Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
449s -
max time network
450s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
03/05/2024, 16:00
Static task
static1
Behavioral task
behavioral1
Sample
Screen recording 2024-05-03 11.42.37 AM.webm
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
Screen recording 2024-05-03 11.42.37 AM.webm
Resource
win11-20240419-en
General
-
Target
Screen recording 2024-05-03 11.42.37 AM.webm
-
Size
815KB
-
MD5
4d028acdd7bf7c8855ca9a8bee7d916e
-
SHA1
34b387f8b2ef332170e27d3621af7873b5b37306
-
SHA256
e65221a912bb1dab1dfd34ee6cd79799f6ea96a3c5fc627ce363feb56ff7743e
-
SHA512
6d6c7a4ab11e9c5409c0f96aac565c2d5c36116cd2ca18df6f5439b42d94d6a64e6ffa5fc63e891d8624256ed5f55c6885190b5d07678e0a732bcdf059b385e9
-
SSDEEP
24576:iWtq99jUIVaN+oBphkq2BlwwLCBX3/7FAwJB1XA0M2Gb8:iWsPUIO+oBKlwwLCBXTmwJfTMLI
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000_Classes\Local Settings cmd.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3668 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3668 vlc.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 1148 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1148 AUDIODG.EXE Token: 33 3668 vlc.exe Token: SeIncBasePriorityPrivilege 3668 vlc.exe -
Suspicious use of FindShellTrayWindow 16 IoCs
pid Process 3668 vlc.exe 3668 vlc.exe 3668 vlc.exe 3668 vlc.exe 3668 vlc.exe 3668 vlc.exe 3668 vlc.exe 3668 vlc.exe 3668 vlc.exe 3668 vlc.exe 3668 vlc.exe 3668 vlc.exe 3668 vlc.exe 3668 vlc.exe 3668 vlc.exe 3668 vlc.exe -
Suspicious use of SendNotifyMessage 9 IoCs
pid Process 3668 vlc.exe 3668 vlc.exe 3668 vlc.exe 3668 vlc.exe 3668 vlc.exe 3668 vlc.exe 3668 vlc.exe 3668 vlc.exe 3668 vlc.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3668 vlc.exe 3668 vlc.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1584 wrote to memory of 3668 1584 cmd.exe 83 PID 1584 wrote to memory of 3668 1584 cmd.exe 83
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Screen recording 2024-05-03 11.42.37 AM.webm"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\Screen recording 2024-05-03 11.42.37 AM.webm"2⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3668
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x398 0x3a81⤵
- Suspicious use of AdjustPrivilegeToken
PID:1148