Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
2671s -
max time network
2701s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
03/06/2024, 05:20
Static task
static1
Behavioral task
behavioral1
Sample
!mew.jpg
Resource
win10v2004-20240508-en
General
-
Target
!mew.jpg
-
Size
6KB
-
MD5
a5550e2138c6a076d417ce02c954807a
-
SHA1
f7075079c5746adc00eb84874bc641e23c999a91
-
SHA256
e0b8df73be3587bfb8f744df9bacd1b3d1a5fa0dcc7636f95cec89bb1a3ddd5d
-
SHA512
d263feefd857a4533dd5625491be61d3ac90bcd84a27db70488399f02999f4f3053a6945be0f4de5930c49b191b7e72a30ad2164312a9156f00e9b87ab989337
-
SSDEEP
192:NaviO7Wg5Xtb2HuJViwI3oNvj7+p+qqXa1u4HABOO7rule6d:NsF7Wg59b2HSoo1k+9iHoOWub
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\X: mstsc.exe File opened (read-only) \??\G: mstsc.exe File opened (read-only) \??\K: mstsc.exe File opened (read-only) \??\P: mstsc.exe File opened (read-only) \??\R: mstsc.exe File opened (read-only) \??\U: mstsc.exe File opened (read-only) \??\B: mstsc.exe File opened (read-only) \??\N: mstsc.exe File opened (read-only) \??\O: mstsc.exe File opened (read-only) \??\V: mstsc.exe File opened (read-only) \??\W: mstsc.exe File opened (read-only) \??\Y: mstsc.exe File opened (read-only) \??\A: mstsc.exe File opened (read-only) \??\I: mstsc.exe File opened (read-only) \??\J: mstsc.exe File opened (read-only) \??\M: mstsc.exe File opened (read-only) \??\S: mstsc.exe File opened (read-only) \??\Z: mstsc.exe File opened (read-only) \??\E: mstsc.exe File opened (read-only) \??\H: mstsc.exe File opened (read-only) \??\L: mstsc.exe File opened (read-only) \??\Q: mstsc.exe File opened (read-only) \??\T: mstsc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key security queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters mstsc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\TSRedirFlags mstsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000\Device Parameters mstsc.exe Key security queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Device Parameters mstsc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Device Parameters\TSRedirFlags mstsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000\Device Parameters mstsc.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2224 mstsc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2224 mstsc.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 4400 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4400 AUDIODG.EXE Token: 33 3380 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3380 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 18 IoCs
pid Process 2224 mstsc.exe 2224 mstsc.exe 2224 mstsc.exe 2224 mstsc.exe 2224 mstsc.exe 2224 mstsc.exe 2224 mstsc.exe 2224 mstsc.exe 2224 mstsc.exe 2224 mstsc.exe 2224 mstsc.exe 2224 mstsc.exe 2224 mstsc.exe 2224 mstsc.exe 2224 mstsc.exe 2224 mstsc.exe 2224 mstsc.exe 2224 mstsc.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 2224 mstsc.exe 4476 CredentialUIBroker.exe 2224 mstsc.exe 2224 mstsc.exe 2224 mstsc.exe 2224 mstsc.exe 2224 mstsc.exe 2224 mstsc.exe 2224 mstsc.exe 2224 mstsc.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\!mew.jpg1⤵PID:632
-
C:\Windows\system32\mstsc.exe"C:\Windows\system32\mstsc.exe"1⤵
- Enumerates connected drives
- Checks SCSI registry key(s)
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2224
-
C:\Windows\System32\CredentialUIBroker.exe"C:\Windows\System32\CredentialUIBroker.exe" NonAppContainerFailedMip -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:4476
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2948
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4a4 0x33c1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4400
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4a4 0x33c1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3380