Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    142s
  • max time network
    166s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-es
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-eslocale:es-esos:windows10-2004-x64systemwindows
  • submitted
    07/11/2023, 13:42

General

  • Target

    GF_3.ogg

  • Size

    9KB

  • MD5

    fca4215c4ba38bfdb8e602e3efccabbd

  • SHA1

    72d4a359ed6ae84a7bb3b21571429b3c8ad5e448

  • SHA256

    268000d82dc1086f19774f9d4da88c7c7d090cdde06ffd2ef3d9b8e09ee8532a

  • SHA512

    59b8958ff64b6ac3ff19f701282f220f3a6b5beef26cf70bedd230b65513ca8972fe04b47bda4a7c1c2b8e201dadd601767964965a207e9e918efe1321cded80

  • SSDEEP

    192:4cW/ttxOIOWOKxCPs4OLgKMGjHIgpS8DPEYl6HH4xkLhsjK1eDBslvyYqu:m/tDzCPDGIGPEu6n4KeDdYqu

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 9 IoCs
  • Suspicious use of SendNotifyMessage 8 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\GF_3.ogg
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4684
    • C:\Program Files\VideoLAN\VLC\vlc.exe
      "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\GF_3.ogg"
      2⤵
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:320
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x490 0x2f8
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4088

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/320-5-0x00007FF60EAE0000-0x00007FF60EBD8000-memory.dmp

    Filesize

    992KB

  • memory/320-6-0x00007FFC0D830000-0x00007FFC0D864000-memory.dmp

    Filesize

    208KB

  • memory/320-7-0x00007FFC0D570000-0x00007FFC0D824000-memory.dmp

    Filesize

    2.7MB

  • memory/320-8-0x00007FFC150B0000-0x00007FFC150C8000-memory.dmp

    Filesize

    96KB

  • memory/320-9-0x00007FFC0FDA0000-0x00007FFC0FDB7000-memory.dmp

    Filesize

    92KB

  • memory/320-10-0x00007FFC0D550000-0x00007FFC0D561000-memory.dmp

    Filesize

    68KB

  • memory/320-11-0x00007FFC0D530000-0x00007FFC0D547000-memory.dmp

    Filesize

    92KB

  • memory/320-12-0x00007FFC0D510000-0x00007FFC0D521000-memory.dmp

    Filesize

    68KB

  • memory/320-13-0x00007FFC0D4F0000-0x00007FFC0D50D000-memory.dmp

    Filesize

    116KB

  • memory/320-14-0x00007FFC0D4D0000-0x00007FFC0D4E1000-memory.dmp

    Filesize

    68KB

  • memory/320-15-0x00007FFC0D2D0000-0x00007FFC0D4D0000-memory.dmp

    Filesize

    2.0MB

  • memory/320-16-0x00007FFC0C220000-0x00007FFC0D2CB000-memory.dmp

    Filesize

    16.7MB

  • memory/320-17-0x00007FFC0C1E0000-0x00007FFC0C21F000-memory.dmp

    Filesize

    252KB

  • memory/320-18-0x00007FFC0C1B0000-0x00007FFC0C1D1000-memory.dmp

    Filesize

    132KB

  • memory/320-21-0x00007FFC0C150000-0x00007FFC0C161000-memory.dmp

    Filesize

    68KB

  • memory/320-20-0x00007FFC0C170000-0x00007FFC0C181000-memory.dmp

    Filesize

    68KB

  • memory/320-19-0x00007FFC0C190000-0x00007FFC0C1A8000-memory.dmp

    Filesize

    96KB

  • memory/320-22-0x00007FFC0C130000-0x00007FFC0C141000-memory.dmp

    Filesize

    68KB

  • memory/320-23-0x00007FFC0C110000-0x00007FFC0C12B000-memory.dmp

    Filesize

    108KB

  • memory/320-25-0x00007FFC0C0D0000-0x00007FFC0C0E8000-memory.dmp

    Filesize

    96KB

  • memory/320-24-0x00007FFC0C0F0000-0x00007FFC0C101000-memory.dmp

    Filesize

    68KB

  • memory/320-26-0x00007FFC0C0A0000-0x00007FFC0C0D0000-memory.dmp

    Filesize

    192KB

  • memory/320-27-0x00007FFC0C030000-0x00007FFC0C097000-memory.dmp

    Filesize

    412KB

  • memory/320-28-0x00007FFC0BFC0000-0x00007FFC0C02F000-memory.dmp

    Filesize

    444KB

  • memory/320-29-0x00007FFC0BFA0000-0x00007FFC0BFB1000-memory.dmp

    Filesize

    68KB

  • memory/320-30-0x00007FFC0BF40000-0x00007FFC0BF9C000-memory.dmp

    Filesize

    368KB

  • memory/320-31-0x00007FFC0BDC0000-0x00007FFC0BF38000-memory.dmp

    Filesize

    1.5MB

  • memory/320-33-0x00007FFC25D40000-0x00007FFC25D50000-memory.dmp

    Filesize

    64KB

  • memory/320-32-0x00007FFC0BDA0000-0x00007FFC0BDB7000-memory.dmp

    Filesize

    92KB

  • memory/320-34-0x00007FFC23B10000-0x00007FFC23B3F000-memory.dmp

    Filesize

    188KB

  • memory/320-36-0x00007FFC1B050000-0x00007FFC1B066000-memory.dmp

    Filesize

    88KB

  • memory/320-35-0x00007FFC23980000-0x00007FFC23991000-memory.dmp

    Filesize

    68KB

  • memory/320-37-0x00007FFC1AF80000-0x00007FFC1B045000-memory.dmp

    Filesize

    788KB

  • memory/320-38-0x00007FFC1AF60000-0x00007FFC1AF75000-memory.dmp

    Filesize

    84KB

  • memory/320-39-0x00007FFC1AE30000-0x00007FFC1AE41000-memory.dmp

    Filesize

    68KB

  • memory/320-40-0x00007FFC1AD60000-0x00007FFC1AD72000-memory.dmp

    Filesize

    72KB

  • memory/320-41-0x00007FFC0F0A0000-0x00007FFC0F21A000-memory.dmp

    Filesize

    1.5MB