Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
138s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
08/05/2024, 23:39
Static task
static1
Behavioral task
behavioral1
Sample
Vencord.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
Vencord.exe
Resource
win10v2004-20240508-en
General
-
Target
Vencord.exe
-
Size
172KB
-
MD5
77b96aa2d04a2a6d5150c045335715ee
-
SHA1
f24a994ac4f0d82fe06b521cd5380483da41f2e5
-
SHA256
edb0739d83f55658a9ccb25db70c525055d4951a211a322ac351e78db2768236
-
SHA512
b10c5193824d50b2067136667b9f161cb0f8a7731197f8df06508c76673806dbff790f5d15b448ce2f4befe82d06b14c64b4cf1c60ad83db8197565a1e34ccc4
-
SSDEEP
3072:vUeL2/0XLut44ZjWv815xxWTwGRBDaBRTbFNhc/W73cPXv2wJn9pZP:Me60but44Zx2VB4bJc/W73cPXv2wJn9D
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Vencord.exe -
Executes dropped EXE 2 IoCs
pid Process 3260 scchost.exe 1036 scchost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\scchost = "C:\\Users\\Admin\\AppData\\Roaming\\scchost.exe" Vencord.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3204 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4288 timeout.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3496 Vencord.exe Token: SeDebugPrivilege 3496 Vencord.exe Token: SeDebugPrivilege 3260 scchost.exe Token: SeDebugPrivilege 1036 scchost.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3496 wrote to memory of 3204 3496 Vencord.exe 85 PID 3496 wrote to memory of 3204 3496 Vencord.exe 85 PID 3496 wrote to memory of 116 3496 Vencord.exe 92 PID 3496 wrote to memory of 116 3496 Vencord.exe 92 PID 3496 wrote to memory of 4176 3496 Vencord.exe 94 PID 3496 wrote to memory of 4176 3496 Vencord.exe 94 PID 4176 wrote to memory of 4288 4176 cmd.exe 96 PID 4176 wrote to memory of 4288 4176 cmd.exe 96 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Vencord.exe"C:\Users\Admin\AppData\Local\Temp\Vencord.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3496 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "scchost" /tr "C:\Users\Admin\AppData\Roaming\scchost.exe"2⤵
- Creates scheduled task(s)
PID:3204
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /delete /f /tn "scchost"2⤵PID:116
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp836F.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:4176 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:4288
-
-
-
C:\Users\Admin\AppData\Roaming\scchost.exeC:\Users\Admin\AppData\Roaming\scchost.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3260
-
C:\Users\Admin\AppData\Roaming\scchost.exeC:\Users\Admin\AppData\Roaming\scchost.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1036
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
654B
MD52ff39f6c7249774be85fd60a8f9a245e
SHA1684ff36b31aedc1e587c8496c02722c6698c1c4e
SHA256e1b91642d85d98124a6a31f710e137ab7fd90dec30e74a05ab7fcf3b7887dced
SHA5121d7e8b92ef4afd463d62cfa7e8b9d1799db5bf2a263d3cd7840df2e0a1323d24eb595b5f8eb615c6cb15f9e3a7b4fc99f8dd6a3d34479222e966ec708998aed1
-
Filesize
159B
MD59746635d1a0b3b60a278a0bee7574cee
SHA158b046e2f87570473a963f19044c4dc860e37f3e
SHA256abaf611ff5821e6bdc57557bc9152c48876a45ad93f97829e5162870cc4388e5
SHA5122a5c032834d2a1d6e04cba1221f98aeac19d8707901ada3bad9802e09cab19a91b3218483c3d74b7308b9bd1cab4adc604678bb89f9392d6cf29dd99c6c704c0
-
Filesize
172KB
MD577b96aa2d04a2a6d5150c045335715ee
SHA1f24a994ac4f0d82fe06b521cd5380483da41f2e5
SHA256edb0739d83f55658a9ccb25db70c525055d4951a211a322ac351e78db2768236
SHA512b10c5193824d50b2067136667b9f161cb0f8a7731197f8df06508c76673806dbff790f5d15b448ce2f4befe82d06b14c64b4cf1c60ad83db8197565a1e34ccc4