Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
47s -
max time network
85s -
platform
windows10-1703_x64 -
resource
win10-20240221-en -
resource tags
arch:x64arch:x86image:win10-20240221-enlocale:en-usos:windows10-1703-x64system -
submitted
28/02/2024, 19:57
Static task
static1
Behavioral task
behavioral1
Sample
VMware Workstation Pro Full 2023 v23.0.01 + Patch.exe
Resource
win10-20240221-en
Errors
General
-
Target
VMware Workstation Pro Full 2023 v23.0.01 + Patch.exe
-
Size
594.9MB
-
MD5
7e680bb7565e19a287163ff51d3ebf7c
-
SHA1
3780d44b47a530f7ac07873b3b7cf3ae72511d01
-
SHA256
93d3013f0a9155d6618915dd3e4dd68c2d180d6ea2baa77eb96965006e676a8f
-
SHA512
fc2eab22f8573c0c385aab8673f4eb22d802b5568eceed2f3df1d23e3332c5e80ce5f3d7bcc6276448e8967b97bc90f134d75e7e2900289c9235808ee54b0eee
-
SSDEEP
12582912:fnXZ/3yW7J9gw0021l1VPRnzTYQEELLNKKvEHQZZQCVZZm6jP3S5pWWQN5gn+WVM:Q
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
pid Process 4332 VMware Workstation Pro Full 2023 v23.0.01 + Patch.tmp 1288 setup.exe -
Loads dropped DLL 11 IoCs
pid Process 1288 setup.exe 1288 setup.exe 1288 setup.exe 1288 setup.exe 1288 setup.exe 1288 setup.exe 1288 setup.exe 1288 setup.exe 1288 setup.exe 1288 setup.exe 1288 setup.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\VMware Workstation Pro Full 2023 v23.0.01 + Patch\unins000.dat VMware Workstation Pro Full 2023 v23.0.01 + Patch.tmp File created C:\Program Files (x86)\VMware Workstation Pro Full 2023 v23.0.01 + Patch\is-3SEFN.tmp VMware Workstation Pro Full 2023 v23.0.01 + Patch.tmp File opened for modification C:\Program Files (x86)\VMware Workstation Pro Full 2023 v23.0.01 + Patch\unins000.dat VMware Workstation Pro Full 2023 v23.0.01 + Patch.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 15 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "1" LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4332 VMware Workstation Pro Full 2023 v23.0.01 + Patch.tmp 4332 VMware Workstation Pro Full 2023 v23.0.01 + Patch.tmp -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 1132 VMware Workstation Pro Full 2023 v23.0.01 + Patch.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4332 VMware Workstation Pro Full 2023 v23.0.01 + Patch.tmp -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3860 LogonUI.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1132 wrote to memory of 4332 1132 VMware Workstation Pro Full 2023 v23.0.01 + Patch.exe 76 PID 1132 wrote to memory of 4332 1132 VMware Workstation Pro Full 2023 v23.0.01 + Patch.exe 76 PID 1132 wrote to memory of 4332 1132 VMware Workstation Pro Full 2023 v23.0.01 + Patch.exe 76 PID 4332 wrote to memory of 1288 4332 VMware Workstation Pro Full 2023 v23.0.01 + Patch.tmp 77 PID 4332 wrote to memory of 1288 4332 VMware Workstation Pro Full 2023 v23.0.01 + Patch.tmp 77 PID 4332 wrote to memory of 1288 4332 VMware Workstation Pro Full 2023 v23.0.01 + Patch.tmp 77
Processes
-
C:\Users\Admin\AppData\Local\Temp\VMware Workstation Pro Full 2023 v23.0.01 + Patch.exe"C:\Users\Admin\AppData\Local\Temp\VMware Workstation Pro Full 2023 v23.0.01 + Patch.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Users\Admin\AppData\Local\Temp\is-657OG.tmp\VMware Workstation Pro Full 2023 v23.0.01 + Patch.tmp"C:\Users\Admin\AppData\Local\Temp\is-657OG.tmp\VMware Workstation Pro Full 2023 v23.0.01 + Patch.tmp" /SL5="$501E4,623000314,832512,C:\Users\Admin\AppData\Local\Temp\VMware Workstation Pro Full 2023 v23.0.01 + Patch.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4332 -
C:\Users\Admin\AppData\Local\Temp\is-M7TV9.tmp\setup.exe"C:\Users\Admin\AppData\Local\Temp\is-M7TV9.tmp\setup.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1288
-
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x0 /state0:0xa3af1855 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:3860
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5444bcb3a3fcf8389296c49467f27e1d6
SHA17a85f4764bbd6daf1c3545efbbf0f279a6dc0beb
SHA2562689367b205c16ce32ed4200942b8b8b1e262dfc70d9bc9fbc77c49699a4f1df
SHA5129fbbbb5a0f329f9782e2356fa41d89cf9b3694327c1a934d6af2a9df2d7f936ce83717fb513196a4ce5548471708cd7134c2ae99b3c357bcabb2eafc7b9b7570
-
C:\Users\Admin\AppData\Local\Temp\is-657OG.tmp\VMware Workstation Pro Full 2023 v23.0.01 + Patch.tmp
Filesize3.1MB
MD591936b89c960ba396f63854dc0d72fe9
SHA107dd963c77e275c338986363131fb64fa6caa8e8
SHA256e3f317709cf3c5cdee48763b493fa59881cfdd07fd22985c07910592d2c3e57c
SHA5129203515d65a7197d6296794a6a2ea045d08a1b17a5d2a297f150e89f93524e9f7e23e64ae57709622285b9c8e4105de4b8ec1679c5f4a5c442efc0464f1ed623
-
Filesize
67KB
MD561dff4cddd6e39d56855d3c000e69641
SHA184aea15fe6bfce328761473f65f56825d56a2266
SHA256f40ad5918fe55eb3347d6a8540aba56e0f23952f73ebfee1a327944aa3ee5429
SHA5121dbdecfd8c23fda953939c65359711b94eba0e045cbb6d0b653f3a2b4ac913513ca9269304069195fd0e5573689d5d6b28d67caf7a8689e94229498a5aef1425
-
Filesize
25KB
MD540d7eca32b2f4d29db98715dd45bfac5
SHA1124df3f617f562e46095776454e1c0c7bb791cc7
SHA25685e03805f90f72257dd41bfdaa186237218bbb0ec410ad3b6576a88ea11dccb9
SHA5125fd4f516ce23fb7e705e150d5c1c93fc7133694ba495fb73101674a528883a013a34ab258083aa7ce6072973b067a605158316a4c9159c1b4d765761f91c513d