Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
154s -
max time network
174s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
20/03/2023, 14:34
Static task
static1
Behavioral task
behavioral1
Sample
vawax.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
vawax.exe
Resource
win10v2004-20230220-en
General
-
Target
vawax.exe
-
Size
726.0MB
-
MD5
c3a17b0e7d83d4eff77f17b5ce764e14
-
SHA1
accbe20f2588372910baac8636d60719d7a6b56f
-
SHA256
2dd1f46406e90b8b57ac49bdba45e4f279db5604921df3921f945e72c28d6820
-
SHA512
86334bf19f9179d440e68bbf8ab4fd11ee45bd6015f8d6842cf87c0e98086528adc8da033bcca39c7f4fed76f18e4dcb4e68820745158580681e1e9b47c1e7bd
-
SSDEEP
196608:FVi+d3U/4jzIVa48fwWTL7oO30d/3qMbElQ:rP6qzIVa4uwWTX+fqMbT
Malware Config
Extracted
laplas
http://212.113.106.172
-
api_key
a8f23fb9332db9a7947580ee498822bfe375b57ad7eb47370c7209509050c298
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation vawax.exe -
Executes dropped EXE 1 IoCs
pid Process 1684 svcservice.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\telemetry = "C:\\Users\\Admin\\AppData\\Roaming\\telemetry\\svcservice.exe" vawax.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2408 vawax.exe 2408 vawax.exe 2408 vawax.exe 2408 vawax.exe 1684 svcservice.exe 1684 svcservice.exe 1684 svcservice.exe 1684 svcservice.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2408 wrote to memory of 1684 2408 vawax.exe 93 PID 2408 wrote to memory of 1684 2408 vawax.exe 93 PID 2408 wrote to memory of 1684 2408 vawax.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\vawax.exe"C:\Users\Admin\AppData\Local\Temp\vawax.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1684
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
578.2MB
MD50784ef9fa883a31c41875e49c1127b92
SHA1fda7cf09671dd27f8a60cbe557e601519c7dce84
SHA2565827282891cd1a0e358565b1db2ef0d2580fe0bc9f652c8ecde17830900735a6
SHA5123be0aa19e7c3fb460aaeec9041ae1afdf5139bb34bdf8901bf69b8ff91bc6115bcec03696fe08ebffbf0ab3c45d12e80e6799212367a6224b9b197153a652f7b
-
Filesize
531.6MB
MD55c9712eb4937acf26f4f454818f40f22
SHA100115f47ec1fdab81b680efa5be0d46e896bb5a0
SHA256541e5e872a0141b4ba3a965533fc1ca119cfbed07360cf3417862557a433e16c
SHA5123143ea75821a307b5cb56c143036e35556593999fc3cb5b92f402ff189c71e92262a82018a7e87f73dedbc34fb1f0d71ec7069773c977ef6f96b7262dac28d90
-
Filesize
503.4MB
MD5705cfd1fe7e50b0efb4876340ab1e534
SHA1b5c41d1f581fa2e5af584a4867b1e736f3651a39
SHA256a9590bc1627e83251f5cbd9ba93f34b2e14d9b53db60a27e12521ce01aac9114
SHA512eff857374149a45af32a0d9540d4db7632408b22815938abba3d5f2f8d94252ddb838aca5e5322551e08f12b514bbbf1e58c0ea43574d63a77a58a0b24179fa3