Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    141s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/10/2023, 07:18

General

  • Target

    oh.ogg

  • Size

    10KB

  • MD5

    cfe9690ba3e211c18e62c72fd79eef19

  • SHA1

    7abe861a5152f09f9e787e82a1db82a1deac157b

  • SHA256

    18e02aec04c077843b0deee0ffffc2199d413da7e2058c5f121f65bfc184e8c2

  • SHA512

    1beb6ca6ee6026eff9cda637f0cf2694521de95056938d6f142f38d103610d227b1b3e2b13e05e5d1f5cd056d5de54bc86285746a46c613154612994bb98c6b8

  • SSDEEP

    192:umP9hVauKEoLHMb+Etefm0+7UXtztAzyTLu8:umVhmbwbxtm3Zyu

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 8 IoCs
  • Suspicious use of SendNotifyMessage 7 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\oh.ogg
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3460
    • C:\Program Files\VideoLAN\VLC\vlc.exe
      "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\oh.ogg"
      2⤵
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:4864
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x33c 0x324
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:3560

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4864-5-0x00007FF789BF0000-0x00007FF789CE8000-memory.dmp

    Filesize

    992KB

  • memory/4864-6-0x00007FF8CF620000-0x00007FF8CF654000-memory.dmp

    Filesize

    208KB

  • memory/4864-7-0x00007FF8C00B0000-0x00007FF8C0364000-memory.dmp

    Filesize

    2.7MB

  • memory/4864-8-0x00007FF8CFF30000-0x00007FF8CFF48000-memory.dmp

    Filesize

    96KB

  • memory/4864-10-0x00007FF8CF6B0000-0x00007FF8CF6C1000-memory.dmp

    Filesize

    68KB

  • memory/4864-9-0x00007FF8CFEB0000-0x00007FF8CFEC7000-memory.dmp

    Filesize

    92KB

  • memory/4864-11-0x00007FF8CF600000-0x00007FF8CF617000-memory.dmp

    Filesize

    92KB

  • memory/4864-13-0x00007FF8CF5C0000-0x00007FF8CF5DD000-memory.dmp

    Filesize

    116KB

  • memory/4864-12-0x00007FF8CF5E0000-0x00007FF8CF5F1000-memory.dmp

    Filesize

    68KB

  • memory/4864-14-0x00007FF8CF510000-0x00007FF8CF521000-memory.dmp

    Filesize

    68KB

  • memory/4864-15-0x00007FF8BFC60000-0x00007FF8BFE60000-memory.dmp

    Filesize

    2.0MB

  • memory/4864-16-0x00007FF8BEBB0000-0x00007FF8BFC5B000-memory.dmp

    Filesize

    16.7MB

  • memory/4864-17-0x00007FF8CF4D0000-0x00007FF8CF50F000-memory.dmp

    Filesize

    252KB

  • memory/4864-18-0x00007FF8CF4A0000-0x00007FF8CF4C1000-memory.dmp

    Filesize

    132KB

  • memory/4864-21-0x00007FF8CE850000-0x00007FF8CE861000-memory.dmp

    Filesize

    68KB

  • memory/4864-20-0x00007FF8CE990000-0x00007FF8CE9A1000-memory.dmp

    Filesize

    68KB

  • memory/4864-22-0x00007FF8C5F80000-0x00007FF8C5F91000-memory.dmp

    Filesize

    68KB

  • memory/4864-19-0x00007FF8CF480000-0x00007FF8CF498000-memory.dmp

    Filesize

    96KB

  • memory/4864-23-0x00007FF8C5F60000-0x00007FF8C5F7B000-memory.dmp

    Filesize

    108KB

  • memory/4864-24-0x00007FF8C5F40000-0x00007FF8C5F51000-memory.dmp

    Filesize

    68KB

  • memory/4864-25-0x00007FF8C5BC0000-0x00007FF8C5BD8000-memory.dmp

    Filesize

    96KB

  • memory/4864-26-0x00007FF8C0960000-0x00007FF8C0990000-memory.dmp

    Filesize

    192KB

  • memory/4864-27-0x00007FF8BE860000-0x00007FF8BE8C7000-memory.dmp

    Filesize

    412KB

  • memory/4864-28-0x00007FF8BE7F0000-0x00007FF8BE85F000-memory.dmp

    Filesize

    444KB

  • memory/4864-29-0x00007FF8C0940000-0x00007FF8C0951000-memory.dmp

    Filesize

    68KB

  • memory/4864-30-0x00007FF8BE790000-0x00007FF8BE7EC000-memory.dmp

    Filesize

    368KB

  • memory/4864-31-0x00007FF8BE730000-0x00007FF8BE786000-memory.dmp

    Filesize

    344KB

  • memory/4864-32-0x00007FF8BE700000-0x00007FF8BE728000-memory.dmp

    Filesize

    160KB

  • memory/4864-34-0x00007FF8BE6B0000-0x00007FF8BE6C7000-memory.dmp

    Filesize

    92KB

  • memory/4864-33-0x00007FF8BE6D0000-0x00007FF8BE6F4000-memory.dmp

    Filesize

    144KB

  • memory/4864-35-0x00007FF8BE680000-0x00007FF8BE6A3000-memory.dmp

    Filesize

    140KB

  • memory/4864-36-0x00007FF8BE660000-0x00007FF8BE671000-memory.dmp

    Filesize

    68KB

  • memory/4864-38-0x00007FF8BE610000-0x00007FF8BE631000-memory.dmp

    Filesize

    132KB

  • memory/4864-37-0x00007FF8BE640000-0x00007FF8BE652000-memory.dmp

    Filesize

    72KB

  • memory/4864-39-0x00007FF8BE5F0000-0x00007FF8BE603000-memory.dmp

    Filesize

    76KB

  • memory/4864-40-0x00007FF8BE470000-0x00007FF8BE5E8000-memory.dmp

    Filesize

    1.5MB

  • memory/4864-42-0x00007FF8CF470000-0x00007FF8CF480000-memory.dmp

    Filesize

    64KB

  • memory/4864-41-0x00007FF8BE450000-0x00007FF8BE467000-memory.dmp

    Filesize

    92KB

  • memory/4864-43-0x00007FF8BE1D0000-0x00007FF8BE1FF000-memory.dmp

    Filesize

    188KB

  • memory/4864-44-0x00007FF8BE1B0000-0x00007FF8BE1C1000-memory.dmp

    Filesize

    68KB

  • memory/4864-45-0x00007FF8BE190000-0x00007FF8BE1A6000-memory.dmp

    Filesize

    88KB

  • memory/4864-46-0x00007FF8BE170000-0x00007FF8BE185000-memory.dmp

    Filesize

    84KB

  • memory/4864-47-0x00007FF8BDC00000-0x00007FF8BDC11000-memory.dmp

    Filesize

    68KB

  • memory/4864-48-0x00007FF8BDBE0000-0x00007FF8BDBF2000-memory.dmp

    Filesize

    72KB

  • memory/4864-49-0x00007FF8BDA60000-0x00007FF8BDBDA000-memory.dmp

    Filesize

    1.5MB

  • memory/4864-51-0x00007FF8BDA20000-0x00007FF8BDA34000-memory.dmp

    Filesize

    80KB

  • memory/4864-50-0x00007FF8BDA40000-0x00007FF8BDA53000-memory.dmp

    Filesize

    76KB

  • memory/4864-52-0x00007FF8BDA00000-0x00007FF8BDA11000-memory.dmp

    Filesize

    68KB

  • memory/4864-53-0x00007FF8BD9E0000-0x00007FF8BD9F1000-memory.dmp

    Filesize

    68KB

  • memory/4864-54-0x00007FF8BD9C0000-0x00007FF8BD9D1000-memory.dmp

    Filesize

    68KB

  • memory/4864-55-0x00007FF8BD9A0000-0x00007FF8BD9B6000-memory.dmp

    Filesize

    88KB