Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/02/2024, 19:17

General

  • Target

    PSPMencoder.exe

  • Size

    2.5MB

  • MD5

    8464394f47d1b2b00944b6bd75ba5226

  • SHA1

    b3b02c06403a64f9d360225f7923f1e19c00a539

  • SHA256

    31405f0862472d9877ee66fc592c5d50e0ec5e44725831932593088202cca642

  • SHA512

    f413ed1a2f966e9364138b30f23320e9d531d7926013352d70c7896bb4b8fe926b76ec7546fcf1a50e5068624012312b275d5067f3f44c82b8a406c17c029cfe

  • SSDEEP

    49152:SQQ99NtzK6mlE+t7U20LlzFAhVf+5XWV6lFO9RC4LcWoRCdUPjRUir:aD+dU20LlzFAhVW5XWQLO9RoRCdUPjRJ

Score
1/10

Malware Config

Signatures

  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\PSPMencoder.exe
    "C:\Users\Admin\AppData\Local\Temp\PSPMencoder.exe"
    1⤵
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3828
    • C:\Windows\SysWOW64\regsvr32.exe
      regsvr32 "C:\Users\Admin\AppData\Local\Temp\QvodInsert.dll" /s
      2⤵
        PID:4900
      • C:\Windows\SysWOW64\regsvr32.exe
        regsvr32 "C:\Users\Admin\AppData\Local\Temp\VnetClinfo.ocx" /s
        2⤵
        • Modifies registry class
        PID:4280
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c regtvdllCCTVUpdateInstall.dll.bat
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1756
        • C:\Windows\SysWOW64\regsvr32.exe
          regsvr32 "C:\Users\Admin\AppData\Local\Temp\mod\CCTVUpdateInstall.dll" /s
          3⤵
            PID:2852
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c regtvdllCCTVPlayer.ocx.bat
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:2728
          • C:\Windows\SysWOW64\regsvr32.exe
            regsvr32 "C:\Users\Admin\AppData\Local\Temp\mod\CCTVPlayer.ocx" /s
            3⤵
              PID:3136
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c regtvdllReli_CCTV.dll.bat
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:884
            • C:\Windows\SysWOW64\regsvr32.exe
              regsvr32 "C:\Users\Admin\AppData\Local\Temp\mod\Reli_CCTV.dll" /s
              3⤵
              • Modifies registry class
              PID:2776

        Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\QvodCfg.ini

          Filesize

          292B

          MD5

          a671d3d075bd4fb6e24efbd2ff6b984a

          SHA1

          ec6cc7b141cdd5cd45a198dd20878f8038364040

          SHA256

          b315b489492b336207dea7f9a956d1da68405ddac8f5e0b81b14d5dead1e1f29

          SHA512

          bc194acfd64d274febee0d6876544c3a3ee759f84ecc0c4b098d1a88d2e26405f6c4d19d320b7ca63ff94f1e07e798eabbfbc3bebcf38489599c9b60207a56b2

        • C:\Users\Admin\AppData\Local\Temp\config.dll

          Filesize

          185B

          MD5

          3a03fd02ec2c4a8594040d25e1234ec2

          SHA1

          41c9dbc98f14f04bd88b2149d615f96758bbddb1

          SHA256

          207ccf7b56f8a780d2cc2b744d32e52fdd4ce6074ca94ad4153160469f7e99ad

          SHA512

          a5a3d4c8de44eb81fbf4d036809b12318f919a3941d9e99f8e8d7406c4eb4874deb274905a8d20cbf44c64b27e0b2d822cdde661e9ea88933c889e5c9e5e9461

        • C:\Users\Admin\AppData\Local\Temp\regtvdllCCTVPlayer.ocx.bat

          Filesize

          122B

          MD5

          c444d18db692685402218008375621d5

          SHA1

          16df7100180f98f284f7e1e03b12ad2acd67bfbe

          SHA256

          cdc0acafbe9318790cc423af79b78dbe1312566177f7968f193f0538948ed31d

          SHA512

          7ad2265cfb2995c738652accc6e4a52ca1b8360594e54687a01972954f6179ff7228ab1ab075387b7b2b14780b7b58235312288b39b781031a87e614ff5f4784

        • C:\Users\Admin\AppData\Local\Temp\regtvdllCCTVUpdateInstall.dll.bat

          Filesize

          136B

          MD5

          093157afd2189f85f6ff43f1c7d346f7

          SHA1

          fa3bf14e8815b35ce8e7ee82d3007f06321c2b5e

          SHA256

          f049fa2c8465660a3b10db1ecb6bc9e0d2aaa1e5176ee2b90e1ac6fc1a561a75

          SHA512

          df5b31570160516330f6a553dbe69ebb496107df6efa0023baa3f019fad7f5cd6da66c5a80116adbd344e3068086eba6068793c5309a1ee59b4c5306bb6ba62a

        • C:\Users\Admin\AppData\Local\Temp\regtvdllReli_CCTV.dll.bat

          Filesize

          120B

          MD5

          a3b3e0b89cf93ff854bac31c0f5dd47e

          SHA1

          0d92e673cc424d60eab529d8af01148fb106825b

          SHA256

          414e23a013713aadcc561d23d04f62c95b8f74c47fef2cdd6e1c67baae4db06f

          SHA512

          d98f8826f43a1642c23110b2c21538a145ae2ce54379deb6f55c2a291a3726337c48b519631dee7904be7810e08d21f7d3434024cda1bb1220997ec397583c61

        • memory/4280-2-0x00000000009B0000-0x00000000009BD000-memory.dmp

          Filesize

          52KB