Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
3Static
static
3Setup_Pswrd_1234.rar
windows11-21h2-x64
3Help/en-US...ts.rtf
windows11-21h2-x64
1Help/nvcpl/nv3d.chm
windows11-21h2-x64
1Help/nvcpl...ra.chm
windows11-21h2-x64
1Help/nvcpl...hs.chm
windows11-21h2-x64
1Help/nvcpl...ht.chm
windows11-21h2-x64
1Help/nvcpl...sy.chm
windows11-21h2-x64
1Help/nvcpl...an.chm
windows11-21h2-x64
1Help/nvcpl...eu.chm
windows11-21h2-x64
1Help/nvcpl...ll.chm
windows11-21h2-x64
1Help/nvcpl...ng.chm
windows11-21h2-x64
1Help/nvcpl...sm.chm
windows11-21h2-x64
1Help/nvcpl...sn.chm
windows11-21h2-x64
1Help/nvcpl...in.chm
windows11-21h2-x64
1Help/nvcpl...ra.chm
windows11-21h2-x64
1Help/nvcpl...eb.chm
windows11-21h2-x64
1Help/nvcpl...un.chm
windows11-21h2-x64
1Help/nvcpl...ta.chm
windows11-21h2-x64
1Help/nvcpl...pn.chm
windows11-21h2-x64
1Help/nvcpl...or.chm
windows11-21h2-x64
1Help/nvcpl...ld.chm
windows11-21h2-x64
1Help/nvcpl...or.chm
windows11-21h2-x64
1Help/nvcpl...lk.chm
windows11-21h2-x64
1Help/nvcpl...tb.chm
windows11-21h2-x64
1Help/nvcpl...tg.chm
windows11-21h2-x64
1Help/nvcpl...us.chm
windows11-21h2-x64
1Help/nvcpl...ky.chm
windows11-21h2-x64
1Help/nvcpl...lv.chm
windows11-21h2-x64
1Help/nvcpl...ve.chm
windows11-21h2-x64
1Help/nvcpl...ha.chm
windows11-21h2-x64
1Help/nvcpl...rk.chm
windows11-21h2-x64
1Help/nvcpl/nvcpl.chm
windows11-21h2-x64
1Resubmissions
20/02/2024, 16:33
240220-t2xz7sbd71 3Analysis
-
max time kernel
46s -
max time network
53s -
platform
windows11-21h2_x64 -
resource
win11-20240214-en -
resource tags
arch:x64arch:x86image:win11-20240214-enlocale:en-usos:windows11-21h2-x64system -
submitted
20/02/2024, 16:33
Static task
static1
Behavioral task
behavioral1
Sample
Setup_Pswrd_1234.rar
Resource
win11-20240214-en
Behavioral task
behavioral2
Sample
Help/en-US/credits.rtf
Resource
win11-20240214-en
Behavioral task
behavioral3
Sample
Help/nvcpl/nv3d.chm
Resource
win11-20240214-en
Behavioral task
behavioral4
Sample
Help/nvcpl/nv3dara.chm
Resource
win11-20240214-en
Behavioral task
behavioral5
Sample
Help/nvcpl/nv3dchs.chm
Resource
win11-20240214-en
Behavioral task
behavioral6
Sample
Help/nvcpl/nv3dcht.chm
Resource
win11-20240214-en
Behavioral task
behavioral7
Sample
Help/nvcpl/nv3dcsy.chm
Resource
win11-20240214-en
Behavioral task
behavioral8
Sample
Help/nvcpl/nv3ddan.chm
Resource
win11-20240214-en
Behavioral task
behavioral9
Sample
Help/nvcpl/nv3ddeu.chm
Resource
win11-20240214-en
Behavioral task
behavioral10
Sample
Help/nvcpl/nv3dell.chm
Resource
win11-20240214-en
Behavioral task
behavioral11
Sample
Help/nvcpl/nv3deng.chm
Resource
win11-20240214-en
Behavioral task
behavioral12
Sample
Help/nvcpl/nv3desm.chm
Resource
win11-20240214-en
Behavioral task
behavioral13
Sample
Help/nvcpl/nv3desn.chm
Resource
win11-20240214-en
Behavioral task
behavioral14
Sample
Help/nvcpl/nv3dfin.chm
Resource
win11-20240214-en
Behavioral task
behavioral15
Sample
Help/nvcpl/nv3dfra.chm
Resource
win11-20240214-en
Behavioral task
behavioral16
Sample
Help/nvcpl/nv3dheb.chm
Resource
win11-20240214-en
Behavioral task
behavioral17
Sample
Help/nvcpl/nv3dhun.chm
Resource
win11-20240214-en
Behavioral task
behavioral18
Sample
Help/nvcpl/nv3dita.chm
Resource
win11-20240214-en
Behavioral task
behavioral19
Sample
Help/nvcpl/nv3djpn.chm
Resource
win11-20240214-en
Behavioral task
behavioral20
Sample
Help/nvcpl/nv3dkor.chm
Resource
win11-20240214-en
Behavioral task
behavioral21
Sample
Help/nvcpl/nv3dnld.chm
Resource
win11-20240214-en
Behavioral task
behavioral22
Sample
Help/nvcpl/nv3dnor.chm
Resource
win11-20240214-en
Behavioral task
behavioral23
Sample
Help/nvcpl/nv3dplk.chm
Resource
win11-20240214-en
Behavioral task
behavioral24
Sample
Help/nvcpl/nv3dptb.chm
Resource
win11-20240214-en
Behavioral task
behavioral25
Sample
Help/nvcpl/nv3dptg.chm
Resource
win11-20240214-en
Behavioral task
behavioral26
Sample
Help/nvcpl/nv3drus.chm
Resource
win11-20240214-en
Behavioral task
behavioral27
Sample
Help/nvcpl/nv3dsky.chm
Resource
win11-20240214-en
Behavioral task
behavioral28
Sample
Help/nvcpl/nv3dslv.chm
Resource
win11-20240214-en
Behavioral task
behavioral29
Sample
Help/nvcpl/nv3dsve.chm
Resource
win11-20240214-en
Behavioral task
behavioral30
Sample
Help/nvcpl/nv3dtha.chm
Resource
win11-20240214-en
Behavioral task
behavioral31
Sample
Help/nvcpl/nv3dtrk.chm
Resource
win11-20240214-en
Behavioral task
behavioral32
Sample
Help/nvcpl/nvcpl.chm
Resource
win11-20240214-en
General
-
Target
Setup_Pswrd_1234.rar
-
Size
28.5MB
-
MD5
8e886544b00b5710bac224ebd2e1f2c2
-
SHA1
519329906aa00ac1e608a9600b0b8e26fcf63125
-
SHA256
2177c05b9d345994c968639d176bae2cf1f61b2a08ce49229023a66a3b96b315
-
SHA512
d856704bbf38582ecb28afab9ef56f536579f3c8e2e863bd59ab52a3be0ccc156e1702da8bd62775f461f0f8d732bd849c49fdab8d8fc2faf944edb67798f74a
-
SSDEEP
786432:FTyfMzlfPaaEP4fUNDPJJ8vegFK7D+lC8R3Hic:FuEZHaBh/8vegFK7T63Hic
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 POWERPNT.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz POWERPNT.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString POWERPNT.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU POWERPNT.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS POWERPNT.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily POWERPNT.EXE -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-579863200-1180944266-3450597144-1000_Classes\Local Settings cmd.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 236 POWERPNT.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeRestorePrivilege 5040 7zFM.exe Token: 35 5040 7zFM.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 5040 7zFM.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 236 POWERPNT.EXE 236 POWERPNT.EXE 236 POWERPNT.EXE 236 POWERPNT.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4652 wrote to memory of 5040 4652 cmd.exe 77 PID 4652 wrote to memory of 5040 4652 cmd.exe 77
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Setup_Pswrd_1234.rar1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4652 -
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Setup_Pswrd_1234.rar"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:5040
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4140
-
C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE"C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE" /s "C:\Users\Admin\Downloads\TestStep.pps" /ou ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:236