Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    164s
  • max time network
    171s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/09/2023, 20:33

General

  • Target

    DF CONNECTED v2.7.6c (Windows)/mus_encore_ost.ogg

  • Size

    1.5MB

  • MD5

    7c20d8e3ad7613cd8b58748008e02f57

  • SHA1

    63b448dd1f03230f2cc5ca92f72d925dc7fa9068

  • SHA256

    a951d8ea3a02ef8451a7eaa805e00e9f18d335732794a1bb423d698f5add5e00

  • SHA512

    41e529ccf9ec09435b0c73b1dea333c1d45a9dc10f75dc71ed1b2afb2d06b8a2823de66464815a862267aa02f0466fd1e91ddaadb3f2c3d99d8c20eb29b10756

  • SSDEEP

    49152:GtLfyvMbcCdqpyn2UDYFaUgw6Yc74SkxM:GVykfdiyHYFaUrLcEfa

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 8 IoCs
  • Suspicious use of SendNotifyMessage 7 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\DF CONNECTED v2.7.6c (Windows)\mus_encore_ost.ogg"
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3000
    • C:\Program Files\VideoLAN\VLC\vlc.exe
      "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\DF CONNECTED v2.7.6c (Windows)\mus_encore_ost.ogg"
      2⤵
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:1976
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x308 0x508
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2276

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1976-0-0x00007FF644E80000-0x00007FF644F78000-memory.dmp

    Filesize

    992KB

  • memory/1976-1-0x00007FFA35780000-0x00007FFA357B4000-memory.dmp

    Filesize

    208KB

  • memory/1976-2-0x00007FFA25D10000-0x00007FFA25FC4000-memory.dmp

    Filesize

    2.7MB

  • memory/1976-3-0x00007FFA39DA0000-0x00007FFA39DB8000-memory.dmp

    Filesize

    96KB

  • memory/1976-4-0x00007FFA39D80000-0x00007FFA39D97000-memory.dmp

    Filesize

    92KB

  • memory/1976-5-0x00007FFA36520000-0x00007FFA36531000-memory.dmp

    Filesize

    68KB

  • memory/1976-6-0x00007FFA35BF0000-0x00007FFA35C07000-memory.dmp

    Filesize

    92KB

  • memory/1976-7-0x00007FFA35910000-0x00007FFA35921000-memory.dmp

    Filesize

    68KB

  • memory/1976-8-0x00007FFA35210000-0x00007FFA3522D000-memory.dmp

    Filesize

    116KB

  • memory/1976-9-0x00007FFA351F0000-0x00007FFA35201000-memory.dmp

    Filesize

    68KB

  • memory/1976-17-0x00007FFA25D10000-0x00007FFA25FC4000-memory.dmp

    Filesize

    2.7MB

  • memory/1976-25-0x00007FFA25B10000-0x00007FFA25D10000-memory.dmp

    Filesize

    2.0MB

  • memory/1976-26-0x00007FFA24A60000-0x00007FFA25B0B000-memory.dmp

    Filesize

    16.7MB

  • memory/1976-27-0x00007FFA351B0000-0x00007FFA351EF000-memory.dmp

    Filesize

    252KB

  • memory/1976-29-0x00007FFA35160000-0x00007FFA35178000-memory.dmp

    Filesize

    96KB

  • memory/1976-28-0x00007FFA35180000-0x00007FFA351A1000-memory.dmp

    Filesize

    132KB

  • memory/1976-30-0x00007FFA35140000-0x00007FFA35151000-memory.dmp

    Filesize

    68KB

  • memory/1976-31-0x00007FFA35120000-0x00007FFA35131000-memory.dmp

    Filesize

    68KB

  • memory/1976-33-0x00007FFA350E0000-0x00007FFA350FB000-memory.dmp

    Filesize

    108KB

  • memory/1976-34-0x00007FFA350C0000-0x00007FFA350D1000-memory.dmp

    Filesize

    68KB

  • memory/1976-36-0x00007FFA35070000-0x00007FFA350A0000-memory.dmp

    Filesize

    192KB

  • memory/1976-37-0x00007FFA2B8E0000-0x00007FFA2B947000-memory.dmp

    Filesize

    412KB

  • memory/1976-35-0x00007FFA350A0000-0x00007FFA350B8000-memory.dmp

    Filesize

    96KB

  • memory/1976-32-0x00007FFA35100000-0x00007FFA35111000-memory.dmp

    Filesize

    68KB

  • memory/1976-39-0x00007FFA35050000-0x00007FFA35061000-memory.dmp

    Filesize

    68KB

  • memory/1976-40-0x00007FFA24A00000-0x00007FFA24A5C000-memory.dmp

    Filesize

    368KB

  • memory/1976-41-0x00007FFA24880000-0x00007FFA249F8000-memory.dmp

    Filesize

    1.5MB

  • memory/1976-38-0x00007FFA2B870000-0x00007FFA2B8DF000-memory.dmp

    Filesize

    444KB

  • memory/1976-43-0x00007FFA39D10000-0x00007FFA39D20000-memory.dmp

    Filesize

    64KB

  • memory/1976-46-0x00007FFA2B850000-0x00007FFA2B866000-memory.dmp

    Filesize

    88KB

  • memory/1976-48-0x00007FFA24760000-0x00007FFA24775000-memory.dmp

    Filesize

    84KB

  • memory/1976-47-0x00007FFA24780000-0x00007FFA24845000-memory.dmp

    Filesize

    788KB

  • memory/1976-45-0x00007FFA2C540000-0x00007FFA2C551000-memory.dmp

    Filesize

    68KB

  • memory/1976-42-0x00007FFA2C8C0000-0x00007FFA2C8D7000-memory.dmp

    Filesize

    92KB

  • memory/1976-44-0x00007FFA24850000-0x00007FFA2487F000-memory.dmp

    Filesize

    188KB

  • memory/1976-51-0x00007FFA25D10000-0x00007FFA25FC4000-memory.dmp

    Filesize

    2.7MB

  • memory/1976-60-0x00007FFA24A60000-0x00007FFA25B0B000-memory.dmp

    Filesize

    16.7MB