Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
30/09/2024, 12:01
240930-n68dvaycja 830/09/2024, 11:54
240930-n2219stenl 830/09/2024, 11:44
240930-nwdfqatcjj 7Analysis
-
max time kernel
259s -
max time network
205s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30/09/2024, 12:01
Static task
static1
Behavioral task
behavioral1
Sample
VirtualTabletServer_v3.1.3_setup.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
VirtualTabletServer_v3.1.3_setup.exe
Resource
win10v2004-20240802-en
General
-
Target
VirtualTabletServer_v3.1.3_setup.exe
-
Size
29.4MB
-
MD5
a8e73dd218f4e724f1ba4215d0d8e1f7
-
SHA1
999190ea75801c292d04a16cdc91f119989fa98e
-
SHA256
0310ad0d2c0dc62100055c5e96add680cc0426b259af77cf4e0dd80664cf48c2
-
SHA512
fa38fd150ca9341500a316cb7adea24f74c6df30309d1766338374ce08ec6d1bbf80d6c8b1bafbe97e33e3c0395cca2ef97a141af979f56746d6d2bb30ce2a23
-
SSDEEP
393216:8BkqKoRZ4QZ2RCV+5XPw6VBb26k1Tn/BnrBXRt1euiY6SnadV+mgG1MKcibQSIpU:qZ4Jc0X7x3yBr9RtriYdnKMiY8ubFC
Malware Config
Signatures
-
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\SET9F0A.tmp DrvInst.exe File created C:\Windows\System32\drivers\SET9F0A.tmp DrvInst.exe File opened for modification C:\Windows\System32\drivers\vmulti.sys DrvInst.exe -
Manipulates Digital Signatures 1 TTPs 1 IoCs
Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\8413A7E1406922827469E153B915B332E9FC2E06\Blob = 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 DrvInst.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation VirtualTabletServer_v3.1.3_setup.exe -
Executes dropped EXE 2 IoCs
pid Process 1948 VirtualTabletServer_v3.1.3_setup.exe 2788 VirtualTabletServer_v3.1.3_setup.exe -
Loads dropped DLL 1 IoCs
pid Process 1948 VirtualTabletServer_v3.1.3_setup.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\{516CC893-4A6D-493A-8850-B5A878C76777} = "\"C:\\ProgramData\\Package Cache\\{516CC893-4A6D-493A-8850-B5A878C76777}\\VirtualTabletServer_v3.1.3_setup.exe\" /burn.clean.room /burn.runonce" VirtualTabletServer_v3.1.3_setup.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 38 IoCs
description ioc Process File created C:\Windows\System32\DriverStore\Temp\{21d6da7d-b47f-374f-a740-431150b8f806}\SET7935.tmp DrvInst.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\Explorer\iconcache_16.db rundll32.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\Explorer\iconcache_96.db rundll32.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\Explorer\iconcache_256.db rundll32.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{21d6da7d-b47f-374f-a740-431150b8f806}\SET7923.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{21d6da7d-b47f-374f-a740-431150b8f806}\vmulti.cat DrvInst.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\Explorer\iconcache_768.db rundll32.exe File opened for modification C:\Windows\System32\SET9F0B.tmp DrvInst.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\Explorer\iconcache_32.db rundll32.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\Explorer\iconcache_48.db rundll32.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\Explorer\iconcache_1280.db rundll32.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\Explorer\iconcache_exif.db rundll32.exe File created C:\Windows\System32\SET9F0B.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{21d6da7d-b47f-374f-a740-431150b8f806}\SET7923.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{21d6da7d-b47f-374f-a740-431150b8f806}\vmulti.inf DrvInst.exe File opened for modification C:\Windows\System32\WdfCoInstaller01011.dll DrvInst.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\Explorer\iconcache_wide_alternate.db rundll32.exe File created C:\Windows\System32\DriverStore\FileRepository\vmulti.inf_amd64_8055adba11dd5eee\vmulti.PNF DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{21d6da7d-b47f-374f-a740-431150b8f806}\WdfCoInstaller01011.dll DrvInst.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\Explorer\iconcache_1920.db rundll32.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\vmulti.inf_amd64_8055adba11dd5eee\vmulti.sys DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\vmulti.inf_amd64_8055adba11dd5eee\vmulti.inf DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{21d6da7d-b47f-374f-a740-431150b8f806}\SET7924.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{21d6da7d-b47f-374f-a740-431150b8f806}\SET7925.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\vmulti.inf_amd64_8055adba11dd5eee\vmulti.cat DrvInst.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\Explorer\iconcache_idx.db rundll32.exe File created C:\Windows\System32\DriverStore\drvstore.tmp DrvInst.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\Explorer\iconcache_custom_stream.db rundll32.exe File opened for modification C:\Windows\System32\CatRoot2\dberr.txt DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{21d6da7d-b47f-374f-a740-431150b8f806}\vmulti.sys DrvInst.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\Explorer\iconcache_2560.db rundll32.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{21d6da7d-b47f-374f-a740-431150b8f806}\SET7935.tmp DrvInst.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\Explorer\iconcache_sr.db rundll32.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\Explorer\iconcache_wide.db rundll32.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\vmulti.inf_amd64_8055adba11dd5eee\WdfCoInstaller01011.dll DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{21d6da7d-b47f-374f-a740-431150b8f806} DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{21d6da7d-b47f-374f-a740-431150b8f806}\SET7924.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{21d6da7d-b47f-374f-a740-431150b8f806}\SET7925.tmp DrvInst.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\INF\setupapi.dev.log svchost.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\inf\oem3.inf DrvInst.exe File created C:\Windows\inf\oem3.inf DrvInst.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adb.exe -
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\HardwareID DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Filters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\LowerFilters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\HardwareID DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Phantom DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\LowerFilters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Service DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\CompatibleIDs DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\HardwareID DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\CompatibleIDs DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\CompatibleIDs DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Phantom DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Phantom DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\CompatibleIDs DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\UpperFilters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\UpperFilters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\CompatibleIDs DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Filters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Service DrvInst.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 000000000400000096fabf83e47a2dea0000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000c01200000000ffffffff00000000270101000008000096fabf830000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d01200000000000020ed3a000000ffffffff00000000070001000068090096fabf83000000000000d012000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f0ff3a0000000000000005000000ffffffff000000000700010000f87f1d96fabf83000000000000f0ff3a00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000000000000000000096fabf8300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\CompatibleIDs DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\HardwareID DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\CompatibleIDs DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Phantom DrvInst.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Service DrvInst.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Phantom DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Phantom DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Service DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\CompatibleIDs DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\UpperFilters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\LowerFilters DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Filters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\UpperFilters DrvInst.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Filters DrvInst.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs rundll32.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople rundll32.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe -
Modifies registry class 38 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\968E1CE717E960646BD9AD45B97634F7\SourceList msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Dependencies\{516CC893-4A6D-493A-8850-B5A878C76777}\Dependents\{516CC893-4A6D-493A-8850-B5A878C76777} VirtualTabletServer_v3.1.3_setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Dependencies\{516CC893-4A6D-493A-8850-B5A878C76777}\Dependents VirtualTabletServer_v3.1.3_setup.exe Key created \REGISTRY\MACHINE\Software\Classes\Installer\Dependencies\{7EC1E869-9E71-4606-B69D-DA549B67437F}_v3.1.3 VirtualTabletServer_v3.1.3_setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Dependencies\{7EC1E869-9E71-4606-B69D-DA549B67437F}_v3.1.3\DisplayName = "VirtualTablet Server" VirtualTabletServer_v3.1.3_setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\968E1CE717E960646BD9AD45B97634F7\Version = "50397187" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\968E1CE717E960646BD9AD45B97634F7\AdvertiseFlags = "388" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\968E1CE717E960646BD9AD45B97634F7\InstanceType = "0" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Dependencies\{7EC1E869-9E71-4606-B69D-DA549B67437F}_v3.1.3\ = "{7EC1E869-9E71-4606-B69D-DA549B67437F}" VirtualTabletServer_v3.1.3_setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\968E1CE717E960646BD9AD45B97634F7\Language = "1033" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\968E1CE717E960646BD9AD45B97634F7\SourceList\Net\1 = "C:\\ProgramData\\Package Cache\\{7EC1E869-9E71-4606-B69D-DA549B67437F}v3.1.3\\" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Dependencies\{516CC893-4A6D-493A-8850-B5A878C76777}\Version = "3.1.3" VirtualTabletServer_v3.1.3_setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\B8B9969FDB3B8A245AB9A4DF17CFE5AE msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\968E1CE717E960646BD9AD45B97634F7\SourceList\Net msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Dependencies\{516CC893-4A6D-493A-8850-B5A878C76777}\DisplayName = "VirtualTablet Server" VirtualTabletServer_v3.1.3_setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\968E1CE717E960646BD9AD45B97634F7 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\968E1CE717E960646BD9AD45B97634F7\ProductIcon = "C:\\Windows\\Installer\\{7EC1E869-9E71-4606-B69D-DA549B67437F}\\vt_icon.ico" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\968E1CE717E960646BD9AD45B97634F7\SourceList\LastUsedSource = "n;1;C:\\ProgramData\\Package Cache\\{7EC1E869-9E71-4606-B69D-DA549B67437F}v3.1.3\\" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\968E1CE717E960646BD9AD45B97634F7\FT_Drivers = "FT_RootFeature" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\968E1CE717E960646BD9AD45B97634F7\ProductName = "VirtualTablet Server" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\968E1CE717E960646BD9AD45B97634F7\DeploymentFlags = "3" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\968E1CE717E960646BD9AD45B97634F7 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\968E1CE717E960646BD9AD45B97634F7\SourceList\Media msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\968E1CE717E960646BD9AD45B97634F7\Clients = 3a0000000000 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Dependencies\{516CC893-4A6D-493A-8850-B5A878C76777}\ = "{516CC893-4A6D-493A-8850-B5A878C76777}" VirtualTabletServer_v3.1.3_setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\968E1CE717E960646BD9AD45B97634F7\FT_VTServer = "FT_RootFeature" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\968E1CE717E960646BD9AD45B97634F7\PackageCode = "41B2DA9C138BFBB45919F2025ABEC821" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\968E1CE717E960646BD9AD45B97634F7\Assignment = "1" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\B8B9969FDB3B8A245AB9A4DF17CFE5AE\968E1CE717E960646BD9AD45B97634F7 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\968E1CE717E960646BD9AD45B97634F7\SourceList\Media\1 = ";" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Dependencies\{7EC1E869-9E71-4606-B69D-DA549B67437F}_v3.1.3\Dependents VirtualTabletServer_v3.1.3_setup.exe Key created \REGISTRY\MACHINE\Software\Classes\Installer\Dependencies\{516CC893-4A6D-493A-8850-B5A878C76777} VirtualTabletServer_v3.1.3_setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Dependencies\{7EC1E869-9E71-4606-B69D-DA549B67437F}_v3.1.3\Version = "3.1.3" VirtualTabletServer_v3.1.3_setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\968E1CE717E960646BD9AD45B97634F7\FT_RootFeature msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\968E1CE717E960646BD9AD45B97634F7\FT_DriverInst_x64 = "FT_Drivers" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\968E1CE717E960646BD9AD45B97634F7\AuthorizedLUAApp = "0" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\968E1CE717E960646BD9AD45B97634F7\SourceList\PackageName = "AppInstaller.msi" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Dependencies\{7EC1E869-9E71-4606-B69D-DA549B67437F}_v3.1.3\Dependents\{516CC893-4A6D-493A-8850-B5A878C76777} VirtualTabletServer_v3.1.3_setup.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeBackupPrivilege 3544 vssvc.exe Token: SeRestorePrivilege 3544 vssvc.exe Token: SeAuditPrivilege 3544 vssvc.exe Token: SeBackupPrivilege 2788 VirtualTabletServer_v3.1.3_setup.exe Token: SeRestorePrivilege 2788 VirtualTabletServer_v3.1.3_setup.exe Token: SeShutdownPrivilege 2788 VirtualTabletServer_v3.1.3_setup.exe Token: SeIncreaseQuotaPrivilege 2788 VirtualTabletServer_v3.1.3_setup.exe Token: SeCreateTokenPrivilege 2788 VirtualTabletServer_v3.1.3_setup.exe Token: SeAssignPrimaryTokenPrivilege 2788 VirtualTabletServer_v3.1.3_setup.exe Token: SeLockMemoryPrivilege 2788 VirtualTabletServer_v3.1.3_setup.exe Token: SeIncreaseQuotaPrivilege 2788 VirtualTabletServer_v3.1.3_setup.exe Token: SeMachineAccountPrivilege 2788 VirtualTabletServer_v3.1.3_setup.exe Token: SeTcbPrivilege 2788 VirtualTabletServer_v3.1.3_setup.exe Token: SeSecurityPrivilege 2788 VirtualTabletServer_v3.1.3_setup.exe Token: SeTakeOwnershipPrivilege 2788 VirtualTabletServer_v3.1.3_setup.exe Token: SeLoadDriverPrivilege 2788 VirtualTabletServer_v3.1.3_setup.exe Token: SeSystemProfilePrivilege 2788 VirtualTabletServer_v3.1.3_setup.exe Token: SeSystemtimePrivilege 2788 VirtualTabletServer_v3.1.3_setup.exe Token: SeProfSingleProcessPrivilege 2788 VirtualTabletServer_v3.1.3_setup.exe Token: SeIncBasePriorityPrivilege 2788 VirtualTabletServer_v3.1.3_setup.exe Token: SeCreatePagefilePrivilege 2788 VirtualTabletServer_v3.1.3_setup.exe Token: SeCreatePermanentPrivilege 2788 VirtualTabletServer_v3.1.3_setup.exe Token: SeBackupPrivilege 2788 VirtualTabletServer_v3.1.3_setup.exe Token: SeRestorePrivilege 2788 VirtualTabletServer_v3.1.3_setup.exe Token: SeShutdownPrivilege 2788 VirtualTabletServer_v3.1.3_setup.exe Token: SeDebugPrivilege 2788 VirtualTabletServer_v3.1.3_setup.exe Token: SeAuditPrivilege 2788 VirtualTabletServer_v3.1.3_setup.exe Token: SeSystemEnvironmentPrivilege 2788 VirtualTabletServer_v3.1.3_setup.exe Token: SeChangeNotifyPrivilege 2788 VirtualTabletServer_v3.1.3_setup.exe Token: SeRemoteShutdownPrivilege 2788 VirtualTabletServer_v3.1.3_setup.exe Token: SeUndockPrivilege 2788 VirtualTabletServer_v3.1.3_setup.exe Token: SeSyncAgentPrivilege 2788 VirtualTabletServer_v3.1.3_setup.exe Token: SeEnableDelegationPrivilege 2788 VirtualTabletServer_v3.1.3_setup.exe Token: SeManageVolumePrivilege 2788 VirtualTabletServer_v3.1.3_setup.exe Token: SeImpersonatePrivilege 2788 VirtualTabletServer_v3.1.3_setup.exe Token: SeCreateGlobalPrivilege 2788 VirtualTabletServer_v3.1.3_setup.exe Token: SeAuditPrivilege 2368 svchost.exe Token: SeSecurityPrivilege 2368 svchost.exe Token: SeBackupPrivilege 3452 srtasks.exe Token: SeRestorePrivilege 3452 srtasks.exe Token: SeSecurityPrivilege 3452 srtasks.exe Token: SeTakeOwnershipPrivilege 3452 srtasks.exe Token: SeBackupPrivilege 3452 srtasks.exe Token: SeRestorePrivilege 3452 srtasks.exe Token: SeSecurityPrivilege 3452 srtasks.exe Token: SeTakeOwnershipPrivilege 3452 srtasks.exe Token: SeLoadDriverPrivilege 4204 DrvInst.exe Token: SeRestorePrivilege 4368 DrvInst.exe Token: SeBackupPrivilege 4368 DrvInst.exe Token: SeRestorePrivilege 4368 DrvInst.exe Token: SeBackupPrivilege 4368 DrvInst.exe Token: SeLoadDriverPrivilege 4368 DrvInst.exe Token: SeLoadDriverPrivilege 4368 DrvInst.exe Token: SeLoadDriverPrivilege 4368 DrvInst.exe Token: SeCreateTokenPrivilege 2788 VirtualTabletServer_v3.1.3_setup.exe Token: SeAssignPrimaryTokenPrivilege 2788 VirtualTabletServer_v3.1.3_setup.exe Token: SeLockMemoryPrivilege 2788 VirtualTabletServer_v3.1.3_setup.exe Token: SeIncreaseQuotaPrivilege 2788 VirtualTabletServer_v3.1.3_setup.exe Token: SeMachineAccountPrivilege 2788 VirtualTabletServer_v3.1.3_setup.exe Token: SeTcbPrivilege 2788 VirtualTabletServer_v3.1.3_setup.exe Token: SeSecurityPrivilege 2788 VirtualTabletServer_v3.1.3_setup.exe Token: SeTakeOwnershipPrivilege 2788 VirtualTabletServer_v3.1.3_setup.exe Token: SeLoadDriverPrivilege 2788 VirtualTabletServer_v3.1.3_setup.exe Token: SeSystemProfilePrivilege 2788 VirtualTabletServer_v3.1.3_setup.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 1948 VirtualTabletServer_v3.1.3_setup.exe 5032 VirtualTabletServer.exe 5032 VirtualTabletServer.exe 5032 VirtualTabletServer.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 5032 VirtualTabletServer.exe 5032 VirtualTabletServer.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 5032 VirtualTabletServer.exe 5032 VirtualTabletServer.exe 5032 VirtualTabletServer.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 5100 wrote to memory of 1948 5100 VirtualTabletServer_v3.1.3_setup.exe 82 PID 5100 wrote to memory of 1948 5100 VirtualTabletServer_v3.1.3_setup.exe 82 PID 1948 wrote to memory of 2788 1948 VirtualTabletServer_v3.1.3_setup.exe 93 PID 1948 wrote to memory of 2788 1948 VirtualTabletServer_v3.1.3_setup.exe 93 PID 2788 wrote to memory of 3452 2788 VirtualTabletServer_v3.1.3_setup.exe 97 PID 2788 wrote to memory of 3452 2788 VirtualTabletServer_v3.1.3_setup.exe 97 PID 2368 wrote to memory of 1448 2368 svchost.exe 104 PID 2368 wrote to memory of 1448 2368 svchost.exe 104 PID 1448 wrote to memory of 968 1448 DrvInst.exe 105 PID 1448 wrote to memory of 968 1448 DrvInst.exe 105 PID 2368 wrote to memory of 4368 2368 svchost.exe 106 PID 2368 wrote to memory of 4368 2368 svchost.exe 106 PID 5032 wrote to memory of 2576 5032 VirtualTabletServer.exe 113 PID 5032 wrote to memory of 2576 5032 VirtualTabletServer.exe 113 PID 5032 wrote to memory of 2576 5032 VirtualTabletServer.exe 113 PID 2576 wrote to memory of 1328 2576 adb.exe 115 PID 2576 wrote to memory of 1328 2576 adb.exe 115 PID 2576 wrote to memory of 1328 2576 adb.exe 115 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\VirtualTabletServer_v3.1.3_setup.exe"C:\Users\Admin\AppData\Local\Temp\VirtualTabletServer_v3.1.3_setup.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Windows\TEMP\{5A4664B5-121D-460F-87CE-E80DAC93BD52}\.cr\VirtualTabletServer_v3.1.3_setup.exe"C:\Windows\TEMP\{5A4664B5-121D-460F-87CE-E80DAC93BD52}\.cr\VirtualTabletServer_v3.1.3_setup.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\VirtualTabletServer_v3.1.3_setup.exe" -burn.filehandle.attached=572 -burn.filehandle.self=5922⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Windows\TEMP\{37C5B900-5BA5-4EBD-850D-264EB6A7F7A5}\.be\VirtualTabletServer_v3.1.3_setup.exe"C:\Windows\TEMP\{37C5B900-5BA5-4EBD-850D-264EB6A7F7A5}\.be\VirtualTabletServer_v3.1.3_setup.exe" -q -burn.elevated BurnPipe.{AC4E66CF-4873-44DD-A6A8-6A83DC6AB9A2} {BBE486CF-D8A8-46BF-BA63-B22F28E95DDA} 19483⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:24⤵
- Suspicious use of AdjustPrivilegeToken
PID:3452
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
PID:3544
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Modifies data under HKEY_USERS
- Modifies registry class
PID:1784 -
C:\Program Files\VirtualTablet Server\Drivers\DrvInst.exe"C:\Program Files\VirtualTablet Server\Drivers\DrvInst.exe" install vmulti.inf djpnewton\vmulti2⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4204
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s DeviceInstall1⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\system32\DrvInst.exeDrvInst.exe "4" "1" "c:\program files\virtualtablet server\drivers\vmulti.inf" "9" "4b03c492f" "0000000000000140" "WinSta0\Default" "0000000000000158" "208" "c:\program files\virtualtablet server\drivers"2⤵
- Manipulates Digital Signatures
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Windows\system32\pnpui.dll,InstallSecurityPromptRunDllW 20 Global\{24aba415-4230-8b43-b71c-adc7782eceae} Global\{de9d4f64-c95a-964d-9971-1474f8b9dda9} C:\Windows\System32\DriverStore\Temp\{21d6da7d-b47f-374f-a740-431150b8f806}\vmulti.inf C:\Windows\System32\DriverStore\Temp\{21d6da7d-b47f-374f-a740-431150b8f806}\vmulti.cat3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:968
-
-
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "2" "211" "ROOT\HIDCLASS\0000" "C:\Windows\INF\oem3.inf" "oem3.inf:c14ce884b67bbc5d:vmulti.Inst:16.53.52.383:djpnewton\vmulti," "4b03c492f" "0000000000000140"2⤵
- Drops file in Drivers directory
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
PID:4368
-
-
C:\Program Files\VirtualTablet Server\VirtualTabletServer.exe"C:\Program Files\VirtualTablet Server\VirtualTabletServer.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Program Files\VirtualTablet Server\adb\adb.exe"C:\Program Files\VirtualTablet Server\adb\adb.exe" devices2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Program Files\VirtualTablet Server\adb\adb.exeadb -L tcp:5037 fork-server server --reply-fd 5883⤵
- System Location Discovery: System Language Discovery
PID:1328
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
1Subvert Trust Controls
1SIP and Trust Provider Hijacking
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29.5MB
MD58b8fb0b409bc8b50abd8f55c10130590
SHA140819fe7b0c258edaa8be6a65bcabdb245e7d6af
SHA256ce21efe9ec03f5799de9fb2edbb75c92261176a0ff34b124dcce3750764c7470
SHA51217a3007afe108720930c686d374c042c8b17e513d12e9f2c0240a96211075ad3d4b05a1696037620ea9acb55ccaa8df7cd6465bdd5979fa8119eeb7a97daf09d
-
Filesize
1.7MB
MD5d10864c1730172780c2d4be633b9220a
SHA1b85d02ba0e8de4aeded1a2f5679505cd403bd201
SHA256f6fb39a8578f19616570d5a3dc7212c84a9da232b30a03376bbf08f4264fedf2
SHA512c161bfa9118e04eb60a885bf99758843c4b1349ac58d2e501dabbd7efc0480ec902ac9a2be16f850b218e97b022a90fcc44925d7b6e5113766621f7ade38b040
-
Filesize
8KB
MD584977b85e9e1d90d5c9dc3dbca70a75b
SHA1eb0b57fb397b557f2ef15893137632ebffe95fee
SHA25677d6367bd52f307fdef58b7246c944423ef6c7d136676acc651d5bee0f3d7d1e
SHA5125886c3570b55ebe874ce6c1cc6fc59241ae06f934ff26ad4c61a9e4d4197c4164d8ce78ea1ef7a72d37284ccbcfecd2ba35a6896dd0a34299dce95ab3b4cde27
-
Filesize
2KB
MD572f61f9b84dd54dc761d9a40c49ffdc3
SHA1d97de8e3b2b7722009933fbf64a9376243bf7f22
SHA256a752ed816ab1259da2e3c9a1ccfd55af86b11c1638b7f8ed76b4c8749bccb07d
SHA512ca52bf508a445e4f1ebb8c8429db07f7aaf17b8445fe02604d6512e9daaf6aaceee713c7194891729d121291e140b6b93e8517cfe9c6e29ac34a34dc7b5f223b
-
Filesize
9KB
MD573f306df9e8525b23600b6f00cd41392
SHA14a5c5fc5da4857bbe0a2e9fe3ed41516b85ccba5
SHA25673902926ef3ce9c8f6b337284c90956e2e4717309f8aef4d0c7ba0394eab3664
SHA512a0018cef5bf77290a4b69a51939deab4a0f685a849b07b769d9fea43ebd9bb5eeffd7d8b8a7042d4436fe5ba6439e8ba8d33dd55d4257d15c19e3eb6f2aa8049
-
Filesize
1.3MB
MD569a542c2422f4f539ac40ce9397c9935
SHA15d58ec90b036e9945bdff1bf4fbb52a92ede0e00
SHA256253bf36a09e7f5c4bc7d5dfade9e3f544b9a6e352b917bc3929c49024bdf9dd2
SHA5122e4023ad4faa30677d231432864d9205ee5fd9634803bedb08dca51bf86e95255d172c5f296072ff908349032f593abe3a659813ffa5543dc5b212b747921131
-
Filesize
4KB
MD5c4b419eb2db55b63793791f008996449
SHA18e3e3fd449dafe6231bfd2ca5a511e8a3a497b92
SHA25605a28f83ccdd456177a35213a83a1d78a1fd563fa88eb4dd17f612fc32b92437
SHA5120fe00d342f15ba5ed1636f56e5e20a936f5abe99d1ffae517922dbfdd6a662117f6d67ae801bc9a7058af5219daf5537fe7c324cd429e9a89fc1779c38f0c8e0
-
Filesize
366KB
MD5ae30aef6b62a24b80c560773264c7f47
SHA1fc1befa879bc5c1d43440830c7155f51103d7a59
SHA25664ae3ecfb170f00f83e7ca4dee61a23023d48b22b79d0a28f13c52c133172cca
SHA512994e3052a30e91f6731a0bae3bd20395dd648cfa9bfcb4283c4c7bb4539161e3c8cb67f355cfef5c2172cb0c7692f8acfbdca1cb185ab20148120c67d89dd53c
-
Filesize
23.7MB
MD58a58cb45df11a323e985dd09f54de52e
SHA131eea179b1941a7d88714e8532099dcfab748b55
SHA256610345cef2dfd8935fcfefd9b89ada90f59654cd66584de1660481b82beac131
SHA5123e6bbbd4ea7b7716aa69f962addf2087a239fe8cfc5114d7939d7ad595e6c53651ea00ac0f509876d0f37816d051244e4fa870fa7f6597254f94b0b266d675f5
-
\??\Volume{83bffa96-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{1d6016d2-b9bf-4d8d-8b18-876e6f78f9d5}_OnDiskSnapshotProp
Filesize6KB
MD57586c01bdf43c4e35c8e664878ad3ead
SHA150f110b54545974d3255aa27fec12859df7f60c5
SHA2566ccc6c941a9f4fc38e72435a9abe24f4d85a1d580837b286b26287f909e34119
SHA5124dd3949bd6bc5ac735d739ddf563aa6be26403d0218e86352cb5f59f9724bba302b932912dc5e62e3321c14fd24a656db0bace6031ed24e7461cbb685b706fdb