Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    151s
  • max time network
    190s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/03/2023, 00:24 UTC

General

  • Target

    Undertale/mus_xpart_a.ogg

  • Size

    691KB

  • MD5

    41edfcd54486f4873191f24eb3046e78

  • SHA1

    db56c6fd3c5bd054aca9ea1c6a0c57871119a756

  • SHA256

    5322645e70772c950cdb3bd6978640cc116abfda863f8878d2c8b8f48b452431

  • SHA512

    1c12e7d1c470734a29021988e4e23024dd6a2391daf880e7424367ea5987c13f739df97b80ef01dd666c5279e3580a43ffb87f440804858b3182efbb812a3cd4

  • SSDEEP

    12288:ksW4unEss2lhpdmlQDdAjiCczRjLqios6lDmIfM7l4A0E4Gq2IwuoHLX8OhP/JC:EvjXTOlrczlLFospGAIGqQXLdhP/JC

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 8 IoCs
  • Suspicious use of SendNotifyMessage 7 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Undertale\mus_xpart_a.ogg
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3536
    • C:\Program Files\VideoLAN\VLC\vlc.exe
      "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\Undertale\mus_xpart_a.ogg"
      2⤵
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:208
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x2f4 0x2f8
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:640

Network

  • flag-us
    DNS
    76.38.195.152.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    76.38.195.152.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    199.176.139.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    199.176.139.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    97.17.167.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    97.17.167.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    131.17.126.40.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    131.17.126.40.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    62.13.109.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    62.13.109.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    196.249.167.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    196.249.167.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    113.238.32.23.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    113.238.32.23.in-addr.arpa
    IN PTR
    Response
    113.238.32.23.in-addr.arpa
    IN PTR
    a23-32-238-113deploystaticakamaitechnologiescom
  • 162.19.139.184:2222
    92 B
    780 B
    2
    2
  • 52.152.110.14:443
    260 B
    5
  • 52.152.110.14:443
    260 B
    5
  • 209.197.3.8:80
    322 B
    7
  • 173.223.113.164:443
    322 B
    7
  • 52.152.110.14:443
    260 B
    5
  • 52.152.110.14:443
    260 B
    5
  • 52.152.110.14:443
    260 B
    5
  • 52.152.110.14:443
    260 B
    5
  • 52.152.110.14:443
    260 B
    5
  • 8.8.8.8:53
    76.38.195.152.in-addr.arpa
    dns
    72 B
    143 B
    1
    1

    DNS Request

    76.38.195.152.in-addr.arpa

  • 8.8.8.8:53
    199.176.139.52.in-addr.arpa
    dns
    73 B
    159 B
    1
    1

    DNS Request

    199.176.139.52.in-addr.arpa

  • 8.8.8.8:53
    97.17.167.52.in-addr.arpa
    dns
    71 B
    145 B
    1
    1

    DNS Request

    97.17.167.52.in-addr.arpa

  • 8.8.8.8:53
    131.17.126.40.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    131.17.126.40.in-addr.arpa

  • 8.8.8.8:53
    62.13.109.52.in-addr.arpa
    dns
    71 B
    145 B
    1
    1

    DNS Request

    62.13.109.52.in-addr.arpa

  • 8.8.8.8:53
    196.249.167.52.in-addr.arpa
    dns
    73 B
    147 B
    1
    1

    DNS Request

    196.249.167.52.in-addr.arpa

  • 8.8.8.8:53
    113.238.32.23.in-addr.arpa
    dns
    72 B
    137 B
    1
    1

    DNS Request

    113.238.32.23.in-addr.arpa

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/208-138-0x00007FF698540000-0x00007FF698638000-memory.dmp

    Filesize

    992KB

  • memory/208-139-0x00007FFEB21A0000-0x00007FFEB21D4000-memory.dmp

    Filesize

    208KB

  • memory/208-140-0x00007FFEB1250000-0x00007FFEB1504000-memory.dmp

    Filesize

    2.7MB

  • memory/208-141-0x00007FFEC6090000-0x00007FFEC60A8000-memory.dmp

    Filesize

    96KB

  • memory/208-143-0x00007FFEC1310000-0x00007FFEC1321000-memory.dmp

    Filesize

    68KB

  • memory/208-144-0x00007FFEC0DC0000-0x00007FFEC0DD7000-memory.dmp

    Filesize

    92KB

  • memory/208-142-0x00007FFEC1450000-0x00007FFEC1467000-memory.dmp

    Filesize

    92KB

  • memory/208-145-0x00007FFEB2080000-0x00007FFEB2091000-memory.dmp

    Filesize

    68KB

  • memory/208-146-0x00007FFEB2060000-0x00007FFEB207D000-memory.dmp

    Filesize

    116KB

  • memory/208-147-0x00007FFEB2040000-0x00007FFEB2051000-memory.dmp

    Filesize

    68KB

  • memory/208-148-0x00007FFEB07D0000-0x00007FFEB09D0000-memory.dmp

    Filesize

    2.0MB

  • memory/208-149-0x00007FFEAF6B0000-0x00007FFEB075B000-memory.dmp

    Filesize

    16.7MB

  • memory/208-150-0x00007FFEB2000000-0x00007FFEB203F000-memory.dmp

    Filesize

    252KB

  • memory/208-151-0x00007FFEAF680000-0x00007FFEAF6A1000-memory.dmp

    Filesize

    132KB

  • memory/208-152-0x00007FFEAF660000-0x00007FFEAF678000-memory.dmp

    Filesize

    96KB

  • memory/208-155-0x00007FFEAF600000-0x00007FFEAF611000-memory.dmp

    Filesize

    68KB

  • memory/208-156-0x00007FFEAF5E0000-0x00007FFEAF5FB000-memory.dmp

    Filesize

    108KB

  • memory/208-157-0x00007FFEAF5C0000-0x00007FFEAF5D1000-memory.dmp

    Filesize

    68KB

  • memory/208-158-0x00007FFEAF5A0000-0x00007FFEAF5B8000-memory.dmp

    Filesize

    96KB

  • memory/208-161-0x00007FFEAF490000-0x00007FFEAF4FF000-memory.dmp

    Filesize

    444KB

  • memory/208-162-0x00007FFEAF470000-0x00007FFEAF481000-memory.dmp

    Filesize

    68KB

  • memory/208-164-0x0000021EBF4D0000-0x0000021EBF648000-memory.dmp

    Filesize

    1.5MB

  • memory/208-170-0x00007FFEB0F20000-0x00007FFEB0FE5000-memory.dmp

    Filesize

    788KB

  • memory/208-169-0x00007FFEB0FF0000-0x00007FFEB1006000-memory.dmp

    Filesize

    88KB

  • memory/208-172-0x00007FFEB0D00000-0x00007FFEB0D11000-memory.dmp

    Filesize

    68KB

  • memory/208-173-0x00007FFEB0CE0000-0x00007FFEB0CF2000-memory.dmp

    Filesize

    72KB

  • memory/208-171-0x00007FFEB0F00000-0x00007FFEB0F15000-memory.dmp

    Filesize

    84KB

  • memory/208-168-0x00007FFEB1010000-0x00007FFEB1021000-memory.dmp

    Filesize

    68KB

  • memory/208-174-0x00007FFEAEEE0000-0x00007FFEAF05A000-memory.dmp

    Filesize

    1.5MB

  • memory/208-166-0x00007FFEC1820000-0x00007FFEC1830000-memory.dmp

    Filesize

    64KB

  • memory/208-165-0x00007FFEAF270000-0x00007FFEAF287000-memory.dmp

    Filesize

    92KB

  • memory/208-167-0x00007FFEB1030000-0x00007FFEB105F000-memory.dmp

    Filesize

    188KB

  • memory/208-163-0x0000021EBE6A0000-0x0000021EBE6FC000-memory.dmp

    Filesize

    368KB

  • memory/208-160-0x00007FFEAF500000-0x00007FFEAF567000-memory.dmp

    Filesize

    412KB

  • memory/208-159-0x00007FFEAF570000-0x00007FFEAF5A0000-memory.dmp

    Filesize

    192KB

  • memory/208-154-0x00007FFEAF620000-0x00007FFEAF631000-memory.dmp

    Filesize

    68KB

  • memory/208-153-0x00007FFEAF640000-0x00007FFEAF651000-memory.dmp

    Filesize

    68KB

  • memory/208-186-0x00007FFEAF6B0000-0x00007FFEB075B000-memory.dmp

    Filesize

    16.7MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.