Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

08/09/2024, 11:54

240908-n2yc3sxarb 8

08/09/2024, 11:49

240908-nze4qavalp 1

08/09/2024, 11:49

240908-ny5yravakl 1

08/09/2024, 11:48

240908-nysneswhme 1

08/09/2024, 11:43

240908-nvnkastglm 8

Analysis

  • max time kernel
    224s
  • max time network
    198s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    08/09/2024, 11:49

General

  • Target

    F_Key_Sender.exe

  • Size

    234KB

  • MD5

    5d168d9c5151ac785599cdae87544cac

  • SHA1

    a8348defb42f5e9ee127d48fc74e7f362ae2edd4

  • SHA256

    200ddcab89956d3d97e74c45765e109e6ee0a18622cdcfbd21844c1676bdc562

  • SHA512

    d27ca55733be3eeaf4d92112bf4051d69922ed26fd04efdb291084045c14ea881e741300b9317f568ad34392d47daca908f32d8c5398a0a5f6ed8cbc3fa3ed9a

  • SSDEEP

    6144:yTPeKCgLOWPAPqF8GLFKCgLOWPAPPFkGh+:yTlCguP28G4CguPNkG0

Score
1/10

Malware Config

Signatures

  • Checks SCSI registry key(s) 3 TTPs 11 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 36 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: LoadsDriver 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 37 IoCs
  • Suspicious use of FindShellTrayWindow 33 IoCs
  • Suspicious use of SendNotifyMessage 33 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\F_Key_Sender.exe
    "C:\Users\Admin\AppData\Local\Temp\F_Key_Sender.exe"
    1⤵
      PID:1904
    • C:\Windows\system32\cmd.exe
      "C:\Windows\system32\cmd.exe"
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:5108
      • C:\Windows\system32\diskpart.exe
        diskpart
        2⤵
          PID:4728
        • C:\Windows\system32\Taskmgr.exe
          taskmgr.exe
          2⤵
            PID:684
        • C:\Windows\System32\vdsldr.exe
          C:\Windows\System32\vdsldr.exe -Embedding
          1⤵
            PID:4432
          • C:\Windows\System32\vds.exe
            C:\Windows\System32\vds.exe
            1⤵
            • Checks SCSI registry key(s)
            PID:4176
          • C:\Windows\system32\taskmgr.exe
            "C:\Windows\system32\taskmgr.exe" /0
            1⤵
            • Checks SCSI registry key(s)
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            PID:1652
          • C:\Windows\system32\dwm.exe
            "dwm.exe"
            1⤵
            • Modifies data under HKEY_USERS
            • Suspicious use of AdjustPrivilegeToken
            PID:1260
          • C:\Windows\system32\dwm.exe
            "dwm.exe"
            1⤵
            • Modifies data under HKEY_USERS
            • Suspicious use of AdjustPrivilegeToken
            PID:2308
          • C:\Windows\system32\dwm.exe
            "dwm.exe"
            1⤵
            • Modifies data under HKEY_USERS
            • Suspicious use of AdjustPrivilegeToken
            PID:3564
          • C:\Windows\system32\dwm.exe
            "dwm.exe"
            1⤵
            • Modifies data under HKEY_USERS
            • Suspicious use of AdjustPrivilegeToken
            PID:1876
          • C:\Windows\system32\dwm.exe
            "dwm.exe"
            1⤵
            • Checks SCSI registry key(s)
            • Modifies data under HKEY_USERS
            • Suspicious use of AdjustPrivilegeToken
            PID:2240
          • C:\Windows\system32\dwm.exe
            "dwm.exe"
            1⤵
            • Modifies data under HKEY_USERS
            • Suspicious use of AdjustPrivilegeToken
            PID:4512
          • C:\Windows\system32\dwm.exe
            "dwm.exe"
            1⤵
            • Modifies data under HKEY_USERS
            • Suspicious use of AdjustPrivilegeToken
            PID:3348
          • C:\Windows\system32\dwm.exe
            "dwm.exe"
            1⤵
            • Modifies data under HKEY_USERS
            • Suspicious use of AdjustPrivilegeToken
            PID:2876
          • C:\Windows\system32\AUDIODG.EXE
            C:\Windows\system32\AUDIODG.EXE 0x00000000000004D8 0x00000000000004D4
            1⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:4184
          • C:\Windows\system32\LogonUI.exe
            "LogonUI.exe" /flags:0x0 /state0:0xa39cf855 /state1:0x41c64e6d
            1⤵
            • Modifies data under HKEY_USERS
            • Suspicious use of SetWindowsHookEx
            PID:1548
          • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
            "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
            1⤵
              PID:2800

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/1652-17-0x000002EBF92A0000-0x000002EBF92A1000-memory.dmp

              Filesize

              4KB

            • memory/1652-19-0x000002EBF92A0000-0x000002EBF92A1000-memory.dmp

              Filesize

              4KB

            • memory/1652-14-0x000002EBF92A0000-0x000002EBF92A1000-memory.dmp

              Filesize

              4KB

            • memory/1652-15-0x000002EBF92A0000-0x000002EBF92A1000-memory.dmp

              Filesize

              4KB

            • memory/1652-16-0x000002EBF92A0000-0x000002EBF92A1000-memory.dmp

              Filesize

              4KB

            • memory/1652-18-0x000002EBF92A0000-0x000002EBF92A1000-memory.dmp

              Filesize

              4KB

            • memory/1652-8-0x000002EBF92A0000-0x000002EBF92A1000-memory.dmp

              Filesize

              4KB

            • memory/1652-20-0x000002EBF92A0000-0x000002EBF92A1000-memory.dmp

              Filesize

              4KB

            • memory/1652-10-0x000002EBF92A0000-0x000002EBF92A1000-memory.dmp

              Filesize

              4KB

            • memory/1652-9-0x000002EBF92A0000-0x000002EBF92A1000-memory.dmp

              Filesize

              4KB

            • memory/1904-1-0x000001620DB00000-0x000001620DB3C000-memory.dmp

              Filesize

              240KB

            • memory/1904-6-0x00007FFCF0A10000-0x00007FFCF14D2000-memory.dmp

              Filesize

              10.8MB

            • memory/1904-0-0x00007FFCF0A13000-0x00007FFCF0A15000-memory.dmp

              Filesize

              8KB

            • memory/1904-4-0x00007FFCF0A10000-0x00007FFCF14D2000-memory.dmp

              Filesize

              10.8MB

            • memory/1904-3-0x00007FFCF0A10000-0x00007FFCF14D2000-memory.dmp

              Filesize

              10.8MB

            • memory/1904-2-0x00007FFCF0A10000-0x00007FFCF14D2000-memory.dmp

              Filesize

              10.8MB