-en
Behavioral task
behavioral18
Sample
help/html/getting_started.html
Resource
win10v2004-20231215-en
Behavioral task
behavioral19
Sample
help/html/using_deskspace.html
Resource
win7-20231215-en
Behavioral task
behavioral20
Sample
help/html/using_deskspace.html
Resource
win10v2004-20231222-en
Behavioral task
behavioral21
Sample
help/index.html
Resource
win7-20231215-en
Behavioral task
behavioral22
Sample
help/index.html
Resource
win10v2004-20231215-en
Behavioral task
behavioral23
Sample
uninstaller.exe
Resource
win7-20231215-en
Behavioral task
behavioral24
Sample
uninstaller.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral25
Sample
$PLUGINSDIR/UAC.dll
Resource
win7-20231129-en
Behavioral task
behavioral26
Sample
$PLUGINSDIR/UAC.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral27
Sample
新云软件.url
Resource
win7-20231215-en
Behavioral task
behavioral28
Sample
新云软件.url
Resource
win10v2004-20231215-en
General
-
Target
deskspace.exe
-
Size
1.5MB
-
MD5
fd0a106014f362778569d61e64b73d24
-
SHA1
b18f602d1fd9c13385af854ff8df36968a142fbb
-
SHA256
4b34f71c40f17285191010f398707ae4d0e2312c989546b047791529fc95cee7
-
SHA512
340695bb352ddb4d4bfd3605d9ec2e20c5f67efe96017f87dd9441a868b9196c7ad20a85e62eeae3c26a087f7edf2c838c96eddfc3a157c9676aabc7cdcede80
-
SSDEEP
24576:xbT3qj3IFVBN2ndhfVvZ3a/2ZuZz+cYxTlbEWRyYhoIjjxx:tT3qj3IVyVEeZ1cs79mIjjxx
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate deskspace.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion deskspace.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies Control Panel 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\Desktop deskspace.exe Key created \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\Colors deskspace.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 1808 deskspace.exe 1808 deskspace.exe 1808 deskspace.exe 1808 deskspace.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1808 deskspace.exe 1808 deskspace.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1808 deskspace.exe 1808 deskspace.exe 1808 deskspace.exe 1808 deskspace.exe 1808 deskspace.exe -
Suspicious use of WriteProcessMemory 31 IoCs
description pid Process procid_target PID 1808 wrote to memory of 3600 1808 deskspace.exe 49 PID 1808 wrote to memory of 3600 1808 deskspace.exe 49 PID 1808 wrote to memory of 3600 1808 deskspace.exe 49 PID 1808 wrote to memory of 3600 1808 deskspace.exe 49 PID 1808 wrote to memory of 3600 1808 deskspace.exe 49 PID 1808 wrote to memory of 3600 1808 deskspace.exe 49 PID 1808 wrote to memory of 3600 1808 deskspace.exe 49 PID 1808 wrote to memory of 3600 1808 deskspace.exe 49 PID 1808 wrote to memory of 3600 1808 deskspace.exe 49 PID 1808 wrote to memory of 3600 1808 deskspace.exe 49 PID 1808 wrote to memory of 3600 1808 deskspace.exe 49 PID 1808 wrote to memory of 3600 1808 deskspace.exe 49 PID 1808 wrote to memory of 3600 1808 deskspace.exe 49 PID 1808 wrote to memory of 3600 1808 deskspace.exe 49 PID 1808 wrote to memory of 3600 1808 deskspace.exe 49 PID 1808 wrote to memory of 3600 1808 deskspace.exe 49 PID 1808 wrote to memory of 3600 1808 deskspace.exe 49 PID 1808 wrote to memory of 3600 1808 deskspace.exe 49 PID 1808 wrote to memory of 3600 1808 deskspace.exe 49 PID 1808 wrote to memory of 3600 1808 deskspace.exe 49 PID 1808 wrote to memory of 3600 1808 deskspace.exe 49 PID 1808 wrote to memory of 3600 1808 deskspace.exe 49 PID 1808 wrote to memory of 3600 1808 deskspace.exe 49 PID 1808 wrote to memory of 3600 1808 deskspace.exe 49 PID 1808 wrote to memory of 3600 1808 deskspace.exe 49 PID 1808 wrote to memory of 3600 1808 deskspace.exe 49 PID 1808 wrote to memory of 3600 1808 deskspace.exe 49 PID 1808 wrote to memory of 3600 1808 deskspace.exe 49 PID 1808 wrote to memory of 3600 1808 deskspace.exe 49 PID 1808 wrote to memory of 3600 1808 deskspace.exe 49 PID 1808 wrote to memory of 3600 1808 deskspace.exe 49
Processes
-
C:\Users\Admin\AppData\Local\Temp\deskspace.exe"C:\Users\Admin\AppData\Local\Temp\deskspace.exe"1⤵
- Checks BIOS information in registry
- Modifies Control Panel
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Users\Admin\AppData\Local\Temp\deskspace_x64.exe"C:\Users\Admin\AppData\Local\Temp\deskspace_x64.exe"2⤵PID:3220
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3600