Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    1383s
  • max time network
    1162s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/05/2024, 14:58

General

  • Target

    vddinstall.bat

  • Size

    420B

  • MD5

    ee1bfb5ccbb3949e3258155e141a68a5

  • SHA1

    b79dd1e75e3e7acd8d21d7b17c86673a6c6383d9

  • SHA256

    1e7c35eb6c296f96aee5ae4bbbd40395e8019bde95ef9bef91260dd8ef03c6d1

  • SHA512

    b37d680f5dab52536926c718eb1b4c1f0e78552c061756f998e3a3ccb2dc4fbea15dd1a4b181646a68a2987a22ce225c185c2ef2bb1d10a70c780ada8cf9f9aa

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Drops file in System32 directory 16 IoCs
  • Drops file in Windows directory 7 IoCs
  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 41 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\vddinstall.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3152
    • C:\Users\Admin\AppData\Local\Temp\nefconw.exe
      .\nefconw.exe --remove-device-node --hardware-id Root\Parsec\VDA --class-guid "4D36E968-E325-11CE-BFC1-08002BE10318"
      2⤵
        PID:1404
      • C:\Users\Admin\AppData\Local\Temp\nefconw.exe
        .\nefconw.exe --create-device-node --class-name Display --class-guid "4D36E968-E325-11CE-BFC1-08002BE10318" --hardware-id Root\Parsec\VDA
        2⤵
        • Drops file in Windows directory
        PID:2476
      • C:\Users\Admin\AppData\Local\Temp\nefconw.exe
        .\nefconw.exe --install-driver --inf-path ".\driver\mm.inf"
        2⤵
        • Drops file in Windows directory
        • Checks SCSI registry key(s)
        • Suspicious use of AdjustPrivilegeToken
        PID:4352
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k DcomLaunch -p -s DeviceInstall
      1⤵
      • Drops file in Windows directory
      • Checks SCSI registry key(s)
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4892
      • C:\Windows\system32\DrvInst.exe
        DrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{932cdb2d-c33b-fa46-9c15-e307944505ee}\mm.inf" "9" "484386e17" "000000000000014C" "WinSta0\Default" "0000000000000164" "208" "C:\Users\Admin\AppData\Local\Temp\driver"
        2⤵
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Checks SCSI registry key(s)
        • Modifies data under HKEY_USERS
        PID:2856
      • C:\Windows\system32\DrvInst.exe
        DrvInst.exe "2" "201" "ROOT\DISPLAY\0000" "C:\Windows\System32\DriverStore\FileRepository\mm.inf_amd64_615d17457058f652\mm.inf" "oem3.inf:*:*:0.45.0.0:Root\Parsec\VDA," "484386e17" "000000000000014C"
        2⤵
        • Drops file in Drivers directory
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Checks SCSI registry key(s)
        • Suspicious use of AdjustPrivilegeToken
        PID:1580

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\{932CD~1\mm.cat

      Filesize

      11KB

      MD5

      1fe1fc7cc73fb17e995d65835d51ca94

      SHA1

      249acf0a3a362b2163127bd76f6d4d6aa463297d

      SHA256

      136e64ac07dce5a3b4935d5a9c5cfe03983c0b3065f46a30a45536d5b1681d5c

      SHA512

      31fe1bdcb5f243a6eecc40006fc70793bc5aea9d95ffe449117cb67366f0f120c393716ffe93b65a73c8b2dfe02917f1d0dcf4ca62aa302fe685513b8cc80bdc

    • C:\Users\Admin\AppData\Local\Temp\{932CD~1\mm.dll

      Filesize

      169KB

      MD5

      f09967cc8cc9bf03612ddecb6bf86daa

      SHA1

      166f8e3000b6a1e2b13b46e85b7559b9837b9aa7

      SHA256

      96db6ae2f950b56e52be3e68f92893afa94645eae09fea2abd5dd1985758150a

      SHA512

      190d2edea81c42a2d7a5bc69cb98f03368e702a5fcb3fc1dcd4e9c387687bab542e4b0e5de67292e8b8a7efed7fd9e30d1efdd35bcdfea28417de71db0e13864

    • C:\Users\Admin\AppData\Local\Temp\{932cdb2d-c33b-fa46-9c15-e307944505ee}\mm.inf

      Filesize

      4KB

      MD5

      d8030afe09a2f984be00389b31f7039b

      SHA1

      ab7a55fa6641cc31b0b7e70c8680bbbd553fc8a1

      SHA256

      34da9ff45c13577631f67e33d11b8a26e3d22ca685d00c388b6122a795800588

      SHA512

      0787e9e95369686b20bcbddb9ff984111c4ed53a064fc8f198691db5c124dfbe1b1f4d434dbfd81482545b723c01325ed9bcc626f461191b3ae4095222df10a6