Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    1792s
  • max time network
    1802s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/05/2024, 14:58

General

  • Target

    vdd/parsec-vdd.exe

  • Size

    505KB

  • MD5

    4b9a3048286692a865187013b70f44e8

  • SHA1

    eefe91d9702314341acccd828fe4edb6ee570d7b

  • SHA256

    e23332448fdaf5aa017cb308db5ef6855fac526a7ded05d80c039404126d5362

  • SHA512

    a38b9a0a1626d9f40ff2c718717a793108c7e773b25493cc53c595e6b9840cc4de66587549f43ce00569b368834327184a90d55da3c4ae0e269e1d0edef6238d

  • SSDEEP

    12288:QbLQNEFqf6MouZQqdF9zuAkDjdCjXHSZz2AKhAOYYA:QbUNEFKXrZ6ZjdFZxKhAOYv

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Drops file in System32 directory 16 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 8 IoCs
  • Drops file in Windows directory 7 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 15 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 41 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 16 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\vdd\parsec-vdd.exe
    "C:\Users\Admin\AppData\Local\Temp\vdd\parsec-vdd.exe"
    1⤵
    • Drops file in Program Files directory
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:3700
    • C:\Windows\SysWOW64\wevtutil.exe
      wevtutil um "C:\Program Files\Parsec Virtual Display Driver\mm.man"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4284
      • C:\Windows\System32\wevtutil.exe
        wevtutil um "C:\Program Files\Parsec Virtual Display Driver\mm.man" /fromwow64
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:3236
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Program Files\Parsec Virtual Display Driver\vddinstall.bat""
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1396
      • C:\Program Files\Parsec Virtual Display Driver\nefconw.exe
        .\nefconw.exe --remove-device-node --hardware-id Root\Parsec\VDA --class-guid "4D36E968-E325-11CE-BFC1-08002BE10318"
        3⤵
        • Executes dropped EXE
        PID:5048
      • C:\Program Files\Parsec Virtual Display Driver\nefconw.exe
        .\nefconw.exe --create-device-node --class-name Display --class-guid "4D36E968-E325-11CE-BFC1-08002BE10318" --hardware-id Root\Parsec\VDA
        3⤵
        • Drops file in Windows directory
        • Executes dropped EXE
        PID:3984
      • C:\Program Files\Parsec Virtual Display Driver\nefconw.exe
        .\nefconw.exe --install-driver --inf-path ".\driver\mm.inf"
        3⤵
        • Drops file in Windows directory
        • Executes dropped EXE
        • Checks SCSI registry key(s)
        • Suspicious use of AdjustPrivilegeToken
        PID:3744
    • C:\Windows\SysWOW64\wevtutil.exe
      wevtutil im "C:\Program Files\Parsec Virtual Display Driver\mm.man"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4252
      • C:\Windows\System32\wevtutil.exe
        wevtutil im "C:\Program Files\Parsec Virtual Display Driver\mm.man" /fromwow64
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2440
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k DcomLaunch -p -s DeviceInstall
    1⤵
    • Drops file in Windows directory
    • Checks SCSI registry key(s)
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4056
    • C:\Windows\system32\DrvInst.exe
      DrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{a02f1a9b-3584-9343-8b28-cfced7b3294d}\mm.inf" "9" "484386e17" "0000000000000148" "WinSta0\Default" "0000000000000158" "208" "C:\Program Files\Parsec Virtual Display Driver\driver"
      2⤵
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Checks SCSI registry key(s)
      • Modifies data under HKEY_USERS
      PID:1700
    • C:\Windows\system32\DrvInst.exe
      DrvInst.exe "2" "201" "ROOT\DISPLAY\0000" "C:\Windows\System32\DriverStore\FileRepository\mm.inf_amd64_615d17457058f652\mm.inf" "oem3.inf:*:*:0.45.0.0:Root\Parsec\VDA," "484386e17" "0000000000000178"
      2⤵
      • Drops file in Drivers directory
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Checks SCSI registry key(s)
      • Suspicious use of AdjustPrivilegeToken
      PID:4948
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3768 --field-trial-handle=2284,i,15722001240173834669,15048020084704567542,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:2100
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4268 --field-trial-handle=2284,i,15722001240173834669,15048020084704567542,262144 --variations-seed-version /prefetch:8
      1⤵
        PID:2620

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\PROGRA~1\PARSEC~1\driver\mm.cat

        Filesize

        11KB

        MD5

        1fe1fc7cc73fb17e995d65835d51ca94

        SHA1

        249acf0a3a362b2163127bd76f6d4d6aa463297d

        SHA256

        136e64ac07dce5a3b4935d5a9c5cfe03983c0b3065f46a30a45536d5b1681d5c

        SHA512

        31fe1bdcb5f243a6eecc40006fc70793bc5aea9d95ffe449117cb67366f0f120c393716ffe93b65a73c8b2dfe02917f1d0dcf4ca62aa302fe685513b8cc80bdc

      • C:\PROGRA~1\PARSEC~1\driver\mm.dll

        Filesize

        169KB

        MD5

        f09967cc8cc9bf03612ddecb6bf86daa

        SHA1

        166f8e3000b6a1e2b13b46e85b7559b9837b9aa7

        SHA256

        96db6ae2f950b56e52be3e68f92893afa94645eae09fea2abd5dd1985758150a

        SHA512

        190d2edea81c42a2d7a5bc69cb98f03368e702a5fcb3fc1dcd4e9c387687bab542e4b0e5de67292e8b8a7efed7fd9e30d1efdd35bcdfea28417de71db0e13864

      • C:\Program Files\Parsec Virtual Display Driver\driver\mm.inf

        Filesize

        4KB

        MD5

        d8030afe09a2f984be00389b31f7039b

        SHA1

        ab7a55fa6641cc31b0b7e70c8680bbbd553fc8a1

        SHA256

        34da9ff45c13577631f67e33d11b8a26e3d22ca685d00c388b6122a795800588

        SHA512

        0787e9e95369686b20bcbddb9ff984111c4ed53a064fc8f198691db5c124dfbe1b1f4d434dbfd81482545b723c01325ed9bcc626f461191b3ae4095222df10a6

      • C:\Program Files\Parsec Virtual Display Driver\mm.man

        Filesize

        6KB

        MD5

        481369808b1b657547bcd92a897c58c0

        SHA1

        847723989cf3c9c98b64549090e8260c922d9201

        SHA256

        e6a9944ca554b25d67b47b4d0dfbada6ea5ae7cb208b9ec09cfe6132bab4600f

        SHA512

        42e6e7332dc0a6b14b308a4f04f1afdfcf950c6fcaa6609dd1730bd0a7aa6d764f56be05a45e94877b6d4028e0a312029baa7fa67f49d280f05a6ffe069d9e77

      • C:\Program Files\Parsec Virtual Display Driver\nefconw.exe

        Filesize

        574KB

        MD5

        e9f2bc8c82ac755f47c7f89d1530f1a1

        SHA1

        7ce5938c4b8a3eb4de49f7a7e34972f5f2acfcb5

        SHA256

        cf746d1b0bbb713993d4a90dccd774c78d9fff8c2ba5a054b6c8f56c77e1eee1

        SHA512

        86ed0a391d22631da9bdc7eb9cb096ba4de4c6619c6c4326030cb03d196b63e5aa156bac264a48d5b4cda7401844a3b5050259b41859d32e0c4d39b96913c2ce

      • C:\Program Files\Parsec Virtual Display Driver\vddinstall.bat

        Filesize

        420B

        MD5

        ee1bfb5ccbb3949e3258155e141a68a5

        SHA1

        b79dd1e75e3e7acd8d21d7b17c86673a6c6383d9

        SHA256

        1e7c35eb6c296f96aee5ae4bbbd40395e8019bde95ef9bef91260dd8ef03c6d1

        SHA512

        b37d680f5dab52536926c718eb1b4c1f0e78552c061756f998e3a3ccb2dc4fbea15dd1a4b181646a68a2987a22ce225c185c2ef2bb1d10a70c780ada8cf9f9aa

      • C:\Users\Admin\AppData\Local\Temp\nst1BB2.tmp\System.dll

        Filesize

        12KB

        MD5

        cff85c549d536f651d4fb8387f1976f2

        SHA1

        d41ce3a5ff609df9cf5c7e207d3b59bf8a48530e

        SHA256

        8dc562cda7217a3a52db898243de3e2ed68b80e62ddcb8619545ed0b4e7f65a8

        SHA512

        531d6328daf3b86d85556016d299798fa06fefc81604185108a342d000e203094c8c12226a12bd6e1f89b0db501fb66f827b610d460b933bd4ab936ac2fd8a88

      • C:\Users\Admin\AppData\Local\Temp\nst1BB2.tmp\nsExec.dll

        Filesize

        7KB

        MD5

        675c4948e1efc929edcabfe67148eddd

        SHA1

        f5bdd2c4329ed2732ecfe3423c3cc482606eb28e

        SHA256

        1076ca39c449ed1a968021b76ef31f22a5692dfafeea29460e8d970a63c59906

        SHA512

        61737021f86f54279d0a4e35db0d0808e9a55d89784a31d597f2e4b65b7bbeec99aa6c79d65258259130eeda2e5b2820f4f1247777a3010f2dc53e30c612a683