Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    141s
  • max time network
    61s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/10/2023, 07:18

General

  • Target

    uh.ogg

  • Size

    14KB

  • MD5

    9223b207343d8cea833932df3ee65218

  • SHA1

    c4d216d376b6a498b3917d88d8c120ee30bb109b

  • SHA256

    bd7bfac235f120e746e0e31374df5a2fb20844a80e79551324fe76387d5d7395

  • SHA512

    d3d2d9824972088d8856bb4318304a81e3224fe4f41a3ac537e306827de3d5cb4c24b76dc03d7f8ff0b6917de84a36e41eaeb2d5751e9467653e3c281ad2fc43

  • SSDEEP

    192:Eqk+XioqPKNLKt9AadirT9NayoNGa9eDT9NayoNGa9eDT9hCMT2cGt/RwSFbjkmB:EGi4xOi3Xay2ePXay2ePYHtJ1Fbjk

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 9 IoCs
  • Suspicious use of SendNotifyMessage 8 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\uh.ogg
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4580
    • C:\Program Files\VideoLAN\VLC\vlc.exe
      "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\uh.ogg"
      2⤵
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:4920
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x33c 0x388
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1584

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4920-5-0x00007FF75BBE0000-0x00007FF75BCD8000-memory.dmp

    Filesize

    992KB

  • memory/4920-6-0x00007FFD48840000-0x00007FFD48874000-memory.dmp

    Filesize

    208KB

  • memory/4920-7-0x00007FFD398B0000-0x00007FFD39B64000-memory.dmp

    Filesize

    2.7MB

  • memory/4920-8-0x00007FFD4C7C0000-0x00007FFD4C7D8000-memory.dmp

    Filesize

    96KB

  • memory/4920-9-0x00007FFD48DE0000-0x00007FFD48DF7000-memory.dmp

    Filesize

    92KB

  • memory/4920-10-0x00007FFD489B0000-0x00007FFD489C1000-memory.dmp

    Filesize

    68KB

  • memory/4920-11-0x00007FFD487B0000-0x00007FFD487C7000-memory.dmp

    Filesize

    92KB

  • memory/4920-12-0x00007FFD48760000-0x00007FFD48771000-memory.dmp

    Filesize

    68KB

  • memory/4920-13-0x00007FFD48310000-0x00007FFD4832D000-memory.dmp

    Filesize

    116KB

  • memory/4920-14-0x00007FFD482F0000-0x00007FFD48301000-memory.dmp

    Filesize

    68KB

  • memory/4920-15-0x00007FFD39330000-0x00007FFD39530000-memory.dmp

    Filesize

    2.0MB

  • memory/4920-16-0x00007FFD38280000-0x00007FFD3932B000-memory.dmp

    Filesize

    16.7MB

  • memory/4920-17-0x00007FFD482B0000-0x00007FFD482EF000-memory.dmp

    Filesize

    252KB

  • memory/4920-18-0x00007FFD48080000-0x00007FFD480A1000-memory.dmp

    Filesize

    132KB

  • memory/4920-19-0x00007FFD48060000-0x00007FFD48078000-memory.dmp

    Filesize

    96KB

  • memory/4920-20-0x00007FFD48040000-0x00007FFD48051000-memory.dmp

    Filesize

    68KB

  • memory/4920-21-0x00007FFD48020000-0x00007FFD48031000-memory.dmp

    Filesize

    68KB

  • memory/4920-22-0x00007FFD48000000-0x00007FFD48011000-memory.dmp

    Filesize

    68KB

  • memory/4920-23-0x00007FFD47FE0000-0x00007FFD47FFB000-memory.dmp

    Filesize

    108KB

  • memory/4920-24-0x00007FFD47FC0000-0x00007FFD47FD1000-memory.dmp

    Filesize

    68KB

  • memory/4920-25-0x00007FFD47F80000-0x00007FFD47F98000-memory.dmp

    Filesize

    96KB

  • memory/4920-26-0x00007FFD410F0000-0x00007FFD41120000-memory.dmp

    Filesize

    192KB

  • memory/4920-27-0x00007FFD3EE10000-0x00007FFD3EE77000-memory.dmp

    Filesize

    412KB

  • memory/4920-28-0x00007FFD3EDA0000-0x00007FFD3EE0F000-memory.dmp

    Filesize

    444KB

  • memory/4920-29-0x00007FFD410D0000-0x00007FFD410E1000-memory.dmp

    Filesize

    68KB

  • memory/4920-30-0x00007FFD37FD0000-0x00007FFD3802C000-memory.dmp

    Filesize

    368KB

  • memory/4920-31-0x00007FFD37F70000-0x00007FFD37FC6000-memory.dmp

    Filesize

    344KB

  • memory/4920-32-0x00007FFD410A0000-0x00007FFD410C8000-memory.dmp

    Filesize

    160KB

  • memory/4920-33-0x00007FFD37F40000-0x00007FFD37F64000-memory.dmp

    Filesize

    144KB

  • memory/4920-34-0x00007FFD41030000-0x00007FFD41047000-memory.dmp

    Filesize

    92KB

  • memory/4920-35-0x00007FFD37DF0000-0x00007FFD37E13000-memory.dmp

    Filesize

    140KB

  • memory/4920-36-0x00007FFD3FB40000-0x00007FFD3FB51000-memory.dmp

    Filesize

    68KB

  • memory/4920-37-0x00007FFD3F120000-0x00007FFD3F132000-memory.dmp

    Filesize

    72KB

  • memory/4920-38-0x00007FFD37DC0000-0x00007FFD37DE1000-memory.dmp

    Filesize

    132KB

  • memory/4920-40-0x00007FFD37C40000-0x00007FFD37DB8000-memory.dmp

    Filesize

    1.5MB

  • memory/4920-39-0x00007FFD3ED80000-0x00007FFD3ED93000-memory.dmp

    Filesize

    76KB

  • memory/4920-41-0x00007FFD37C20000-0x00007FFD37C37000-memory.dmp

    Filesize

    92KB

  • memory/4920-42-0x00007FFD482A0000-0x00007FFD482B0000-memory.dmp

    Filesize

    64KB

  • memory/4920-43-0x00007FFD37A30000-0x00007FFD37A5F000-memory.dmp

    Filesize

    188KB

  • memory/4920-44-0x00007FFD37A10000-0x00007FFD37A21000-memory.dmp

    Filesize

    68KB

  • memory/4920-46-0x00007FFD379D0000-0x00007FFD379E5000-memory.dmp

    Filesize

    84KB

  • memory/4920-45-0x00007FFD379F0000-0x00007FFD37A06000-memory.dmp

    Filesize

    88KB

  • memory/4920-47-0x00007FFD373F0000-0x00007FFD37401000-memory.dmp

    Filesize

    68KB

  • memory/4920-48-0x00007FFD373D0000-0x00007FFD373E2000-memory.dmp

    Filesize

    72KB

  • memory/4920-49-0x00007FFD37250000-0x00007FFD373CA000-memory.dmp

    Filesize

    1.5MB

  • memory/4920-51-0x00007FFD37210000-0x00007FFD37224000-memory.dmp

    Filesize

    80KB

  • memory/4920-50-0x00007FFD37230000-0x00007FFD37243000-memory.dmp

    Filesize

    76KB

  • memory/4920-52-0x00007FFD371F0000-0x00007FFD37201000-memory.dmp

    Filesize

    68KB

  • memory/4920-53-0x00007FFD371D0000-0x00007FFD371E1000-memory.dmp

    Filesize

    68KB

  • memory/4920-55-0x00007FFD37190000-0x00007FFD371A6000-memory.dmp

    Filesize

    88KB

  • memory/4920-54-0x00007FFD371B0000-0x00007FFD371C1000-memory.dmp

    Filesize

    68KB