Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    144s
  • max time network
    163s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/09/2023, 20:33 UTC

General

  • Target

    DF CONNECTED v2.7.6c (Windows)/mus_encore.ogg

  • Size

    1.1MB

  • MD5

    a76745c7e4b89562b3445776ef480b40

  • SHA1

    2a968e4c3e7ceef04960b312425ea9be54df48bc

  • SHA256

    db99e5386186dff5baba8d8fa5be354ee03636039c849bb9c91eafc812029f61

  • SHA512

    c8ecb22423313fbde5adc279da38f8210dc68a6166ace954f36e3450a987ac474a731dcc52f2cc6c5f897fb4ca933ef46bc4545362077ab45e8d139e71b43e9d

  • SSDEEP

    24576:FJUAzTbb2yQQxZ7Xrcxo0AYNVGjny1BTuzUMHmeGmZHJPPzoO:/Ux47b/YSTUBizUkGmZpHzJ

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 8 IoCs
  • Suspicious use of SendNotifyMessage 7 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\DF CONNECTED v2.7.6c (Windows)\mus_encore.ogg"
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4560
    • C:\Program Files\VideoLAN\VLC\vlc.exe
      "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\DF CONNECTED v2.7.6c (Windows)\mus_encore.ogg"
      2⤵
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:1644
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x338 0x3bc
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4288

Network

  • flag-us
    DNS
    8.8.8.8.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    8.8.8.8.in-addr.arpa
    IN PTR
    Response
    8.8.8.8.in-addr.arpa
    IN PTR
    dnsgoogle
  • flag-us
    DNS
    133.32.126.40.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    133.32.126.40.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    121.208.253.8.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    121.208.253.8.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    95.221.229.192.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    95.221.229.192.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    9.228.82.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    9.228.82.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    41.110.16.96.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    41.110.16.96.in-addr.arpa
    IN PTR
    Response
    41.110.16.96.in-addr.arpa
    IN PTR
    a96-16-110-41deploystaticakamaitechnologiescom
  • flag-us
    DNS
    50.23.12.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    50.23.12.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    15.164.165.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    15.164.165.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    1.202.248.87.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    1.202.248.87.in-addr.arpa
    IN PTR
    Response
    1.202.248.87.in-addr.arpa
    IN PTR
    https-87-248-202-1amsllnwnet
  • flag-us
    DNS
    211.143.182.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    211.143.182.52.in-addr.arpa
    IN PTR
    Response
No results found
  • 8.8.8.8:53
    8.8.8.8.in-addr.arpa
    dns
    66 B
    90 B
    1
    1

    DNS Request

    8.8.8.8.in-addr.arpa

  • 8.8.8.8:53
    133.32.126.40.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    133.32.126.40.in-addr.arpa

  • 8.8.8.8:53
    121.208.253.8.in-addr.arpa
    dns
    72 B
    126 B
    1
    1

    DNS Request

    121.208.253.8.in-addr.arpa

  • 8.8.8.8:53
    95.221.229.192.in-addr.arpa
    dns
    73 B
    144 B
    1
    1

    DNS Request

    95.221.229.192.in-addr.arpa

  • 8.8.8.8:53
    9.228.82.20.in-addr.arpa
    dns
    70 B
    156 B
    1
    1

    DNS Request

    9.228.82.20.in-addr.arpa

  • 8.8.8.8:53
    41.110.16.96.in-addr.arpa
    dns
    71 B
    135 B
    1
    1

    DNS Request

    41.110.16.96.in-addr.arpa

  • 8.8.8.8:53
    50.23.12.20.in-addr.arpa
    dns
    70 B
    156 B
    1
    1

    DNS Request

    50.23.12.20.in-addr.arpa

  • 8.8.8.8:53
    15.164.165.52.in-addr.arpa
    dns
    72 B
    146 B
    1
    1

    DNS Request

    15.164.165.52.in-addr.arpa

  • 8.8.8.8:53
    1.202.248.87.in-addr.arpa
    dns
    71 B
    116 B
    1
    1

    DNS Request

    1.202.248.87.in-addr.arpa

  • 8.8.8.8:53
    211.143.182.52.in-addr.arpa
    dns
    73 B
    147 B
    1
    1

    DNS Request

    211.143.182.52.in-addr.arpa

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1644-5-0x00007FF774390000-0x00007FF774488000-memory.dmp

    Filesize

    992KB

  • memory/1644-6-0x00007FFF336E0000-0x00007FFF33714000-memory.dmp

    Filesize

    208KB

  • memory/1644-7-0x00007FFF236B0000-0x00007FFF23964000-memory.dmp

    Filesize

    2.7MB

  • memory/1644-9-0x00007FFF337C0000-0x00007FFF337D7000-memory.dmp

    Filesize

    92KB

  • memory/1644-10-0x00007FFF33690000-0x00007FFF336A1000-memory.dmp

    Filesize

    68KB

  • memory/1644-11-0x00007FFF33670000-0x00007FFF33687000-memory.dmp

    Filesize

    92KB

  • memory/1644-14-0x00007FFF333A0000-0x00007FFF333B1000-memory.dmp

    Filesize

    68KB

  • memory/1644-13-0x00007FFF333C0000-0x00007FFF333DD000-memory.dmp

    Filesize

    116KB

  • memory/1644-12-0x00007FFF33410000-0x00007FFF33421000-memory.dmp

    Filesize

    68KB

  • memory/1644-8-0x00007FFF33980000-0x00007FFF33998000-memory.dmp

    Filesize

    96KB

  • memory/1644-15-0x00007FFF234B0000-0x00007FFF236B0000-memory.dmp

    Filesize

    2.0MB

  • memory/1644-16-0x00007FFF22400000-0x00007FFF234AB000-memory.dmp

    Filesize

    16.7MB

  • memory/1644-28-0x00007FFF22320000-0x00007FFF2238F000-memory.dmp

    Filesize

    444KB

  • memory/1644-29-0x00007FFF24F40000-0x00007FFF24F51000-memory.dmp

    Filesize

    68KB

  • memory/1644-30-0x00007FFF222C0000-0x00007FFF2231C000-memory.dmp

    Filesize

    368KB

  • memory/1644-31-0x00007FFF22140000-0x00007FFF222B8000-memory.dmp

    Filesize

    1.5MB

  • memory/1644-32-0x00007FFF22120000-0x00007FFF22137000-memory.dmp

    Filesize

    92KB

  • memory/1644-33-0x00007FFF33A70000-0x00007FFF33A80000-memory.dmp

    Filesize

    64KB

  • memory/1644-35-0x00007FFF220D0000-0x00007FFF220E1000-memory.dmp

    Filesize

    68KB

  • memory/1644-36-0x00007FFF220B0000-0x00007FFF220C6000-memory.dmp

    Filesize

    88KB

  • memory/1644-39-0x00007FFF37B00000-0x00007FFF37B11000-memory.dmp

    Filesize

    68KB

  • memory/1644-38-0x00007FFF21FC0000-0x00007FFF21FD5000-memory.dmp

    Filesize

    84KB

  • memory/1644-40-0x00007FFF37AE0000-0x00007FFF37AF2000-memory.dmp

    Filesize

    72KB

  • memory/1644-41-0x00007FFF248B0000-0x00007FFF24A2A000-memory.dmp

    Filesize

    1.5MB

  • memory/1644-37-0x00007FFF21FE0000-0x00007FFF220A5000-memory.dmp

    Filesize

    788KB

  • memory/1644-34-0x00007FFF220F0000-0x00007FFF2211F000-memory.dmp

    Filesize

    188KB

  • memory/1644-27-0x00007FFF22390000-0x00007FFF223F7000-memory.dmp

    Filesize

    412KB

  • memory/1644-26-0x00007FFF250F0000-0x00007FFF25120000-memory.dmp

    Filesize

    192KB

  • memory/1644-25-0x00007FFF2A1E0000-0x00007FFF2A1F8000-memory.dmp

    Filesize

    96KB

  • memory/1644-24-0x00007FFF2A5A0000-0x00007FFF2A5B1000-memory.dmp

    Filesize

    68KB

  • memory/1644-23-0x00007FFF31D10000-0x00007FFF31D2B000-memory.dmp

    Filesize

    108KB

  • memory/1644-22-0x00007FFF31D30000-0x00007FFF31D41000-memory.dmp

    Filesize

    68KB

  • memory/1644-21-0x00007FFF32B30000-0x00007FFF32B41000-memory.dmp

    Filesize

    68KB

  • memory/1644-20-0x00007FFF32C90000-0x00007FFF32CA1000-memory.dmp

    Filesize

    68KB

  • memory/1644-19-0x00007FFF32FE0000-0x00007FFF32FF8000-memory.dmp

    Filesize

    96KB

  • memory/1644-18-0x00007FFF32CB0000-0x00007FFF32CD1000-memory.dmp

    Filesize

    132KB

  • memory/1644-17-0x00007FFF33000000-0x00007FFF3303F000-memory.dmp

    Filesize

    252KB

  • memory/1644-53-0x00007FFF22400000-0x00007FFF234AB000-memory.dmp

    Filesize

    16.7MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.