Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
6Static
static
3pacjsworker.exe
windows10-2004-x64
1pcalua.exe
windows10-2004-x64
1pcaui.exe
windows10-2004-x64
1pcwrun.exe
windows10-2004-x64
1perfmon.exe
windows10-2004-x64
1phoneactivate.exe
windows10-2004-x64
1plasrv.exe
windows10-2004-x64
1pnputil.exe
windows10-2004-x64
1pospaymentsworker.exe
windows10-2004-x64
1powercfg.exe
windows10-2004-x64
6prevhost.exe
windows10-2004-x64
1print.exe
windows10-2004-x64
1printfilte...vc.exe
windows10-2004-x64
1printui.exe
windows10-2004-x64
1proquota.exe
windows10-2004-x64
1provlaunch.exe
windows10-2004-x64
1provtool.exe
windows10-2004-x64
1prproc.exe
windows10-2004-x64
1psr.exe
windows10-2004-x64
1pwlauncher.exe
windows10-2004-x64
6rasautou.exe
windows10-2004-x64
1rasdial.exe
windows10-2004-x64
1raserver.exe
windows10-2004-x64
1rasphone.exe
windows10-2004-x64
1rdpclip.exe
windows10-2004-x64
1rdpinput.exe
windows10-2004-x64
1rdrleakdiag.exe
windows10-2004-x64
1readCloudD...gs.exe
windows10-2004-x64
1recdisc.exe
windows10-2004-x64
1recover.exe
windows10-2004-x64
1refsutil.exe
windows10-2004-x64
1reg.exe
windows10-2004-x64
1Resubmissions
23/08/2024, 16:00
240823-tf47dsteqe 623/08/2024, 15:32
240823-sy293sseld 423/08/2024, 15:18
240823-sp1d5athqk 823/08/2024, 14:12
240823-rjcv7sydnd 723/08/2024, 02:33
240823-c17dta1cpd 723/08/2024, 02:11
240823-cmbpzszelg 423/08/2024, 02:00
240823-ce59mazbnh 423/08/2024, 01:37
240823-b1992a1dmm 523/08/2024, 01:24
240823-bsm5jazhpp 523/08/2024, 00:51
240823-a7p21awhld 6Analysis
-
max time kernel
140s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23/08/2024, 00:51
Static task
static1
Behavioral task
behavioral1
Sample
pacjsworker.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
pcalua.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
pcaui.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral4
Sample
pcwrun.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
perfmon.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral6
Sample
phoneactivate.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
plasrv.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral8
Sample
pnputil.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
pospaymentsworker.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral10
Sample
powercfg.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
prevhost.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral12
Sample
print.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
printfilterpipelinesvc.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral14
Sample
printui.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
proquota.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral16
Sample
provlaunch.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
provtool.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral18
Sample
prproc.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
psr.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral20
Sample
pwlauncher.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
rasautou.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral22
Sample
rasdial.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
raserver.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral24
Sample
rasphone.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
rdpclip.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral26
Sample
rdpinput.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
rdrleakdiag.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral28
Sample
readCloudDataSettings.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
recdisc.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral30
Sample
recover.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
refsutil.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral32
Sample
reg.exe
Resource
win10v2004-20240802-en
General
-
Target
pwlauncher.exe
-
Size
52KB
-
MD5
d0743203ba4eb04ddffdae63c8d6ded7
-
SHA1
117d5503b2bccf3c00623f5a6fd73213b871ad0e
-
SHA256
4e8dbb3e89dfd69856c0cce34a6f5960aab1e8d0b42c9dc991accb249e8ec044
-
SHA512
2bcf60617c5538b466b7263d8a175b9d5747c10126d1c62794b1330a4664885a28a0a1746da5ef26d0727b32bbb8b7b9d2515683e1efad036a1659b4eddb86d6
-
SSDEEP
768:JRLAuL35vJLgZmdagPZxMGE/GIfUMF0T8QSoe4KG0srxOC2fc+:JRjL35xUcTxgnPF0T8G0srY5fc+
Malware Config
Signatures
-
pid Process 2968 GameBarPresenceWriter.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-523280732-2327480845-3730041215-1000\{C95E2BDF-A759-4AB4-9314-F24A138B7BC9} svchost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 612 OpenWith.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\pwlauncher.exe"C:\Users\Admin\AppData\Local\Temp\pwlauncher.exe"1⤵PID:3904
-
C:\Windows\System32\GameBarPresenceWriter.exe"C:\Windows\System32\GameBarPresenceWriter.exe" -ServerName:Windows.Gaming.GameBar.Internal.PresenceWriterServer1⤵
- Network Service Discovery
PID:2968
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:612
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k BcastDVRUserService -s BcastDVRUserService1⤵
- Checks processor information in registry
- Modifies registry class
PID:3932