Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26/07/2024, 04:38
Static task
static1
Behavioral task
behavioral1
Sample
cvery.com/crack/VNCManager.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
cvery.com/crack/VNCManager.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
cvery.com/vnc_manager.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
cvery.com/vnc_manager.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
cvery.com/非常世纪资源网.url
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
cvery.com/非常世纪资源网.url
Resource
win10v2004-20240709-en
General
-
Target
cvery.com/crack/VNCManager.exe
-
Size
1.7MB
-
MD5
2679a0603f4e205f5af33b3b724c4b4b
-
SHA1
d1f1b14c401a51fdfef911c08672682b407ebefc
-
SHA256
a009766988359a25bc06d30c2e2647af7b0296a307fbef6a9939816c6ecf7570
-
SHA512
97a76d7465a68d7d7a7ed028f02d2441941971ecb6c7c648eca0cffd7b0b75ba15a453106b6a61e180e694ba301aeb8fb3445a3c74042ddd02217a9df49de9bb
-
SSDEEP
12288:LnObK9mxeaKEvejFj3g6OqVSBsHFSZQZiWP4GFHgdQPOfupj8pqr914n5YM9vZzT:8QPOf8j8pFelKJX5MpwFzN
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VNCManager.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dw20.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 2984 dw20.exe Token: SeBackupPrivilege 2984 dw20.exe Token: SeBackupPrivilege 2984 dw20.exe Token: SeBackupPrivilege 2984 dw20.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3432 wrote to memory of 2984 3432 VNCManager.exe 84 PID 3432 wrote to memory of 2984 3432 VNCManager.exe 84 PID 3432 wrote to memory of 2984 3432 VNCManager.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\cvery.com\crack\VNCManager.exe"C:\Users\Admin\AppData\Local\Temp\cvery.com\crack\VNCManager.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3432 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 9522⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:2984
-