Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    161s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/03/2023, 00:24

General

  • Target

    Undertale/mus_zz_megalovania.ogg

  • Size

    1.8MB

  • MD5

    2e1f0d621bc043cce9f9d95bda31010e

  • SHA1

    577acf76854a9e7da25fc4665742c4013b6eb5f0

  • SHA256

    8808cd10b7a7cdbf69494479e5f93a604918cd920f8a0a91aca1aff970ddbb79

  • SHA512

    e2f7a756d1f3ba746e92983d931cc522ba0a9e02d07ec5c06c8cee4100b9d585d54e79c04604ac6e12c877c0006b85335c57648fcd889ce8d412eea5d6d9bc54

  • SSDEEP

    49152:O695gHheOms+4GVHTV4Xpzy9jd0qz9UMCRuETDu6TktTT:t5gHxSVzyzE02Wktf

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SendNotifyMessage 5 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Undertale\mus_zz_megalovania.ogg
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1872
    • C:\Program Files\VideoLAN\VLC\vlc.exe
      "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\Undertale\mus_zz_megalovania.ogg"
      2⤵
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:2344
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x2c8 0x388
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2252

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2344-138-0x00007FF6B0080000-0x00007FF6B0178000-memory.dmp

    Filesize

    992KB

  • memory/2344-139-0x00007FFD35390000-0x00007FFD353C4000-memory.dmp

    Filesize

    208KB

  • memory/2344-140-0x00007FFD33130000-0x00007FFD333E4000-memory.dmp

    Filesize

    2.7MB

  • memory/2344-144-0x00007FFD349B0000-0x00007FFD349C7000-memory.dmp

    Filesize

    92KB

  • memory/2344-146-0x00007FFD343E0000-0x00007FFD343FD000-memory.dmp

    Filesize

    116KB

  • memory/2344-147-0x00007FFD343C0000-0x00007FFD343D1000-memory.dmp

    Filesize

    68KB

  • memory/2344-148-0x00007FFD32D70000-0x00007FFD32F70000-memory.dmp

    Filesize

    2.0MB

  • memory/2344-145-0x00007FFD34990000-0x00007FFD349A1000-memory.dmp

    Filesize

    68KB

  • memory/2344-143-0x00007FFD349D0000-0x00007FFD349E1000-memory.dmp

    Filesize

    68KB

  • memory/2344-142-0x00007FFD34C20000-0x00007FFD34C37000-memory.dmp

    Filesize

    92KB

  • memory/2344-141-0x00007FFD3A480000-0x00007FFD3A498000-memory.dmp

    Filesize

    96KB

  • memory/2344-149-0x00007FFD31C60000-0x00007FFD32D0B000-memory.dmp

    Filesize

    16.7MB

  • memory/2344-151-0x00007FFD31BD0000-0x00007FFD31BF1000-memory.dmp

    Filesize

    132KB

  • memory/2344-159-0x00007FFD31AC0000-0x00007FFD31AF0000-memory.dmp

    Filesize

    192KB

  • memory/2344-160-0x00007FFD31A50000-0x00007FFD31AB7000-memory.dmp

    Filesize

    412KB

  • memory/2344-161-0x000002CBFF6F0000-0x000002CBFF75F000-memory.dmp

    Filesize

    444KB

  • memory/2344-163-0x00007FFD318F0000-0x00007FFD3194C000-memory.dmp

    Filesize

    368KB

  • memory/2344-162-0x00007FFD31950000-0x00007FFD31961000-memory.dmp

    Filesize

    68KB

  • memory/2344-164-0x00007FFD31770000-0x00007FFD318E8000-memory.dmp

    Filesize

    1.5MB

  • memory/2344-165-0x00007FFD31750000-0x00007FFD31767000-memory.dmp

    Filesize

    92KB

  • memory/2344-167-0x00007FFD340C0000-0x00007FFD340EF000-memory.dmp

    Filesize

    188KB

  • memory/2344-166-0x00007FFD43D10000-0x00007FFD43D20000-memory.dmp

    Filesize

    64KB

  • memory/2344-169-0x00007FFD34080000-0x00007FFD34096000-memory.dmp

    Filesize

    88KB

  • memory/2344-168-0x00007FFD340A0000-0x00007FFD340B1000-memory.dmp

    Filesize

    68KB

  • memory/2344-158-0x00007FFD31AF0000-0x00007FFD31B08000-memory.dmp

    Filesize

    96KB

  • memory/2344-157-0x00007FFD31B10000-0x00007FFD31B21000-memory.dmp

    Filesize

    68KB

  • memory/2344-170-0x00007FFD33810000-0x00007FFD338D5000-memory.dmp

    Filesize

    788KB

  • memory/2344-172-0x00007FFD34040000-0x00007FFD34051000-memory.dmp

    Filesize

    68KB

  • memory/2344-173-0x00007FFD31290000-0x00007FFD312A2000-memory.dmp

    Filesize

    72KB

  • memory/2344-171-0x00007FFD34060000-0x00007FFD34075000-memory.dmp

    Filesize

    84KB

  • memory/2344-156-0x00007FFD31B30000-0x00007FFD31B4B000-memory.dmp

    Filesize

    108KB

  • memory/2344-155-0x00007FFD31B50000-0x00007FFD31B61000-memory.dmp

    Filesize

    68KB

  • memory/2344-154-0x00007FFD31B70000-0x00007FFD31B81000-memory.dmp

    Filesize

    68KB

  • memory/2344-153-0x00007FFD31B90000-0x00007FFD31BA1000-memory.dmp

    Filesize

    68KB

  • memory/2344-152-0x00007FFD31BB0000-0x00007FFD31BC8000-memory.dmp

    Filesize

    96KB

  • memory/2344-150-0x00007FFD31C00000-0x00007FFD31C3F000-memory.dmp

    Filesize

    252KB

  • memory/2344-174-0x00007FFD31110000-0x00007FFD3128A000-memory.dmp

    Filesize

    1.5MB

  • memory/2344-186-0x00007FFD31C60000-0x00007FFD32D0B000-memory.dmp

    Filesize

    16.7MB