Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    142s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/10/2023, 07:18

General

  • Target

    invaderexplode.ogg

  • Size

    55KB

  • MD5

    537c9151405a39433ec115b8c794b1c2

  • SHA1

    911360abe13ca8e6292e9faa5932b362f3d01589

  • SHA256

    cee092248f0b79f0b6e854451d54fe73d23b2d250ed7e2dd3ca7d3aabe7231cf

  • SHA512

    4f38045acf6ecbb534d088f44ff2d6f319056225c747bbe8919da618b0d59fe01a86f1c53494d01c97849aa5f18781b2ccffd3d23c4ca014d9905e84125942bb

  • SSDEEP

    1536:7loX67Qpwx3e7Wn02DaM/89xUrb8HcUND:7l4cQ2he7emM/8UrIcm

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 8 IoCs
  • Suspicious use of SendNotifyMessage 7 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\invaderexplode.ogg
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3144
    • C:\Program Files\VideoLAN\VLC\vlc.exe
      "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\invaderexplode.ogg"
      2⤵
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:4752
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x510 0x518
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1644

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4752-6-0x00007FFDAD7F0000-0x00007FFDAD824000-memory.dmp

    Filesize

    208KB

  • memory/4752-5-0x00007FF637000000-0x00007FF6370F8000-memory.dmp

    Filesize

    992KB

  • memory/4752-7-0x00007FFD9E430000-0x00007FFD9E6E4000-memory.dmp

    Filesize

    2.7MB

  • memory/4752-9-0x00007FFDAD9A0000-0x00007FFDAD9B7000-memory.dmp

    Filesize

    92KB

  • memory/4752-8-0x00007FFDAE160000-0x00007FFDAE178000-memory.dmp

    Filesize

    96KB

  • memory/4752-10-0x00007FFDAD7A0000-0x00007FFDAD7B1000-memory.dmp

    Filesize

    68KB

  • memory/4752-11-0x00007FFDAD780000-0x00007FFDAD797000-memory.dmp

    Filesize

    92KB

  • memory/4752-13-0x00007FFDAD460000-0x00007FFDAD47D000-memory.dmp

    Filesize

    116KB

  • memory/4752-12-0x00007FFDAD480000-0x00007FFDAD491000-memory.dmp

    Filesize

    68KB

  • memory/4752-14-0x00007FFDAD440000-0x00007FFDAD451000-memory.dmp

    Filesize

    68KB

  • memory/4752-15-0x00007FFD9DF00000-0x00007FFD9E100000-memory.dmp

    Filesize

    2.0MB

  • memory/4752-16-0x00007FFD9CE50000-0x00007FFD9DEFB000-memory.dmp

    Filesize

    16.7MB

  • memory/4752-17-0x00007FFDAD400000-0x00007FFDAD43F000-memory.dmp

    Filesize

    252KB

  • memory/4752-18-0x00007FFDAD0D0000-0x00007FFDAD0F1000-memory.dmp

    Filesize

    132KB

  • memory/4752-20-0x00007FFDAD0B0000-0x00007FFDAD0C1000-memory.dmp

    Filesize

    68KB

  • memory/4752-19-0x00007FFDAD3E0000-0x00007FFDAD3F8000-memory.dmp

    Filesize

    96KB

  • memory/4752-21-0x00007FFDAD090000-0x00007FFDAD0A1000-memory.dmp

    Filesize

    68KB

  • memory/4752-22-0x00007FFDAD070000-0x00007FFDAD081000-memory.dmp

    Filesize

    68KB

  • memory/4752-23-0x00007FFDAD050000-0x00007FFDAD06B000-memory.dmp

    Filesize

    108KB

  • memory/4752-25-0x00007FFDAD010000-0x00007FFDAD028000-memory.dmp

    Filesize

    96KB

  • memory/4752-24-0x00007FFDAD030000-0x00007FFDAD041000-memory.dmp

    Filesize

    68KB

  • memory/4752-26-0x00007FFDACFE0000-0x00007FFDAD010000-memory.dmp

    Filesize

    192KB

  • memory/4752-27-0x00007FFDACF70000-0x00007FFDACFD7000-memory.dmp

    Filesize

    412KB

  • memory/4752-28-0x00007FFDA56E0000-0x00007FFDA574F000-memory.dmp

    Filesize

    444KB

  • memory/4752-29-0x00007FFDACF50000-0x00007FFDACF61000-memory.dmp

    Filesize

    68KB

  • memory/4752-30-0x00007FFDA5680000-0x00007FFDA56DC000-memory.dmp

    Filesize

    368KB

  • memory/4752-31-0x00007FFDA3E60000-0x00007FFDA3EB6000-memory.dmp

    Filesize

    344KB

  • memory/4752-32-0x00007FFDA9560000-0x00007FFDA9588000-memory.dmp

    Filesize

    160KB

  • memory/4752-33-0x00007FFDA44D0000-0x00007FFDA44F4000-memory.dmp

    Filesize

    144KB

  • memory/4752-35-0x00007FFDA3F20000-0x00007FFDA3F43000-memory.dmp

    Filesize

    140KB

  • memory/4752-34-0x00007FFDACC80000-0x00007FFDACC97000-memory.dmp

    Filesize

    92KB

  • memory/4752-36-0x00007FFDA5660000-0x00007FFDA5671000-memory.dmp

    Filesize

    68KB

  • memory/4752-37-0x00007FFDA4B80000-0x00007FFDA4B92000-memory.dmp

    Filesize

    72KB

  • memory/4752-38-0x00007FFD9EF40000-0x00007FFD9EF61000-memory.dmp

    Filesize

    132KB

  • memory/4752-39-0x00007FFDA4160000-0x00007FFDA4173000-memory.dmp

    Filesize

    76KB

  • memory/4752-40-0x00007FFD9C960000-0x00007FFD9CAD8000-memory.dmp

    Filesize

    1.5MB

  • memory/4752-42-0x00007FFDACDF0000-0x00007FFDACE00000-memory.dmp

    Filesize

    64KB

  • memory/4752-43-0x00007FFD9E1D0000-0x00007FFD9E1FF000-memory.dmp

    Filesize

    188KB

  • memory/4752-44-0x00007FFD9C7A0000-0x00007FFD9C7B1000-memory.dmp

    Filesize

    68KB

  • memory/4752-41-0x00007FFDA3F00000-0x00007FFDA3F17000-memory.dmp

    Filesize

    92KB

  • memory/4752-45-0x00007FFD9C780000-0x00007FFD9C796000-memory.dmp

    Filesize

    88KB

  • memory/4752-46-0x00007FFD9C760000-0x00007FFD9C775000-memory.dmp

    Filesize

    84KB

  • memory/4752-48-0x00007FFDAD690000-0x00007FFDAD6A2000-memory.dmp

    Filesize

    72KB

  • memory/4752-47-0x00007FFD9C1A0000-0x00007FFD9C1B1000-memory.dmp

    Filesize

    68KB

  • memory/4752-49-0x00007FFD9C020000-0x00007FFD9C19A000-memory.dmp

    Filesize

    1.5MB

  • memory/4752-51-0x00007FFDAD650000-0x00007FFDAD664000-memory.dmp

    Filesize

    80KB

  • memory/4752-50-0x00007FFDAD670000-0x00007FFDAD683000-memory.dmp

    Filesize

    76KB

  • memory/4752-52-0x00007FFDAD630000-0x00007FFDAD641000-memory.dmp

    Filesize

    68KB

  • memory/4752-53-0x00007FFDAD610000-0x00007FFDAD621000-memory.dmp

    Filesize

    68KB

  • memory/4752-54-0x00007FFDAD5F0000-0x00007FFDAD601000-memory.dmp

    Filesize

    68KB

  • memory/4752-55-0x00007FFD9C000000-0x00007FFD9C016000-memory.dmp

    Filesize

    88KB

  • memory/4752-67-0x00007FFD9CE50000-0x00007FFD9DEFB000-memory.dmp

    Filesize

    16.7MB