Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
593s -
max time network
620s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
13/02/2024, 05:38
Static task
static1
Behavioral task
behavioral1
Sample
VeeamManageClient.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
VeeamManageClient.exe
Resource
win10v2004-20231222-en
General
-
Target
VeeamManageClient.exe
-
Size
39KB
-
MD5
a56012610e82f692cbcd80ea54cfc522
-
SHA1
722d883a8b8737bd0bf92901671b9c758b6a706b
-
SHA256
4ae9f46399bb088df9b59fea4f80f3448e9b3937476a10ab5af00e7b80a8597e
-
SHA512
b22147f325a9a2276a6c7d23b18bc5dfda9fc921817865566d5ebf5a1fac139746ec88885844a523018fb219e082c7c2f69341b7711168540be0a1fb8137aacb
-
SSDEEP
768:KPKylEHlFZMC+t2FHyfcvF4FYY1A+84ykatVST5:KCfR2cvmW48s
Malware Config
Signatures
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1772 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1772 vlc.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1772 vlc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2840 wrote to memory of 2620 2840 VeeamManageClient.exe 29 PID 2840 wrote to memory of 2620 2840 VeeamManageClient.exe 29 PID 2840 wrote to memory of 2620 2840 VeeamManageClient.exe 29 PID 2620 wrote to memory of 2516 2620 csc.exe 31 PID 2620 wrote to memory of 2516 2620 csc.exe 31 PID 2620 wrote to memory of 2516 2620 csc.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\VeeamManageClient.exe"C:\Users\Admin\AppData\Local\Temp\VeeamManageClient.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\tyufx3nv\tyufx3nv.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES1065.tmp" "c:\Users\Admin\AppData\Local\Temp\tyufx3nv\CSC5E45F2CECF4A318634D49FD685CD7D.TMP"3⤵PID:2516
-
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\RemoveEnable.m3u"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1772
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD540f18f38df3cd626d02ea71f667f0a3f
SHA1a275053b2d69436926a9cff884ea5b9b35d31d89
SHA256809868690a4221e1bb1fc2d350b1f35c0cf719450ee903e515b291b141492991
SHA5125e1fd030df2fc1f271464704433925fa666a76ca8d46d6f21c859a2d6a2a63421b8e5b315a041bf7238bc3e4d51df427d8d9a2d1ca0a0e6a6106fbb7e7e54f07
-
Filesize
3KB
MD5891a1a29d3b561895eb1d58daaa10025
SHA17cedb0d2a8dd42ba74fc1e017418fc597232e0b7
SHA256553b2371f6ad05ce2a890e4f204ae2459085823de6b471216885df84ef8626a7
SHA512efd4d5d0c8437c475b19887f4ba975806a5e7995fe3935d98954f48fafc88e23d69d8b461f1a83a6f33fc9a939adeb002a288a54dab9a4536b2da51f8f9853b0
-
Filesize
11KB
MD5446005f92db0953a8c53bd5bcf9e96d3
SHA1db9fa1fc8775b07cdf3152c0b30d434ce7cc4c06
SHA256b1aea033add5d66adfe4df7853255be542584c88f7480af81a1264c327a82cca
SHA512438a1d673afb6c895677d997ebd5c1f5de91e4b13d0496f5088c39cc0535386d90ca444cf2daba66f0b927a142500cffca4c879e3b2a0b01aed1617370859154
-
Filesize
8KB
MD5223178a18d636421fb0db61ed3984652
SHA1f1008b316693b394ef3b1fae4abc964a86deaa36
SHA2568a817574cdf24298c37a3113a1295fd1877db9edd435d17088ba0796d69c0c51
SHA51216c0621201e732fee410c9ba92b3208a1acecb25b3c3c46dad1dca4770039d4da12c16b00477a08dc1c6e92fe0032234d5efc872678613981271724a7ceb47d2
-
Filesize
652B
MD5b441675b2ae692141e3c599ec94583d5
SHA104f1dd18594eb1dd88677d23758730712b00b67c
SHA256b505281ed8f18eb339fab86858e1e02aa384023ff3e725075b91ac14ff2ddc5d
SHA512623363d66e9a02836146e97ca3eaed442631cf350712bbf58dc557329380459c6ee8981fab32b7b319800addbce3b306c0a2579dc5c59ee8e5a2d7ae8dccf41a
-
Filesize
287B
MD5c23393a348ab66b915e53ee71f0bf2c7
SHA1fa10a1ff1ea87b3589b32287e3fd16d7ce443d1b
SHA256f11fae345310c3238f5440e77c25032728583ef6e2ea3821e8bf8762e169e5fd
SHA512a88efd57ab84e5e220fdcd1c9ed971f55d99e4de54b518e22c0b229b3f9a0145182b5a5fbd71aa456b4209dcb76e87d6531d7ad9f60ee95636a550ce69d9a168
-
Filesize
327B
MD52aae4e26ca03fce037ee93a68056b621
SHA1f9aca55d3902e20b1b267ebfb2677a3e8219c60a
SHA2560297606ae87d779db0196fe5f1c19c36adb05746e16ea40aa4699f02ce97c548
SHA5127dd0d8f2326b390b718d56b7fc1a82435f3e466b3edc82ba667cb3c39222d40135ff0c443f9c50e415a5597845f9f1a046af3645737560d6e1450d65b7121269