Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    151s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/05/2024, 07:29

General

  • Target

    BetterShaders.exe

  • Size

    168.8MB

  • MD5

    26e51744ce941b55c7653e9ab229a18f

  • SHA1

    bd08f0f5b3f64aba844128dfb2d77312bbef8b46

  • SHA256

    3bcf3c61e80cc6346a8af84c89ca2c50a9eef2b6b915c6c73fff8725f1c6b118

  • SHA512

    a308443b59a0a5713b99474e30f93a7f8cc98120c11c2f9f5884d5aa61bbf0073a6cfb1c67d676d64656988802fbf1bb8a1f5234df09b1fd2c36f5f7d3fed0a4

  • SSDEEP

    1572864:du3SXrDDmfijsEGl0y+Mgp4cLTRN/33i/oHHl9sqPwqZdsJ2DWw3h9JByba/:/XX++LYYyba

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • An obfuscated cmd.exe command-line is typically used to evade detection. 2 IoCs
  • Enumerates processes with tasklist 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 46 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\BetterShaders.exe
    "C:\Users\Admin\AppData\Local\Temp\BetterShaders.exe"
    1⤵
    • Checks computer location settings
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3800
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /d /s /c "tasklist"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3608
      • C:\Windows\system32\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • Suspicious use of AdjustPrivilegeToken
        PID:4432
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /d /s /c "powershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,6,99,59,19,92,149,197,65,145,228,210,141,215,140,131,116,0,0,0,0,2,0,0,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,155,35,83,190,139,240,78,64,183,181,176,71,154,136,46,8,154,175,198,238,66,163,199,19,96,154,189,19,157,7,98,100,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,121,32,168,152,124,29,126,161,46,102,36,210,172,232,79,133,7,149,72,161,111,219,248,207,78,78,45,212,7,0,196,95,48,0,0,0,254,221,17,226,162,246,210,144,181,174,8,17,112,91,2,188,27,116,7,240,53,165,197,248,206,109,93,19,115,128,29,174,255,134,212,76,70,27,93,216,139,50,1,209,204,193,59,55,64,0,0,0,207,184,225,20,186,104,44,46,202,44,51,151,158,1,215,252,254,82,197,210,118,130,96,79,86,107,109,226,74,57,130,147,113,159,137,248,111,189,48,247,47,64,190,226,117,187,13,62,42,36,201,25,51,96,88,26,62,114,5,242,86,224,211,96), $null, 'CurrentUser')"
      2⤵
      • An obfuscated cmd.exe command-line is typically used to evade detection.
      • Suspicious use of WriteProcessMemory
      PID:4472
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,6,99,59,19,92,149,197,65,145,228,210,141,215,140,131,116,0,0,0,0,2,0,0,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,155,35,83,190,139,240,78,64,183,181,176,71,154,136,46,8,154,175,198,238,66,163,199,19,96,154,189,19,157,7,98,100,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,121,32,168,152,124,29,126,161,46,102,36,210,172,232,79,133,7,149,72,161,111,219,248,207,78,78,45,212,7,0,196,95,48,0,0,0,254,221,17,226,162,246,210,144,181,174,8,17,112,91,2,188,27,116,7,240,53,165,197,248,206,109,93,19,115,128,29,174,255,134,212,76,70,27,93,216,139,50,1,209,204,193,59,55,64,0,0,0,207,184,225,20,186,104,44,46,202,44,51,151,158,1,215,252,254,82,197,210,118,130,96,79,86,107,109,226,74,57,130,147,113,159,137,248,111,189,48,247,47,64,190,226,117,187,13,62,42,36,201,25,51,96,88,26,62,114,5,242,86,224,211,96), $null, 'CurrentUser')
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1060
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /d /s /c "powershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,6,99,59,19,92,149,197,65,145,228,210,141,215,140,131,116,16,0,0,0,10,0,0,0,69,0,100,0,103,0,101,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,165,162,117,116,222,101,115,200,198,214,189,245,245,145,112,137,100,37,252,99,133,68,167,154,134,73,170,205,22,190,20,2,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,234,179,229,152,186,119,58,6,125,108,83,47,218,192,240,123,221,34,151,0,206,114,233,204,166,38,170,69,208,29,245,222,48,0,0,0,65,234,21,156,203,156,10,193,40,122,154,0,187,175,47,36,219,240,254,153,152,79,157,119,242,202,73,181,189,206,175,113,209,54,169,250,74,132,71,138,234,154,73,207,130,9,239,28,64,0,0,0,184,172,213,9,161,199,246,52,21,22,63,113,174,73,169,114,80,71,218,105,64,88,130,68,70,73,183,78,202,229,196,7,113,251,79,57,191,121,31,85,229,109,39,22,249,15,16,107,166,186,144,81,225,232,117,12,181,132,89,212,154,104,235,116), $null, 'CurrentUser')"
      2⤵
      • An obfuscated cmd.exe command-line is typically used to evade detection.
      • Suspicious use of WriteProcessMemory
      PID:4464
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,6,99,59,19,92,149,197,65,145,228,210,141,215,140,131,116,16,0,0,0,10,0,0,0,69,0,100,0,103,0,101,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,165,162,117,116,222,101,115,200,198,214,189,245,245,145,112,137,100,37,252,99,133,68,167,154,134,73,170,205,22,190,20,2,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,234,179,229,152,186,119,58,6,125,108,83,47,218,192,240,123,221,34,151,0,206,114,233,204,166,38,170,69,208,29,245,222,48,0,0,0,65,234,21,156,203,156,10,193,40,122,154,0,187,175,47,36,219,240,254,153,152,79,157,119,242,202,73,181,189,206,175,113,209,54,169,250,74,132,71,138,234,154,73,207,130,9,239,28,64,0,0,0,184,172,213,9,161,199,246,52,21,22,63,113,174,73,169,114,80,71,218,105,64,88,130,68,70,73,183,78,202,229,196,7,113,251,79,57,191,121,31,85,229,109,39,22,249,15,16,107,166,186,144,81,225,232,117,12,181,132,89,212,154,104,235,116), $null, 'CurrentUser')
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4304
    • C:\Users\Admin\AppData\Local\Temp\BetterShaders.exe
      "C:\Users\Admin\AppData\Local\Temp\BetterShaders.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\BetterShaders" --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1960,i,175783447160260100,5813561509667234713,262144 --enable-features=kWebSQLAccess --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version --mojo-platform-channel-handle=1952 /prefetch:2
      2⤵
        PID:3688
      • C:\Users\Admin\AppData\Local\Temp\BetterShaders.exe
        "C:\Users\Admin\AppData\Local\Temp\BetterShaders.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\BetterShaders" --field-trial-handle=2164,i,175783447160260100,5813561509667234713,262144 --enable-features=kWebSQLAccess --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version --mojo-platform-channel-handle=2160 /prefetch:3
        2⤵
          PID:2296
        • C:\Users\Admin\AppData\Local\Temp\BetterShaders.exe
          "C:\Users\Admin\AppData\Local\Temp\BetterShaders.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --user-data-dir="C:\Users\Admin\AppData\Roaming\BetterShaders" --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2584,i,175783447160260100,5813561509667234713,262144 --enable-features=kWebSQLAccess --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version --mojo-platform-channel-handle=2580 /prefetch:8
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:3204

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

        Filesize

        3KB

        MD5

        f48896adf9a23882050cdff97f610a7f

        SHA1

        4c5a610df62834d43f470cae7e851946530e3086

        SHA256

        3ae35c2828715a2f9a5531d334a0cfffc81396c2dc058ca42a9943f3cdc22e78

        SHA512

        16644246f2a35a186fcb5c2b6456ed6a16e8db65ad1383109e06547f9b1f9358f071c30cca541ca4cf7bae66cb534535e88f75f6296a4bfc6c7b22b0684a6ba9

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

        Filesize

        1KB

        MD5

        f867219c6fe93e02fdc11213a8a4186e

        SHA1

        def0b690962ced8a926c842f017ffd0e2ae178ad

        SHA256

        a2a15259602286af08608e9f04e1c8cfcbc2f36f62b670253f86b8307b39b5c3

        SHA512

        77ecbd8699d192a78ed90a034d8e1a14a1d8ad2bca245fbe4017e4b8cc9ba328bff5555b89d9e1f08f25431c96f4019529a42112ed8287f95cd59be9aaa5778c

      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_oj31ozsr.31c.ps1

        Filesize

        60B

        MD5

        d17fe0a3f47be24a6453e9ef58c94641

        SHA1

        6ab83620379fc69f80c0242105ddffd7d98d5d9d

        SHA256

        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

        SHA512

        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

      • C:\Users\Admin\AppData\Local\Temp\ba269827-b836-4b64-bf14-f20e80115bec.tmp.node

        Filesize

        1.8MB

        MD5

        3072b68e3c226aff39e6782d025f25a8

        SHA1

        cf559196d74fa490ac8ce192db222c9f5c5a006a

        SHA256

        7fb52b781709b065c240b6b81394be6e72e53fe11d7c8e0f7b49dd417eb78a01

        SHA512

        61ebc72c20195e99244d95af1ab44fa06201a1aee2b5da04490fdc4312e8324a40b0e15a7b42fab5179753d767c1d08ae1a7a56ac71a6e100e63f83db849ee61

      • C:\Users\Admin\AppData\Local\Temp\cookies.zip

        Filesize

        22B

        MD5

        76cdb2bad9582d23c1f6f4d868218d6c

        SHA1

        b04f3ee8f5e43fa3b162981b50bb72fe1acabb33

        SHA256

        8739c76e681f900923b900c9df0ef75cf421d39cabb54650c4b9ad19b6a76d85

        SHA512

        5e2f959f36b66df0580a94f384c5fc1ceeec4b2a3925f062d7b68f21758b86581ac2adcfdde73a171a28496e758ef1b23ca4951c05455cdae9357cc3b5a5825f

      • memory/1060-6-0x00000218C4AE0000-0x00000218C4B02000-memory.dmp

        Filesize

        136KB

      • memory/1060-16-0x00000218C4E60000-0x00000218C4EB0000-memory.dmp

        Filesize

        320KB

      • memory/3204-64-0x00000155D2510000-0x00000155D2511000-memory.dmp

        Filesize

        4KB

      • memory/3204-62-0x00000155D2510000-0x00000155D2511000-memory.dmp

        Filesize

        4KB

      • memory/3204-63-0x00000155D2510000-0x00000155D2511000-memory.dmp

        Filesize

        4KB

      • memory/3204-68-0x00000155D2510000-0x00000155D2511000-memory.dmp

        Filesize

        4KB

      • memory/3204-70-0x00000155D2510000-0x00000155D2511000-memory.dmp

        Filesize

        4KB

      • memory/3204-74-0x00000155D2510000-0x00000155D2511000-memory.dmp

        Filesize

        4KB

      • memory/3204-73-0x00000155D2510000-0x00000155D2511000-memory.dmp

        Filesize

        4KB

      • memory/3204-72-0x00000155D2510000-0x00000155D2511000-memory.dmp

        Filesize

        4KB

      • memory/3204-71-0x00000155D2510000-0x00000155D2511000-memory.dmp

        Filesize

        4KB

      • memory/3204-69-0x00000155D2510000-0x00000155D2511000-memory.dmp

        Filesize

        4KB