Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

22/05/2024, 01:04

240522-be1hpsff2v 4

21/05/2024, 23:24

240521-3dwxnsde6v 4

Analysis

  • max time kernel
    531s
  • max time network
    449s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240508-en
  • resource tags

    arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    22/05/2024, 01:04

General

  • Target

    Denetty_Driver PCIe NVMe/Intel(R)_USB_3.0_eXtensible_Host_Controller_Driver_5.0.4.43_v2/Lang/zh-TW/license.txt

  • Size

    29KB

  • MD5

    5e5e454c196013ad785d75b21ac77118

  • SHA1

    2d650f1da0d2a24878ae83ba66086b9b63b6bbef

  • SHA256

    1157e131bc75fc8b536e71ee902bed17c28fb0c0365c9aaf3e9c867daca7f07e

  • SHA512

    93118fe0549d19a976a53ea10a1f648d2d81e8ca99a4b83bab508bd0b7eccd1460f6a42356f1054b1bea820d4667f9deccbb07b9476bdbb0c2ed34eeed7c2bfa

  • SSDEEP

    384:lvWSjfg/ost9xsi4jgtostAtqmb1r1M3zDfoK7SF8BfIXRdKcUVfjK7SFi1f0XRV:laruMoqwrOla8BfIrKcnai1f0T

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies data under HKEY_USERS 5 IoCs
  • Modifies registry class 34 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\Denetty_Driver PCIe NVMe\Intel(R)_USB_3.0_eXtensible_Host_Controller_Driver_5.0.4.43_v2\Lang\zh-TW\license.txt"
    1⤵
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1892
    • C:\Windows\system32\NOTEPAD.EXE
      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\Denetty_Driver PCIe NVMe\Intel(R)_USB_3.0_eXtensible_Host_Controller_Driver_5.0.4.43_v2\Lang\zh-TW\license.txt
      2⤵
        PID:4496
    • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\WebExperienceHostApp.exe
      "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\WebExperienceHostApp.exe" -ServerName:WebExperienceHost.AppXpahb3h9jz84zbzgmz4ndmjv3nas4ah73.mca
      1⤵
      • Modifies Internet Explorer settings
      • Modifies data under HKEY_USERS
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:4772
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc
      1⤵
        PID:708
      • C:\Windows\system32\BackgroundTransferHost.exe
        "BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.13
        1⤵
        • Modifies registry class
        PID:928

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\BackgroundTransferApi\06baff86-a3f6-4600-b35e-86374368a7d1.down_data

        Filesize

        555KB

        MD5

        5683c0028832cae4ef93ca39c8ac5029

        SHA1

        248755e4e1db552e0b6f8651b04ca6d1b31a86fb

        SHA256

        855abd360d8a8d6974eba92b70cbd09ce519bc8773439993f9ab37cb6847309e

        SHA512

        aba434bd29be191c823b02ea9b639beb10647bbe7759bbffdaa790dfb1ec2c58d74c525ef11aacda209e4effe322d1d3a07b115446c8914b07a3bce4d8a0e2c3

      • memory/4772-121-0x0000029FF7A80000-0x0000029FF7B80000-memory.dmp

        Filesize

        1024KB

      • memory/4772-237-0x0000029FF8570000-0x0000029FF8590000-memory.dmp

        Filesize

        128KB

      • memory/4772-460-0x0000029FFA100000-0x0000029FFA200000-memory.dmp

        Filesize

        1024KB