Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    137s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/07/2023, 06:54

General

  • Target

    Act I - Veda/Act I - Veda.exe

  • Size

    93.2MB

  • MD5

    2510ba102f89df229af25c71db8f9c18

  • SHA1

    6d811f81c1925eb109acfabb543dc2d45d8e1201

  • SHA256

    c3f69ff405518d61e6cff0443f4ddbe9a96c84d352efdfece8f2b7a1066d6d2c

  • SHA512

    88e7ae79ea2f026b09254d8a64d496a8d4b0a41eee7ef59da2b86eaede1b21fef1d39edc972901814d8d34c2c69b1aba3a55bb3eae7b028fce9963e2b25190f0

  • SSDEEP

    1572864:wdJvugr82jf19dUM/1T8+1VJRukUhkmG:wdhg6Pm

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 7 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Act I - Veda\Act I - Veda.exe
    "C:\Users\Admin\AppData\Local\Temp\Act I - Veda\Act I - Veda.exe"
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2152
    • C:\Users\Admin\AppData\Local\Temp\Act I - Veda\Act I - Veda.exe
      "C:\Users\Admin\AppData\Local\Temp\Act I - Veda\Act I - Veda.exe" --type=gpu-process --disable-features=SpareRendererForSitePerProcess --gpu-preferences=KAAAAAAAAACAAwAAAQAAAAAAAAAAAGAAAAAAAAEAAAAIAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAFAAAAEAAAAAAAAAAAAAAABgAAABAAAAAAAAAAAQAAAAUAAAAQAAAAAAAAAAEAAAAGAAAA --service-request-channel-token=3693642560340247530 --mojo-platform-channel-handle=1720 --ignored=" --type=renderer " /prefetch:2
      2⤵
        PID:1468
      • C:\Users\Admin\AppData\Local\Temp\Act I - Veda\Act I - Veda.exe
        "C:\Users\Admin\AppData\Local\Temp\Act I - Veda\Act I - Veda.exe" --type=renderer --disable-features=SpareRendererForSitePerProcess --service-pipe-token=6525158664071807714 --lang=en-US --app-path="C:\Users\Admin\AppData\Local\Temp\Act I - Veda\resources\app.asar" --no-sandbox --no-zygote --preload="C:\Users\Admin\AppData\Local\Temp\Act I - Veda\resources\app.asar\preload.js" --background-color=#000000 --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --service-request-channel-token=6525158664071807714 --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2240 /prefetch:1
        2⤵
        • Checks processor information in registry
        • Suspicious use of WriteProcessMemory
        PID:4192
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /d /s /c "%windir%\System32\REG.exe QUERY HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography /v MachineGuid"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3996
          • C:\Windows\System32\reg.exe
            C:\Windows\System32\REG.exe QUERY HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography /v MachineGuid
            4⤵
              PID:1264
        • C:\Users\Admin\AppData\Local\Temp\Act I - Veda\Act I - Veda.exe
          "C:\Users\Admin\AppData\Local\Temp\Act I - Veda\Act I - Veda.exe" --type=gpu-process --disable-features=SpareRendererForSitePerProcess --disable-gpu-sandbox --use-gl=disabled --gpu-preferences=KAAAAAAAAACAAwAAAQAAAAAAAAAAAGAAAAAAAAEAAAAIAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAFAAAAEAAAAAAAAAAAAAAABgAAABAAAAAAAAAAAQAAAAUAAAAQAAAAAAAAAAEAAAAGAAAA --service-request-channel-token=3653265887034132495 --mojo-platform-channel-handle=2640 /prefetch:2
          2⤵
            PID:1340
        • C:\Windows\System32\CompPkgSrv.exe
          C:\Windows\System32\CompPkgSrv.exe -Embedding
          1⤵
            PID:3592

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Roaming\Incredibox\000002.dbtmp

            Filesize

            16B

            MD5

            206702161f94c5cd39fadd03f4014d98

            SHA1

            bd8bfc144fb5326d21bd1531523d9fb50e1b600a

            SHA256

            1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

            SHA512

            0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

          • C:\Users\Admin\AppData\Roaming\Incredibox\CURRENT

            Filesize

            16B

            MD5

            46295cac801e5d4857d09837238a6394

            SHA1

            44e0fa1b517dbf802b18faf0785eeea6ac51594b

            SHA256

            0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

            SHA512

            8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

          • C:\Users\Admin\AppData\Roaming\Incredibox\Local Storage\leveldb\MANIFEST-000001

            Filesize

            41B

            MD5

            5af87dfd673ba2115e2fcf5cfdb727ab

            SHA1

            d5b5bbf396dc291274584ef71f444f420b6056f1

            SHA256

            f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

            SHA512

            de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

          • memory/1468-134-0x00007FF91EC10000-0x00007FF91EC11000-memory.dmp

            Filesize

            4KB