Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

03/10/2023, 14:56

231003-sbdm7scb8z 7

03/10/2023, 14:35

231003-rx4abadf82 7

02/10/2023, 22:39

231002-2k417afa8s 7

02/10/2023, 21:20

231002-z68v6aeg3z 7

Analysis

  • max time kernel
    141s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/10/2023, 14:35

General

  • Target

    invaderexplode.ogg

  • Size

    55KB

  • MD5

    537c9151405a39433ec115b8c794b1c2

  • SHA1

    911360abe13ca8e6292e9faa5932b362f3d01589

  • SHA256

    cee092248f0b79f0b6e854451d54fe73d23b2d250ed7e2dd3ca7d3aabe7231cf

  • SHA512

    4f38045acf6ecbb534d088f44ff2d6f319056225c747bbe8919da618b0d59fe01a86f1c53494d01c97849aa5f18781b2ccffd3d23c4ca014d9905e84125942bb

  • SSDEEP

    1536:7loX67Qpwx3e7Wn02DaM/89xUrb8HcUND:7l4cQ2he7emM/8UrIcm

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 8 IoCs
  • Suspicious use of SendNotifyMessage 7 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\invaderexplode.ogg
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2908
    • C:\Program Files\VideoLAN\VLC\vlc.exe
      "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\invaderexplode.ogg"
      2⤵
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:2268
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x4f4 0x44c
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2816

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2268-5-0x00007FF75BBE0000-0x00007FF75BCD8000-memory.dmp

    Filesize

    992KB

  • memory/2268-6-0x00007FFD41090000-0x00007FFD410C4000-memory.dmp

    Filesize

    208KB

  • memory/2268-7-0x00007FFD39340000-0x00007FFD395F4000-memory.dmp

    Filesize

    2.7MB

  • memory/2268-9-0x00007FFD482B0000-0x00007FFD482C7000-memory.dmp

    Filesize

    92KB

  • memory/2268-8-0x00007FFD48760000-0x00007FFD48778000-memory.dmp

    Filesize

    96KB

  • memory/2268-10-0x00007FFD47F80000-0x00007FFD47F91000-memory.dmp

    Filesize

    68KB

  • memory/2268-11-0x00007FFD41030000-0x00007FFD41047000-memory.dmp

    Filesize

    92KB

  • memory/2268-12-0x00007FFD3FB40000-0x00007FFD3FB51000-memory.dmp

    Filesize

    68KB

  • memory/2268-13-0x00007FFD3F120000-0x00007FFD3F13D000-memory.dmp

    Filesize

    116KB

  • memory/2268-14-0x00007FFD3EDE0000-0x00007FFD3EDF1000-memory.dmp

    Filesize

    68KB

  • memory/2268-15-0x00007FFD38F80000-0x00007FFD39180000-memory.dmp

    Filesize

    2.0MB

  • memory/2268-16-0x00007FFD3EDA0000-0x00007FFD3EDDF000-memory.dmp

    Filesize

    252KB

  • memory/2268-17-0x00007FFD37ED0000-0x00007FFD38F7B000-memory.dmp

    Filesize

    16.7MB

  • memory/2268-18-0x00007FFD37DE0000-0x00007FFD37E01000-memory.dmp

    Filesize

    132KB

  • memory/2268-19-0x00007FFD37DC0000-0x00007FFD37DD8000-memory.dmp

    Filesize

    96KB

  • memory/2268-21-0x00007FFD37D80000-0x00007FFD37D91000-memory.dmp

    Filesize

    68KB

  • memory/2268-20-0x00007FFD37DA0000-0x00007FFD37DB1000-memory.dmp

    Filesize

    68KB

  • memory/2268-22-0x00007FFD37D60000-0x00007FFD37D71000-memory.dmp

    Filesize

    68KB

  • memory/2268-23-0x00007FFD37D40000-0x00007FFD37D5B000-memory.dmp

    Filesize

    108KB

  • memory/2268-24-0x00007FFD37D20000-0x00007FFD37D31000-memory.dmp

    Filesize

    68KB

  • memory/2268-25-0x00007FFD37D00000-0x00007FFD37D18000-memory.dmp

    Filesize

    96KB

  • memory/2268-26-0x00007FFD37C60000-0x00007FFD37C90000-memory.dmp

    Filesize

    192KB

  • memory/2268-27-0x00007FFD37BF0000-0x00007FFD37C57000-memory.dmp

    Filesize

    412KB

  • memory/2268-28-0x00007FFD37B80000-0x00007FFD37BEF000-memory.dmp

    Filesize

    444KB

  • memory/2268-29-0x00007FFD37B60000-0x00007FFD37B71000-memory.dmp

    Filesize

    68KB

  • memory/2268-30-0x00007FFD37B00000-0x00007FFD37B5C000-memory.dmp

    Filesize

    368KB

  • memory/2268-31-0x00007FFD37AA0000-0x00007FFD37AF6000-memory.dmp

    Filesize

    344KB

  • memory/2268-32-0x00007FFD37A70000-0x00007FFD37A98000-memory.dmp

    Filesize

    160KB

  • memory/2268-33-0x00007FFD37A40000-0x00007FFD37A64000-memory.dmp

    Filesize

    144KB

  • memory/2268-34-0x00007FFD37A20000-0x00007FFD37A37000-memory.dmp

    Filesize

    92KB

  • memory/2268-35-0x00007FFD379F0000-0x00007FFD37A13000-memory.dmp

    Filesize

    140KB

  • memory/2268-36-0x00007FFD379D0000-0x00007FFD379E1000-memory.dmp

    Filesize

    68KB

  • memory/2268-37-0x00007FFD379B0000-0x00007FFD379C2000-memory.dmp

    Filesize

    72KB

  • memory/2268-38-0x00007FFD37980000-0x00007FFD379A1000-memory.dmp

    Filesize

    132KB

  • memory/2268-39-0x00007FFD37960000-0x00007FFD37973000-memory.dmp

    Filesize

    76KB

  • memory/2268-40-0x00007FFD377E0000-0x00007FFD37958000-memory.dmp

    Filesize

    1.5MB

  • memory/2268-41-0x00007FFD377C0000-0x00007FFD377D7000-memory.dmp

    Filesize

    92KB

  • memory/2268-42-0x00007FFD47FC0000-0x00007FFD47FD0000-memory.dmp

    Filesize

    64KB

  • memory/2268-43-0x00007FFD373A0000-0x00007FFD373CF000-memory.dmp

    Filesize

    188KB

  • memory/2268-44-0x00007FFD37380000-0x00007FFD37391000-memory.dmp

    Filesize

    68KB

  • memory/2268-45-0x00007FFD37360000-0x00007FFD37376000-memory.dmp

    Filesize

    88KB

  • memory/2268-46-0x00007FFD37340000-0x00007FFD37355000-memory.dmp

    Filesize

    84KB

  • memory/2268-48-0x00007FFD487A0000-0x00007FFD487B2000-memory.dmp

    Filesize

    72KB

  • memory/2268-47-0x00007FFD487C0000-0x00007FFD487D1000-memory.dmp

    Filesize

    68KB

  • memory/2268-49-0x00007FFD36610000-0x00007FFD3678A000-memory.dmp

    Filesize

    1.5MB

  • memory/2268-51-0x00007FFD365F0000-0x00007FFD36604000-memory.dmp

    Filesize

    80KB

  • memory/2268-53-0x00007FFD365B0000-0x00007FFD365C1000-memory.dmp

    Filesize

    68KB

  • memory/2268-50-0x00007FFD48780000-0x00007FFD48793000-memory.dmp

    Filesize

    76KB

  • memory/2268-52-0x00007FFD365D0000-0x00007FFD365E1000-memory.dmp

    Filesize

    68KB

  • memory/2268-54-0x00007FFD36590000-0x00007FFD365A1000-memory.dmp

    Filesize

    68KB

  • memory/2268-55-0x00007FFD36570000-0x00007FFD36586000-memory.dmp

    Filesize

    88KB

  • memory/2268-68-0x00007FFD37ED0000-0x00007FFD38F7B000-memory.dmp

    Filesize

    16.7MB