Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    153s
  • max time network
    169s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/03/2023, 00:24

General

  • Target

    Undertale/mus_xpart_back.ogg

  • Size

    194KB

  • MD5

    cf327bbd54e3e211e8e268f548bd3b26

  • SHA1

    3731fe3f8ee640bb11f32849fcbfb04ba6657c13

  • SHA256

    97024dc4c151d2e8558e00facb66d8e0ee180e168f1f4246d4f8164c56b0a878

  • SHA512

    30385a2ae088a6205ea0a171fff4af32e0d739a1fbc71df6e1d2f6f892958e37c66f764747adceb9eb12d4344fd699a385451d410d9111675fe91047c90e5ea6

  • SSDEEP

    3072:BEN0H9+ksNLk0UsYmLmFvYF9D2Z8qO/HljoGZsxdgzf9+qUDjrURke1ZDjLwIkw:BEN+MTLkjsvovWDA8d9jo1ylUReTjsIr

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 8 IoCs
  • Suspicious use of SendNotifyMessage 7 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Undertale\mus_xpart_back.ogg
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:852
    • C:\Program Files\VideoLAN\VLC\vlc.exe
      "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\Undertale\mus_xpart_back.ogg"
      2⤵
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:1468
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x4a0 0x408
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4488

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1468-161-0x00007FFF1AEC0000-0x00007FFF1AF2F000-memory.dmp

    Filesize

    444KB

  • memory/1468-153-0x00007FFF1B070000-0x00007FFF1B081000-memory.dmp

    Filesize

    68KB

  • memory/1468-140-0x00007FFF1C5E0000-0x00007FFF1C894000-memory.dmp

    Filesize

    2.7MB

  • memory/1468-142-0x00007FFF2C4D0000-0x00007FFF2C4E7000-memory.dmp

    Filesize

    92KB

  • memory/1468-143-0x00007FFF248E0000-0x00007FFF248F1000-memory.dmp

    Filesize

    68KB

  • memory/1468-144-0x00007FFF23EC0000-0x00007FFF23ED7000-memory.dmp

    Filesize

    92KB

  • memory/1468-145-0x00007FFF1D490000-0x00007FFF1D4A1000-memory.dmp

    Filesize

    68KB

  • memory/1468-141-0x00007FFF2D5F0000-0x00007FFF2D608000-memory.dmp

    Filesize

    96KB

  • memory/1468-147-0x00007FFF1C3D0000-0x00007FFF1C3E1000-memory.dmp

    Filesize

    68KB

  • memory/1468-146-0x00007FFF1D1A0000-0x00007FFF1D1BD000-memory.dmp

    Filesize

    116KB

  • memory/1468-148-0x00007FFF1C1D0000-0x00007FFF1C3D0000-memory.dmp

    Filesize

    2.0MB

  • memory/1468-149-0x00007FFF1C190000-0x00007FFF1C1CF000-memory.dmp

    Filesize

    252KB

  • memory/1468-150-0x00007FFF1B0E0000-0x00007FFF1C18B000-memory.dmp

    Filesize

    16.7MB

  • memory/1468-151-0x00007FFF1B0B0000-0x00007FFF1B0D1000-memory.dmp

    Filesize

    132KB

  • memory/1468-160-0x00007FFF1AF30000-0x00007FFF1AF97000-memory.dmp

    Filesize

    412KB

  • memory/1468-154-0x00007FFF1B050000-0x00007FFF1B061000-memory.dmp

    Filesize

    68KB

  • memory/1468-155-0x00007FFF1B030000-0x00007FFF1B041000-memory.dmp

    Filesize

    68KB

  • memory/1468-158-0x00007FFF1AFD0000-0x00007FFF1AFE8000-memory.dmp

    Filesize

    96KB

  • memory/1468-139-0x00007FFF1D4B0000-0x00007FFF1D4E4000-memory.dmp

    Filesize

    208KB

  • memory/1468-159-0x00007FFF1AFA0000-0x00007FFF1AFD0000-memory.dmp

    Filesize

    192KB

  • memory/1468-167-0x00007FFF1A750000-0x00007FFF1A77F000-memory.dmp

    Filesize

    188KB

  • memory/1468-162-0x00007FFF1AEA0000-0x00007FFF1AEB1000-memory.dmp

    Filesize

    68KB

  • memory/1468-163-0x00007FFF1AE40000-0x00007FFF1AE9C000-memory.dmp

    Filesize

    368KB

  • memory/1468-164-0x00007FFF1ACC0000-0x00007FFF1AE38000-memory.dmp

    Filesize

    1.5MB

  • memory/1468-166-0x00007FFF2CF70000-0x00007FFF2CF80000-memory.dmp

    Filesize

    64KB

  • memory/1468-138-0x00007FF6996C0000-0x00007FF6997B8000-memory.dmp

    Filesize

    992KB

  • memory/1468-168-0x00007FFF1A730000-0x00007FFF1A741000-memory.dmp

    Filesize

    68KB

  • memory/1468-169-0x00007FFF1A710000-0x00007FFF1A726000-memory.dmp

    Filesize

    88KB

  • memory/1468-165-0x00007FFF1ACA0000-0x00007FFF1ACB7000-memory.dmp

    Filesize

    92KB

  • memory/1468-157-0x00007FFF1AFF0000-0x00007FFF1B001000-memory.dmp

    Filesize

    68KB

  • memory/1468-156-0x00007FFF1B010000-0x00007FFF1B02B000-memory.dmp

    Filesize

    108KB

  • memory/1468-170-0x00007FFF1A640000-0x00007FFF1A705000-memory.dmp

    Filesize

    788KB

  • memory/1468-172-0x00007FFF1A0B0000-0x00007FFF1A0C1000-memory.dmp

    Filesize

    68KB

  • memory/1468-173-0x00007FFF1A090000-0x00007FFF1A0A2000-memory.dmp

    Filesize

    72KB

  • memory/1468-171-0x00007FFF1A620000-0x00007FFF1A635000-memory.dmp

    Filesize

    84KB

  • memory/1468-152-0x00007FFF1B090000-0x00007FFF1B0A8000-memory.dmp

    Filesize

    96KB

  • memory/1468-174-0x00007FFF19F10000-0x00007FFF1A08A000-memory.dmp

    Filesize

    1.5MB

  • memory/1468-188-0x00007FFF1B0E0000-0x00007FFF1C18B000-memory.dmp

    Filesize

    16.7MB

  • memory/1468-178-0x00007FFF1C5E0000-0x00007FFF1C894000-memory.dmp

    Filesize

    2.7MB

  • memory/4488-175-0x0000027B75EA0000-0x0000027B760A8000-memory.dmp

    Filesize

    2.0MB