Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
6Static
static
3DualSenseY.3.3v.zip
windows7-x64
1DualSenseY.3.3v.zip
windows10-2004-x64
1DualSenseY.deps.json
windows7-x64
3DualSenseY.deps.json
windows10-2004-x64
3DualSenseY.exe
windows7-x64
1DualSenseY.exe
windows10-2004-x64
5DualSenseY.exe
windows7-x64
1DualSenseY.exe
windows10-2004-x64
6DualSenseY.pdb
windows7-x64
3DualSenseY.pdb
windows10-2004-x64
3DualSenseY...g.json
windows7-x64
3DualSenseY...g.json
windows10-2004-x64
3HidSharp.dll
windows7-x64
1HidSharp.dll
windows10-2004-x64
1Microsoft....ns.dll
windows7-x64
1Microsoft....ns.dll
windows10-2004-x64
1Microsoft....ns.dll
windows7-x64
1Microsoft....ns.dll
windows10-2004-x64
1Microsoft....ET.dll
windows7-x64
1Microsoft....ET.dll
windows10-2004-x64
1NAudio.Asio.dll
windows7-x64
1NAudio.Asio.dll
windows10-2004-x64
1NAudio.Core.dll
windows7-x64
1NAudio.Core.dll
windows10-2004-x64
1NAudio.Midi.dll
windows7-x64
1NAudio.Midi.dll
windows10-2004-x64
1NAudio.Wasapi.dll
windows7-x64
1NAudio.Wasapi.dll
windows10-2004-x64
1NAudio.WinForms.dll
windows7-x64
1NAudio.WinForms.dll
windows10-2004-x64
1NAudio.WinMM.dll
windows7-x64
1NAudio.WinMM.dll
windows10-2004-x64
1Analysis
-
max time kernel
124s -
max time network
51s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12/08/2024, 01:29
Static task
static1
Behavioral task
behavioral1
Sample
DualSenseY.3.3v.zip
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
DualSenseY.3.3v.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
DualSenseY.deps.json
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
DualSenseY.deps.json
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
DualSenseY.exe
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
DualSenseY.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
DualSenseY.exe
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
DualSenseY.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
DualSenseY.pdb
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
DualSenseY.pdb
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
DualSenseY.runtimeconfig.json
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
DualSenseY.runtimeconfig.json
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
HidSharp.dll
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
HidSharp.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
Microsoft.Extensions.DependencyInjection.Abstractions.dll
Resource
win7-20240729-en
Behavioral task
behavioral16
Sample
Microsoft.Extensions.DependencyInjection.Abstractions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
Microsoft.Extensions.Logging.Abstractions.dll
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
Microsoft.Extensions.Logging.Abstractions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
Microsoft.Windows.SDK.NET.dll
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
Microsoft.Windows.SDK.NET.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
NAudio.Asio.dll
Resource
win7-20240729-en
Behavioral task
behavioral22
Sample
NAudio.Asio.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
NAudio.Core.dll
Resource
win7-20240705-en
Behavioral task
behavioral24
Sample
NAudio.Core.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
NAudio.Midi.dll
Resource
win7-20240704-en
Behavioral task
behavioral26
Sample
NAudio.Midi.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
NAudio.Wasapi.dll
Resource
win7-20240708-en
Behavioral task
behavioral28
Sample
NAudio.Wasapi.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
NAudio.WinForms.dll
Resource
win7-20240705-en
Behavioral task
behavioral30
Sample
NAudio.WinForms.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
NAudio.WinMM.dll
Resource
win7-20240704-en
Behavioral task
behavioral32
Sample
NAudio.WinMM.dll
Resource
win10v2004-20240802-en
General
-
Target
DualSenseY.exe
-
Size
664KB
-
MD5
a30c547646948bc74c62e3172b93d911
-
SHA1
ae69fddd31566707155720b85ceb64f4282cea02
-
SHA256
7d4028b758118bc879f08782ba8724b0bb96dad58c59f641277139386a8eee17
-
SHA512
f65aff8487c82e52050ad438f6bed1b48314548093ac37d814ac5497f78becb4d5a5b39f7f468ece86d16949fd127dd2dedba35feb8596f63e9a0ffbd5159a41
-
SSDEEP
12288:SAlcnAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJAAueUE6GkIAiyvrnbT:SAlcnAAAAAAAAAAAAAAAAAAAAAAAAAAa
Malware Config
Signatures
-
Drops file in System32 directory 11 IoCs
description ioc Process File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.jtx svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSStmp.log svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.chk svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSTokenDB2.dat svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.chk svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.jcp svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSSres00002.jrs svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSTokenDB2.jfm svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSTokenDB2.dat svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.log svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSSres00001.jrs svchost.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\Local Settings mspaint.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2780 msedge.exe 2780 msedge.exe 5604 mspaint.exe 5604 mspaint.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 5788 OpenWith.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 5604 mspaint.exe 5788 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2840 wrote to memory of 1988 2840 msedge.exe 107 PID 2840 wrote to memory of 1988 2840 msedge.exe 107 PID 2840 wrote to memory of 2608 2840 msedge.exe 108 PID 2840 wrote to memory of 2608 2840 msedge.exe 108 PID 2840 wrote to memory of 2608 2840 msedge.exe 108 PID 2840 wrote to memory of 2608 2840 msedge.exe 108 PID 2840 wrote to memory of 2608 2840 msedge.exe 108 PID 2840 wrote to memory of 2608 2840 msedge.exe 108 PID 2840 wrote to memory of 2608 2840 msedge.exe 108 PID 2840 wrote to memory of 2608 2840 msedge.exe 108 PID 2840 wrote to memory of 2608 2840 msedge.exe 108 PID 2840 wrote to memory of 2608 2840 msedge.exe 108 PID 2840 wrote to memory of 2608 2840 msedge.exe 108 PID 2840 wrote to memory of 2608 2840 msedge.exe 108 PID 2840 wrote to memory of 2608 2840 msedge.exe 108 PID 2840 wrote to memory of 2608 2840 msedge.exe 108 PID 2840 wrote to memory of 2608 2840 msedge.exe 108 PID 2840 wrote to memory of 2608 2840 msedge.exe 108 PID 2840 wrote to memory of 2608 2840 msedge.exe 108 PID 2840 wrote to memory of 2608 2840 msedge.exe 108 PID 2840 wrote to memory of 2608 2840 msedge.exe 108 PID 2840 wrote to memory of 2608 2840 msedge.exe 108 PID 2840 wrote to memory of 2608 2840 msedge.exe 108 PID 2840 wrote to memory of 2608 2840 msedge.exe 108 PID 2840 wrote to memory of 2608 2840 msedge.exe 108 PID 2840 wrote to memory of 2608 2840 msedge.exe 108 PID 2840 wrote to memory of 2608 2840 msedge.exe 108 PID 2840 wrote to memory of 2608 2840 msedge.exe 108 PID 2840 wrote to memory of 2608 2840 msedge.exe 108 PID 2840 wrote to memory of 2608 2840 msedge.exe 108 PID 2840 wrote to memory of 2608 2840 msedge.exe 108 PID 2840 wrote to memory of 2608 2840 msedge.exe 108 PID 2840 wrote to memory of 2608 2840 msedge.exe 108 PID 2840 wrote to memory of 2608 2840 msedge.exe 108 PID 2840 wrote to memory of 2608 2840 msedge.exe 108 PID 2840 wrote to memory of 2608 2840 msedge.exe 108 PID 2840 wrote to memory of 2608 2840 msedge.exe 108 PID 2840 wrote to memory of 2608 2840 msedge.exe 108 PID 2840 wrote to memory of 2608 2840 msedge.exe 108 PID 2840 wrote to memory of 2608 2840 msedge.exe 108 PID 2840 wrote to memory of 2608 2840 msedge.exe 108 PID 2840 wrote to memory of 2608 2840 msedge.exe 108 PID 2840 wrote to memory of 2780 2840 msedge.exe 109 PID 2840 wrote to memory of 2780 2840 msedge.exe 109 PID 2840 wrote to memory of 1552 2840 msedge.exe 110 PID 2840 wrote to memory of 1552 2840 msedge.exe 110 PID 2840 wrote to memory of 1552 2840 msedge.exe 110 PID 2840 wrote to memory of 1552 2840 msedge.exe 110 PID 2840 wrote to memory of 1552 2840 msedge.exe 110 PID 2840 wrote to memory of 1552 2840 msedge.exe 110 PID 2840 wrote to memory of 1552 2840 msedge.exe 110 PID 2840 wrote to memory of 1552 2840 msedge.exe 110 PID 2840 wrote to memory of 1552 2840 msedge.exe 110 PID 2840 wrote to memory of 1552 2840 msedge.exe 110 PID 2840 wrote to memory of 1552 2840 msedge.exe 110 PID 2840 wrote to memory of 1552 2840 msedge.exe 110 PID 2840 wrote to memory of 1552 2840 msedge.exe 110 PID 2840 wrote to memory of 1552 2840 msedge.exe 110 PID 2840 wrote to memory of 1552 2840 msedge.exe 110 PID 2840 wrote to memory of 1552 2840 msedge.exe 110 PID 2840 wrote to memory of 1552 2840 msedge.exe 110 PID 2840 wrote to memory of 1552 2840 msedge.exe 110 PID 2840 wrote to memory of 1552 2840 msedge.exe 110 PID 2840 wrote to memory of 1552 2840 msedge.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\DualSenseY.exe"C:\Users\Admin\AppData\Local\Temp\DualSenseY.exe"1⤵PID:2448
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3816
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --default-search-provider=? --out-pipe-name=MSEdgeDefault14d043f9ha427h44fdhbf61hea2cfd4dd9451⤵
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7ff90b0246f8,0x7ff90b024708,0x7ff90b0247182⤵PID:1988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1980,3014808951064245709,14008143435029287597,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2028 /prefetch:22⤵PID:2608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1980,3014808951064245709,14008143435029287597,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2268 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1980,3014808951064245709,14008143435029287597,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2844 /prefetch:82⤵PID:1552
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4156
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5140
-
C:\Windows\system32\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Desktop\ExitWatch.jfif" /ForceBootstrapPaint3D1⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5604
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s DsSvc1⤵
- Drops file in System32 directory
PID:5652
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:5788
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
Filesize
61B
MD54df4574bfbb7e0b0bc56c2c9b12b6c47
SHA181efcbd3e3da8221444a21f45305af6fa4b71907
SHA256e1b77550222c2451772c958e44026abe518a2c8766862f331765788ddd196377
SHA51278b14f60f2d80400fe50360cf303a961685396b7697775d078825a29b717081442d357c2039ad0984d4b622976b0314ede8f478cde320daec118da546cb0682a
-
Filesize
6KB
MD5e6fade4c6f58453bcf1e30a195c8f1b6
SHA117d714c3e7b27b48e2b6f5ef38078a8d8efa0031
SHA256600522629ff657ea4afd25775fbb8d2357707d844f6f3abe50840c2eeef7bb1d
SHA512523604bcb7a6fb46385dadf907a35dd7567365e5ed06baa19632497ada457a9a4d0bfec46e4d077d2437febe4c7cdb3179e00346b3b11d4548747e659f920364
-
Filesize
8KB
MD5e39683a2247fbbdbd145923a2e084d78
SHA1c810cfabcfd5cfe3486da5c1e06830996ed00154
SHA256e40a7f945692b33f57a5e69e9dab061741237b65fae7ecb78c61fa29cbc86aef
SHA512cfc87edd2c4a2bfebcc41127c45294a1890427631cb0e7be24bdb9ca95a0419452ac684e5d8474642a6fe1c3a4e628172aa97fc1d20406f6962510ff6db73721