Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    141s
  • max time network
    182s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-es
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-eslocale:es-esos:windows10-2004-x64systemwindows
  • submitted
    07/11/2023, 13:42

General

  • Target

    DISTORTO.ogg

  • Size

    1.2MB

  • MD5

    ff9593297b7efc3f559d2feb1e67fa4a

  • SHA1

    f515831ab4879c044899e63f944cb5be17712120

  • SHA256

    94b2a8f276fe0903da26aefeda3803f16a6d222bff3ca86fc28ef6478dbe403a

  • SHA512

    0518dd275c2882d32d9a8af36664a403633c5dbd0d2947b5796f47053e03d4eec6f422fe75a33a4bef8a678cf0ee3b72871d1db0f52e052a025457ccf11c5315

  • SSDEEP

    24576:wJA8ole67gdQ57Cv2nrUq1SSWs+7vBBJYeJCZBzn9XHOo:mA8ole67gdQ57Cv2rDSSWpvBBJYqCZxf

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 9 IoCs
  • Suspicious use of SendNotifyMessage 8 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\DISTORTO.ogg
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4656
    • C:\Program Files\VideoLAN\VLC\vlc.exe
      "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\DISTORTO.ogg"
      2⤵
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:636
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x51c 0x308
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:3808

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/636-5-0x00007FF602380000-0x00007FF602478000-memory.dmp

    Filesize

    992KB

  • memory/636-6-0x00007FF87F3F0000-0x00007FF87F424000-memory.dmp

    Filesize

    208KB

  • memory/636-7-0x00007FF86F920000-0x00007FF86FBD4000-memory.dmp

    Filesize

    2.7MB

  • memory/636-14-0x00007FF87EBF0000-0x00007FF87EC01000-memory.dmp

    Filesize

    68KB

  • memory/636-13-0x00007FF87EC10000-0x00007FF87EC2D000-memory.dmp

    Filesize

    116KB

  • memory/636-12-0x00007FF87EC30000-0x00007FF87EC41000-memory.dmp

    Filesize

    68KB

  • memory/636-11-0x00007FF87EF30000-0x00007FF87EF47000-memory.dmp

    Filesize

    92KB

  • memory/636-10-0x00007FF87EF50000-0x00007FF87EF61000-memory.dmp

    Filesize

    68KB

  • memory/636-9-0x00007FF87F550000-0x00007FF87F567000-memory.dmp

    Filesize

    92KB

  • memory/636-8-0x00007FF87F780000-0x00007FF87F798000-memory.dmp

    Filesize

    96KB

  • memory/636-15-0x00007FF86F720000-0x00007FF86F920000-memory.dmp

    Filesize

    2.0MB

  • memory/636-16-0x00007FF86E670000-0x00007FF86F71B000-memory.dmp

    Filesize

    16.7MB

  • memory/636-28-0x00007FF86E600000-0x00007FF86E66F000-memory.dmp

    Filesize

    444KB

  • memory/636-29-0x00007FF8707A0000-0x00007FF8707B1000-memory.dmp

    Filesize

    68KB

  • memory/636-30-0x00007FF86E5A0000-0x00007FF86E5FC000-memory.dmp

    Filesize

    368KB

  • memory/636-25-0x00007FF870860000-0x00007FF870878000-memory.dmp

    Filesize

    96KB

  • memory/636-31-0x00007FF86E420000-0x00007FF86E598000-memory.dmp

    Filesize

    1.5MB

  • memory/636-24-0x00007FF870880000-0x00007FF870891000-memory.dmp

    Filesize

    68KB

  • memory/636-32-0x00007FF870550000-0x00007FF870567000-memory.dmp

    Filesize

    92KB

  • memory/636-34-0x00007FF86E3F0000-0x00007FF86E41F000-memory.dmp

    Filesize

    188KB

  • memory/636-35-0x00007FF86E3D0000-0x00007FF86E3E1000-memory.dmp

    Filesize

    68KB

  • memory/636-36-0x00007FF86E3B0000-0x00007FF86E3C6000-memory.dmp

    Filesize

    88KB

  • memory/636-33-0x00007FF885020000-0x00007FF885030000-memory.dmp

    Filesize

    64KB

  • memory/636-23-0x00007FF870ED0000-0x00007FF870EEB000-memory.dmp

    Filesize

    108KB

  • memory/636-22-0x00007FF870EF0000-0x00007FF870F01000-memory.dmp

    Filesize

    68KB

  • memory/636-21-0x00007FF870F10000-0x00007FF870F21000-memory.dmp

    Filesize

    68KB

  • memory/636-20-0x00007FF8710F0000-0x00007FF871101000-memory.dmp

    Filesize

    68KB

  • memory/636-37-0x00007FF86E2E0000-0x00007FF86E3A5000-memory.dmp

    Filesize

    788KB

  • memory/636-40-0x00007FF86DD00000-0x00007FF86DD12000-memory.dmp

    Filesize

    72KB

  • memory/636-41-0x00007FF86DB80000-0x00007FF86DCFA000-memory.dmp

    Filesize

    1.5MB

  • memory/636-39-0x00007FF86DD20000-0x00007FF86DD31000-memory.dmp

    Filesize

    68KB

  • memory/636-38-0x00007FF86E2C0000-0x00007FF86E2D5000-memory.dmp

    Filesize

    84KB

  • memory/636-19-0x00007FF87EBD0000-0x00007FF87EBE8000-memory.dmp

    Filesize

    96KB

  • memory/636-18-0x00007FF876440000-0x00007FF876461000-memory.dmp

    Filesize

    132KB

  • memory/636-27-0x00007FF8707C0000-0x00007FF870827000-memory.dmp

    Filesize

    412KB

  • memory/636-26-0x00007FF870830000-0x00007FF870860000-memory.dmp

    Filesize

    192KB

  • memory/636-17-0x00007FF876470000-0x00007FF8764AF000-memory.dmp

    Filesize

    252KB

  • memory/636-44-0x00007FF86F920000-0x00007FF86FBD4000-memory.dmp

    Filesize

    2.7MB