Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    141s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-es
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-eslocale:es-esos:windows10-2004-x64systemwindows
  • submitted
    04/05/2024, 14:48

General

  • Target

    MonectRuntimeCheck.exe

  • Size

    121KB

  • MD5

    855868707c8daba66438545fba07b490

  • SHA1

    cb28feed2dc91fbb47dd3da4527ac7fb00a04f25

  • SHA256

    7a3846a11ebe48d769c2983931fad9c71a924b2f0d892a478aeff528e108883e

  • SHA512

    df3cd7a00eb562412b204cbb8e06cb31917b665f01cb9f521a8ba66ede8440b208f705da17159048e34327ca00d0c1b926bd1a78c0543c272203cb749c55dca3

  • SSDEEP

    768:kLnW4UkQyOM9aV1+qXUpv9Sbh9SbPvNnr2u+vTS+ST6nkM:k7hUFyOyaV1+f9C4vNrxk/me

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 9 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Modifies Windows Firewall 2 TTPs 3 IoCs
  • Drops file in System32 directory 50 IoCs
  • Drops file in Windows directory 11 IoCs
  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 25 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\MonectRuntimeCheck.exe
    "C:\Users\Admin\AppData\Local\Temp\MonectRuntimeCheck.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2400
    • C:\Users\Admin\AppData\Local\Temp\driververifyx64.exe
      "C:\Users\Admin\AppData\Local\Temp\driververifyx64.exe"
      2⤵
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Checks SCSI registry key(s)
      • Suspicious use of AdjustPrivilegeToken
      PID:4288
    • C:\Windows\System32\netsh.exe
      advfirewall firewall add rule name="MonectServerService" dir=in action=allow program="C:\Users\Admin\AppData\Local\Temp\MonectServerService.exe" enable=yes
      2⤵
      • Modifies Windows Firewall
      PID:1968
    • C:\Windows\System32\netsh.exe
      advfirewall firewall add rule name="PCRemoteReceiver" dir=in action=allow program="C:\Users\Admin\AppData\Local\Temp\PCRemoteReceiver.exe" enable=yes
      2⤵
      • Modifies Windows Firewall
      PID:1272
    • C:\Windows\System32\netsh.exe
      advfirewall firewall add rule name="MonectMediaCenter" dir=in action=allow program="C:\Users\Admin\AppData\Local\Temp\MonectMediaCenter.exe" enable=yes
      2⤵
      • Modifies Windows Firewall
      PID:912
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k DcomLaunch -p -s DeviceInstall
    1⤵
    • Drops file in Windows directory
    • Checks SCSI registry key(s)
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3860
    • C:\Windows\system32\DrvInst.exe
      DrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{1e34059f-ac64-c340-b79a-81fe00628a98}\vjoy.inf" "9" "49e52482b" "0000000000000138" "WinSta0\Default" "0000000000000150" "208" "c:\users\admin\appdata\local\temp\driver\vjoy"
      2⤵
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Checks SCSI registry key(s)
      • Modifies data under HKEY_USERS
      PID:3988
    • C:\Windows\system32\DrvInst.exe
      DrvInst.exe "2" "211" "ROOT\HIDCLASS\0000" "C:\Windows\INF\oem3.inf" "oem3.inf:b2fe4818a00a2e82:vjoy.Inst.Win7:12.53.21.621:root\vid_1234&pid_bead&rev_0219," "49e52482b" "000000000000014C"
      2⤵
      • Drops file in Drivers directory
      • Drops file in Windows directory
      • Checks SCSI registry key(s)
      • Suspicious use of AdjustPrivilegeToken
      PID:4816
    • C:\Windows\system32\DrvInst.exe
      DrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{d45dc6c6-e4ab-b042-8a95-ba20246fbe80}\vigembus.inf" "9" "429a86e87" "0000000000000168" "WinSta0\Default" "0000000000000138" "208" "c:\users\admin\appdata\local\temp\driver\vigem"
      2⤵
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Checks SCSI registry key(s)
      • Modifies data under HKEY_USERS
      PID:1736
    • C:\Windows\system32\DrvInst.exe
      DrvInst.exe "2" "211" "ROOT\SYSTEM\0001" "C:\Windows\INF\oem4.inf" "oem4.inf:c14ce88408607219:ViGEmBus_Device:1.16.112.0:nefarius\vigembus\gen1," "429a86e87" "0000000000000168"
      2⤵
      • Drops file in Drivers directory
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Checks SCSI registry key(s)
      • Suspicious use of AdjustPrivilegeToken
      PID:3804
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x45c 0x490
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1776
  • C:\Users\Admin\AppData\Local\Temp\MonectServerService.exe
    C:\Users\Admin\AppData\Local\Temp\MonectServerService.exe
    1⤵
    • Modifies data under HKEY_USERS
    • Suspicious use of WriteProcessMemory
    PID:4464
    • C:\Users\Admin\AppData\Local\Temp\driververifyx64.exe
      -disable
      2⤵
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Checks SCSI registry key(s)
      • Suspicious use of AdjustPrivilegeToken
      PID:4196
    • C:\Users\Admin\AppData\Local\Temp\MonectServer.exe
      "C:\Users\Admin\AppData\Local\Temp\MonectServer.exe"
      2⤵
        PID:2320

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\{1E340~1\WdfCoInstaller01009.dll

      Filesize

      1.7MB

      MD5

      5cb42a31e35004ad81e5e89092adf3bc

      SHA1

      afdd47f3a2ec58f15abb2626e1233f5e356e8908

      SHA256

      44812fe5fe3b848d7d592278382c7c0370eba3115a9bd7f8db22efb89d1ed2b3

      SHA512

      328b35bb2b4963abc01602e2f0a78bf540c12e055bea3990d346e06edf53b5682c3387b6f86fbcf8552e2714c9d3ae6db28ca2a37a2bceb9db7e97076e932c1e

    • C:\Users\Admin\AppData\Local\Temp\{1E340~1\vJoy.cat

      Filesize

      11KB

      MD5

      fb06e77f7c7bc0902d416c079c32d6a3

      SHA1

      b75aee99d492d84e83cc5ddba4791b8d2a570e7a

      SHA256

      784ea14d897c88be331d5c129d254a3a09add3d47066ad2879adecef3f00c97d

      SHA512

      1d0299593a0ce9ec23784b52602475ddea6e1b86dd3a02173061fdd9b724627265a3d6f8f08fd955615b972e9887111158fb86125c0dfde3659b4854294b66cb

    • C:\Users\Admin\AppData\Local\Temp\{1E340~1\vjoy.sys

      Filesize

      65KB

      MD5

      cc63b7e91816e5001fe79a840916f1c9

      SHA1

      63ff46f8b85bc29e298ef2ac7a434ff2df49918e

      SHA256

      297f9c12df8bd91640439c0bf7fe1ee391bbd01d330f5e1604a29c4669977774

      SHA512

      58fdcec81b6cff4e0d3a44ca93cfe1d86d8849afd0dd31af3a0d6e94483b5492a0f4729b3a0996084b56d4f5584166c4902abe195784ac7c2584489d699f0e48

    • C:\Users\Admin\AppData\Local\Temp\{1e34059f-ac64-c340-b79a-81fe00628a98}\vjoy.inf

      Filesize

      10KB

      MD5

      731f3d80f2296e3e13f4335885fa2556

      SHA1

      27e8a4a8eb907b1b1c8b720ef02a45bf9b1c6124

      SHA256

      33fe32886a8bf72769c3e4991265546c3d1cca9247dbb661f23f7f82362226a4

      SHA512

      b154c375f49934c1858646e9e750fcb7b06d6c453f61d283bb5ee5d2fe509f887d796d722d8fb7084734ee178549a33a85b23d012dc9bcd5c74136700dc4ceb4

    • C:\Users\Admin\AppData\Local\Temp\{D45DC~1\x64\ViGEmBus.sys

      Filesize

      67KB

      MD5

      129165f67ccbb25be6be8ae2f0c15dda

      SHA1

      499865e046dc1d70edbf2a31ef06c03b6c6ea855

      SHA256

      1a1e57cb0dd7ca08d96bbb1b6ce667e3273702c13a7ecf86839b7642ef8255e0

      SHA512

      4666cf73ef77b0e7b86822fdc18743d41496c46686a91535ed7757dbdb8e0354489383aa4a27ab943e26360e8e1c8aed5600724034e0e6c38163faea24344ca2

    • C:\Users\Admin\AppData\Local\Temp\{d45dc6c6-e4ab-b042-8a95-ba20246fbe80}\vigembus.inf

      Filesize

      2KB

      MD5

      c75c1a401eba37e59c4477b22f8ced9b

      SHA1

      5e845664f66e4d005fa2b041db4c9f6bf0d564a9

      SHA256

      63774d6149f036c0d9faf98b062fea6b97debed559a9522099e46b54fe58da40

      SHA512

      1a12908961361eeea00b98174434e931f5d575a9cf72858a21536c2900c7c55107b5d34952cc149119572d3ea93e3c7d2fca018dd3535660dfb008c82eff8bb2

    • C:\Windows\System32\CatRoot2\dberr.txt

      Filesize

      37KB

      MD5

      86cbfd0dc01f55e339e3ea03ee7c8d4f

      SHA1

      811e9442a3fa364d74fed315db2ea9a47076dd4a

      SHA256

      03d33867407fc586002a720d35b4b2370842022fbdd09bd12e135d028b627b7a

      SHA512

      0beada07e5ef386cad16762f8e6b511eb360da8cb56374bf5c3be899214f6f2b1278fc24318af3f64b44ac74dbaeec257ba9f9f91bb394f7c078ef153f968065

    • C:\Windows\System32\DriverStore\Temp\{8cd2fd13-c14c-f84e-8c76-231e5b90be89}\SET49CB.tmp

      Filesize

      26KB

      MD5

      bffc21f44b02fbdd4a09c445db87ec59

      SHA1

      f7ca5a2d0b2eb9ecaf75cbfcc73eeb65889490c8

      SHA256

      8668f69c256baff9422ac9b3ab77448c21b5043547920591148b152cb3afb0d2

      SHA512

      87ee090ed4581650a491df30e26da5420ae4d6a83d178ae9e0b0ca419e367a5f31424df407d0fab55a78f2300a712c66c62ef15425e44ae5bd8100f790fbda78

    • C:\Windows\System32\DriverStore\Temp\{fa702f1c-aac6-434b-abfc-197e16fddc1d}\SET4E41.tmp

      Filesize

      9KB

      MD5

      e67c26e6c46015f05da50046aacf8581

      SHA1

      32dfcee6d080e1b0c8012f8a6198f1e7d2afa3a0

      SHA256

      5b03a642a52d5ee895931c8fad98b2a67f20331c313aec42aa96d76c9c3ff928

      SHA512

      dd197b897c71f11abb9eefbad70691ed0b2b2ad0636616276d08d2c2a002b99e1ff7c5c47a54df94967f9a9f8c977fafba247f6aecfaa917dfb7efdb2d983493

    • C:\Windows\System32\DriverStore\Temp\{fa702f1c-aac6-434b-abfc-197e16fddc1d}\x64\SET4E40.tmp

      Filesize

      1.7MB

      MD5

      f279d3e406114192148dd976de222138

      SHA1

      0567e9073c46c40e60e2ecd0a509579f029efd8e

      SHA256

      1a7627c11aecf24e8e0c9a519498e8456f0457bd89f0ffe649bd8fb53a194f89

      SHA512

      e72d1011bd3c4208c3733228aac45a6ae00c3979ffb49130d4141293764db1b91551edf9340b5cc5c987b848e3ffc661b8084923c2032b175fcf55321f42dc25