Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    141s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/02/2024, 12:24

General

  • Target

    mpvod.exe

  • Size

    715KB

  • MD5

    e4ae853f940f772d11cdb231b8cf2b6b

  • SHA1

    d7d1c028c2639329ea0762ea8df89ccbfb94b400

  • SHA256

    938985ca32df0ec5ff1bbe23389a98bf98733e72fd7d70e5ba9ce3802669a759

  • SHA512

    9dd3330c9ea4033de52771755edb69e6b7ee7d59a2b9ce8f2b2eaa294c41e42f9603e0f58a9893b2f95be5204d121bab9767c70cd5f5b07c342bf058849e5e18

  • SSDEEP

    12288:xhveuM43b+/FyNLgnVr8qSFCF2iVVxPBIdqweL7uzrslvd3:vv3bZ14Vr8qUI+dre4rsl5

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 10 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of FindShellTrayWindow 16 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\mpvod.exe
    "C:\Users\Admin\AppData\Local\Temp\mpvod.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:5052
    • C:\Users\Admin\AppData\Local\Temp\VODServer.exe
      "C:\Users\Admin\AppData\Local\Temp\VODServer.exe" 35494
      2⤵
      • Executes dropped EXE
      PID:540

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\VODServer.exe

    Filesize

    107KB

    MD5

    9e8ba54312d4c2ff2d880bd640a7d32b

    SHA1

    a34e1bf8a6cc649a80838b82c1d043eb59e44572

    SHA256

    9ed7f6e1ddb86482d8fefd25c0b9153e43d46f9440bf9539a907e5e9743b544d

    SHA512

    849065db2178d06f8a4caa8044da55ff3e5ca17c88a9eb4125cbdd08ad1af79b2a3d7c934c8ee84fcdcd7f48a24202c389ad0c4be795c51ef067ce3247922234

  • C:\Users\Admin\AppData\Local\Temp\data\setup.ini

    Filesize

    193B

    MD5

    3e8c8a821cdfbf5d7417e3673a9135bf

    SHA1

    074c11bff3c536d2407123a56c4d10a1b863889a

    SHA256

    580952bb7cce2fb91450557fed8a3ca86fcdea7a4d9e98e36214ff5f09bf8df8

    SHA512

    78e0312cf3399e2591b32e2cf55a2ff7353f6bea34a73369e2e0692364f8d49ec51bba84b8136c0c77dad218a13f7ad8049584905babe525912a86af0fcc9844

  • C:\Windows\MidiPlay.drv

    Filesize

    6KB

    MD5

    89195f96e82b4228e237bd46bc41afa7

    SHA1

    89f6eec9d7f3c85ee242d2f7b22b02f2c3eb2c87

    SHA256

    e553e5b776a2266274d0eb57319423b80d9210c997135b424998f4e229361038

    SHA512

    352f2c02f690d5e7961beec1f4cece902b65e033962c2a6b0a0542617e51e2c427568388cceb2332a1cd38f545448a3c0e9cdde87fecdbb6d8360a539c8bc750

  • memory/540-51-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/5052-0-0x00000000023D0000-0x00000000023D1000-memory.dmp

    Filesize

    4KB

  • memory/5052-50-0x0000000000400000-0x000000000063D000-memory.dmp

    Filesize

    2.2MB

  • memory/5052-54-0x00000000023D0000-0x00000000023D1000-memory.dmp

    Filesize

    4KB