Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
6s -
max time network
9s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
27/12/2022, 09:51
Static task
static1
Behavioral task
behavioral1
Sample
LoaderVIP.exe
Resource
win10v2004-20220812-en
General
-
Target
LoaderVIP.exe
-
Size
16KB
-
MD5
7c224f6c9b8a4b54b8e10f888a2a52f6
-
SHA1
b4f35ea703b27a0ed107d072234f6ff60f2dbf05
-
SHA256
51e74db534bf848c4a49a22389a62b38ebab4f5c7dc623e59ddae6097f560e12
-
SHA512
2f5003182e71d356e24a20e40cd00b32db36e5287308ed229bd766ab0523231cec735e01fb84e1baac079047739190e730cbf6fc33396c1c90b9350cf82ee18e
-
SSDEEP
384:tL9SDQZxLTehau23G6cyYxN09t6cDE33DhSHkON/GlfgOb5:BghaN39SDJiE33VSEONulfgO
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 1284 Token.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation LoaderVIP.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\AF\Token.exe LoaderVIP.exe File opened for modification C:\Windows\AF\Token.mentah LoaderVIP.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1284 Token.exe 1284 Token.exe 1284 Token.exe 1284 Token.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 676 wrote to memory of 1284 676 LoaderVIP.exe 84 PID 676 wrote to memory of 1284 676 LoaderVIP.exe 84 PID 676 wrote to memory of 1284 676 LoaderVIP.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\LoaderVIP.exe"C:\Users\Admin\AppData\Local\Temp\LoaderVIP.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:676 -
C:\Windows\AF\Token.exe"C:\Windows\AF\Token.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1284
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32KB
MD516697614dc6e8c078f8edde9aff1f75d
SHA13055c0ba6ec761816399268c12e749a4707fe77a
SHA256ff5d1c972aba46459e19bad9bfb46537ceb083d935399fc7e480988faa65a92e
SHA512c71eea1e89864279368b64a0d7e8629c514aae4de50602e305a69f215088f8aea37eab24c80dadeb477b70fd433945ac89ddf8cc346594b3afda05b6cb968516
-
Filesize
32KB
MD516697614dc6e8c078f8edde9aff1f75d
SHA13055c0ba6ec761816399268c12e749a4707fe77a
SHA256ff5d1c972aba46459e19bad9bfb46537ceb083d935399fc7e480988faa65a92e
SHA512c71eea1e89864279368b64a0d7e8629c514aae4de50602e305a69f215088f8aea37eab24c80dadeb477b70fd433945ac89ddf8cc346594b3afda05b6cb968516