Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
8Static
static
3parsec-windows.exe
windows7-x64
3parsec-windows.exe
windows10-2004-x64
3$PLUGINSDI...ID.dll
windows7-x64
3$PLUGINSDI...ID.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3parsecd.exe
windows7-x64
1parsecd.exe
windows10-2004-x64
1pservice.exe
windows7-x64
1pservice.exe
windows10-2004-x64
1skel/parse...3b.dll
windows7-x64
1skel/parse...3b.dll
windows10-2004-x64
1teams.exe
windows7-x64
1teams.exe
windows10-2004-x64
1vdd/parsec-vdd.exe
windows7-x64
3vdd/parsec-vdd.exe
windows10-2004-x64
8$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3driver/mm.dll
windows10-2004-x64
1nefconw.exe
windows7-x64
1nefconw.exe
windows10-2004-x64
1vddinstall.bat
windows7-x64
5vddinstall.bat
windows10-2004-x64
8vdduninstall.bat
windows7-x64
1vdduninstall.bat
windows10-2004-x64
4vusb/parsec-vud.exe
windows7-x64
3Analysis
-
max time kernel
1556s -
max time network
1563s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
01/05/2024, 14:58
Static task
static1
Behavioral task
behavioral1
Sample
parsec-windows.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
parsec-windows.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/ApplicationID.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/ApplicationID.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240215-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral11
Sample
parsecd.exe
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
parsecd.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral13
Sample
pservice.exe
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
pservice.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
skel/parsecd-150-93b.dll
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
skel/parsecd-150-93b.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral17
Sample
teams.exe
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
teams.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
vdd/parsec-vdd.exe
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
vdd/parsec-vdd.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral25
Sample
driver/mm.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral26
Sample
nefconw.exe
Resource
win7-20240221-en
Behavioral task
behavioral27
Sample
nefconw.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral28
Sample
vddinstall.bat
Resource
win7-20240221-en
Behavioral task
behavioral29
Sample
vddinstall.bat
Resource
win10v2004-20240419-en
Behavioral task
behavioral30
Sample
vdduninstall.bat
Resource
win7-20240220-en
Behavioral task
behavioral31
Sample
vdduninstall.bat
Resource
win10v2004-20240419-en
Behavioral task
behavioral32
Sample
vusb/parsec-vud.exe
Resource
win7-20240221-en
General
-
Target
vddinstall.bat
-
Size
420B
-
MD5
ee1bfb5ccbb3949e3258155e141a68a5
-
SHA1
b79dd1e75e3e7acd8d21d7b17c86673a6c6383d9
-
SHA256
1e7c35eb6c296f96aee5ae4bbbd40395e8019bde95ef9bef91260dd8ef03c6d1
-
SHA512
b37d680f5dab52536926c718eb1b4c1f0e78552c061756f998e3a3ccb2dc4fbea15dd1a4b181646a68a2987a22ce225c185c2ef2bb1d10a70c780ada8cf9f9aa
Malware Config
Signatures
-
Drops file in System32 directory 9 IoCs
description ioc Process File created C:\Windows\System32\DriverStore\Temp\{04c12136-4572-550e-86a8-e8687173300a}\SET7169.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{04c12136-4572-550e-86a8-e8687173300a}\SET7189.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{04c12136-4572-550e-86a8-e8687173300a}\mm.dll DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{04c12136-4572-550e-86a8-e8687173300a}\SET71B9.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{04c12136-4572-550e-86a8-e8687173300a}\SET7169.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{04c12136-4572-550e-86a8-e8687173300a}\mm.cat DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{04c12136-4572-550e-86a8-e8687173300a}\SET7189.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{04c12136-4572-550e-86a8-e8687173300a}\SET71B9.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{04c12136-4572-550e-86a8-e8687173300a}\mm.inf DrvInst.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\INF\setupapi.app.log nefconw.exe File opened for modification C:\Windows\setupact.log nefconw.exe File opened for modification C:\Windows\setuperr.log nefconw.exe File opened for modification C:\Windows\INF\setupapi.dev.log nefconw.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 DrvInst.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2568 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 28 IoCs
description pid Process Token: SeRestorePrivilege 2940 nefconw.exe Token: SeRestorePrivilege 2940 nefconw.exe Token: SeRestorePrivilege 2940 nefconw.exe Token: SeRestorePrivilege 2940 nefconw.exe Token: SeRestorePrivilege 2940 nefconw.exe Token: SeRestorePrivilege 2940 nefconw.exe Token: SeRestorePrivilege 2940 nefconw.exe Token: SeRestorePrivilege 2940 nefconw.exe Token: SeRestorePrivilege 2940 nefconw.exe Token: SeRestorePrivilege 2940 nefconw.exe Token: SeRestorePrivilege 2940 nefconw.exe Token: SeRestorePrivilege 2940 nefconw.exe Token: SeRestorePrivilege 2940 nefconw.exe Token: SeRestorePrivilege 2940 nefconw.exe Token: SeRestorePrivilege 2624 DrvInst.exe Token: SeRestorePrivilege 2624 DrvInst.exe Token: SeRestorePrivilege 2624 DrvInst.exe Token: SeRestorePrivilege 2624 DrvInst.exe Token: SeRestorePrivilege 2624 DrvInst.exe Token: SeRestorePrivilege 2624 DrvInst.exe Token: SeRestorePrivilege 2624 DrvInst.exe Token: SeRestorePrivilege 2568 rundll32.exe Token: SeRestorePrivilege 2568 rundll32.exe Token: SeRestorePrivilege 2568 rundll32.exe Token: SeRestorePrivilege 2568 rundll32.exe Token: SeRestorePrivilege 2568 rundll32.exe Token: SeRestorePrivilege 2568 rundll32.exe Token: SeRestorePrivilege 2568 rundll32.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1540 wrote to memory of 2696 1540 cmd.exe 29 PID 1540 wrote to memory of 2696 1540 cmd.exe 29 PID 1540 wrote to memory of 2696 1540 cmd.exe 29 PID 1540 wrote to memory of 2148 1540 cmd.exe 30 PID 1540 wrote to memory of 2148 1540 cmd.exe 30 PID 1540 wrote to memory of 2148 1540 cmd.exe 30 PID 1540 wrote to memory of 2940 1540 cmd.exe 31 PID 1540 wrote to memory of 2940 1540 cmd.exe 31 PID 1540 wrote to memory of 2940 1540 cmd.exe 31 PID 2624 wrote to memory of 2568 2624 DrvInst.exe 33 PID 2624 wrote to memory of 2568 2624 DrvInst.exe 33 PID 2624 wrote to memory of 2568 2624 DrvInst.exe 33
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\vddinstall.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Users\Admin\AppData\Local\Temp\nefconw.exe.\nefconw.exe --remove-device-node --hardware-id Root\Parsec\VDA --class-guid "4D36E968-E325-11CE-BFC1-08002BE10318"2⤵PID:2696
-
-
C:\Users\Admin\AppData\Local\Temp\nefconw.exe.\nefconw.exe --create-device-node --class-name Display --class-guid "4D36E968-E325-11CE-BFC1-08002BE10318" --hardware-id Root\Parsec\VDA2⤵
- Drops file in Windows directory
PID:2148
-
-
C:\Users\Admin\AppData\Local\Temp\nefconw.exe.\nefconw.exe --install-driver --inf-path ".\driver\mm.inf"2⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2940
-
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{18e4b176-12dc-701d-24ee-e20f9f50e611}\mm.inf" "9" "684386e17" "00000000000004A0" "WinSta0\Default" "00000000000003A4" "208" "C:\Users\Admin\AppData\Local\Temp\driver"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Windows\system32\pnpui.dll,InstallSecurityPromptRunDllW 10 Global\{6e8b1ec1-ccea-31d7-bde0-b519b9871607} Global\{5d6a5d75-347b-492b-7245-0e55d0e19748} C:\Windows\System32\DriverStore\Temp\{04c12136-4572-550e-86a8-e8687173300a}\mm.inf C:\Windows\System32\DriverStore\Temp\{04c12136-4572-550e-86a8-e8687173300a}\mm.cat2⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2568
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169KB
MD5f09967cc8cc9bf03612ddecb6bf86daa
SHA1166f8e3000b6a1e2b13b46e85b7559b9837b9aa7
SHA25696db6ae2f950b56e52be3e68f92893afa94645eae09fea2abd5dd1985758150a
SHA512190d2edea81c42a2d7a5bc69cb98f03368e702a5fcb3fc1dcd4e9c387687bab542e4b0e5de67292e8b8a7efed7fd9e30d1efdd35bcdfea28417de71db0e13864
-
Filesize
11KB
MD51fe1fc7cc73fb17e995d65835d51ca94
SHA1249acf0a3a362b2163127bd76f6d4d6aa463297d
SHA256136e64ac07dce5a3b4935d5a9c5cfe03983c0b3065f46a30a45536d5b1681d5c
SHA51231fe1bdcb5f243a6eecc40006fc70793bc5aea9d95ffe449117cb67366f0f120c393716ffe93b65a73c8b2dfe02917f1d0dcf4ca62aa302fe685513b8cc80bdc
-
Filesize
4KB
MD5d8030afe09a2f984be00389b31f7039b
SHA1ab7a55fa6641cc31b0b7e70c8680bbbd553fc8a1
SHA25634da9ff45c13577631f67e33d11b8a26e3d22ca685d00c388b6122a795800588
SHA5120787e9e95369686b20bcbddb9ff984111c4ed53a064fc8f198691db5c124dfbe1b1f4d434dbfd81482545b723c01325ed9bcc626f461191b3ae4095222df10a6