Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
94s -
max time network
94s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
20/06/2024, 18:22
Static task
static1
Behavioral task
behavioral1
Sample
Vega X.exe.config
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
Vega X.exe.config
Resource
win11-20240611-en
General
-
Target
Vega X.exe.config
-
Size
189B
-
MD5
9dbad5517b46f41dbb0d8780b20ab87e
-
SHA1
ef6aef0b1ea5d01b6e088a8bf2f429773c04ba5e
-
SHA256
47e5a0f101af4151d7f13d2d6bfa9b847d5b5e4a98d1f4674b7c015772746cdf
-
SHA512
43825f5c26c54e1fc5bffcce30caad1449a28c0c9a9432e9ce17d255f8bf6057c1a1002d9471e5b654ab1de08fb6eabf96302cdb3e0fb4b63ba0ff186e903be8
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133633814868373541" chrome.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings calc.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1068 chrome.exe 1068 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1068 chrome.exe 1068 chrome.exe 1068 chrome.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeShutdownPrivilege 1068 chrome.exe Token: SeCreatePagefilePrivilege 1068 chrome.exe Token: SeShutdownPrivilege 1068 chrome.exe Token: SeCreatePagefilePrivilege 1068 chrome.exe Token: SeShutdownPrivilege 1068 chrome.exe Token: SeCreatePagefilePrivilege 1068 chrome.exe Token: SeShutdownPrivilege 1068 chrome.exe Token: SeCreatePagefilePrivilege 1068 chrome.exe Token: SeShutdownPrivilege 1068 chrome.exe Token: SeCreatePagefilePrivilege 1068 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1068 chrome.exe 1068 chrome.exe 1068 chrome.exe 1068 chrome.exe 1068 chrome.exe 1068 chrome.exe 1068 chrome.exe 1068 chrome.exe 1068 chrome.exe 1068 chrome.exe 1068 chrome.exe 1068 chrome.exe 1068 chrome.exe 1068 chrome.exe 1068 chrome.exe 1068 chrome.exe 1068 chrome.exe 1068 chrome.exe 1068 chrome.exe 1068 chrome.exe 1068 chrome.exe 1068 chrome.exe 1068 chrome.exe 1068 chrome.exe 1068 chrome.exe 1068 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1068 chrome.exe 1068 chrome.exe 1068 chrome.exe 1068 chrome.exe 1068 chrome.exe 1068 chrome.exe 1068 chrome.exe 1068 chrome.exe 1068 chrome.exe 1068 chrome.exe 1068 chrome.exe 1068 chrome.exe 1068 chrome.exe 1068 chrome.exe 1068 chrome.exe 1068 chrome.exe 1068 chrome.exe 1068 chrome.exe 1068 chrome.exe 1068 chrome.exe 1068 chrome.exe 1068 chrome.exe 1068 chrome.exe 1068 chrome.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 824 OpenWith.exe 3612 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 68 wrote to memory of 4776 68 cmd.exe 78 PID 68 wrote to memory of 4776 68 cmd.exe 78 PID 4776 wrote to memory of 2368 4776 ScriptRunner.exe 79 PID 4776 wrote to memory of 2368 4776 ScriptRunner.exe 79 PID 68 wrote to memory of 5028 68 cmd.exe 81 PID 68 wrote to memory of 5028 68 cmd.exe 81 PID 68 wrote to memory of 3168 68 cmd.exe 83 PID 68 wrote to memory of 3168 68 cmd.exe 83 PID 3168 wrote to memory of 1068 3168 ScriptRunner.exe 84 PID 3168 wrote to memory of 1068 3168 ScriptRunner.exe 84 PID 1068 wrote to memory of 644 1068 chrome.exe 85 PID 1068 wrote to memory of 644 1068 chrome.exe 85 PID 1068 wrote to memory of 344 1068 chrome.exe 87 PID 1068 wrote to memory of 344 1068 chrome.exe 87 PID 1068 wrote to memory of 344 1068 chrome.exe 87 PID 1068 wrote to memory of 344 1068 chrome.exe 87 PID 1068 wrote to memory of 344 1068 chrome.exe 87 PID 1068 wrote to memory of 344 1068 chrome.exe 87 PID 1068 wrote to memory of 344 1068 chrome.exe 87 PID 1068 wrote to memory of 344 1068 chrome.exe 87 PID 1068 wrote to memory of 344 1068 chrome.exe 87 PID 1068 wrote to memory of 344 1068 chrome.exe 87 PID 1068 wrote to memory of 344 1068 chrome.exe 87 PID 1068 wrote to memory of 344 1068 chrome.exe 87 PID 1068 wrote to memory of 344 1068 chrome.exe 87 PID 1068 wrote to memory of 344 1068 chrome.exe 87 PID 1068 wrote to memory of 344 1068 chrome.exe 87 PID 1068 wrote to memory of 344 1068 chrome.exe 87 PID 1068 wrote to memory of 344 1068 chrome.exe 87 PID 1068 wrote to memory of 344 1068 chrome.exe 87 PID 1068 wrote to memory of 344 1068 chrome.exe 87 PID 1068 wrote to memory of 344 1068 chrome.exe 87 PID 1068 wrote to memory of 344 1068 chrome.exe 87 PID 1068 wrote to memory of 344 1068 chrome.exe 87 PID 1068 wrote to memory of 344 1068 chrome.exe 87 PID 1068 wrote to memory of 344 1068 chrome.exe 87 PID 1068 wrote to memory of 344 1068 chrome.exe 87 PID 1068 wrote to memory of 344 1068 chrome.exe 87 PID 1068 wrote to memory of 344 1068 chrome.exe 87 PID 1068 wrote to memory of 344 1068 chrome.exe 87 PID 1068 wrote to memory of 344 1068 chrome.exe 87 PID 1068 wrote to memory of 344 1068 chrome.exe 87 PID 1068 wrote to memory of 344 1068 chrome.exe 87 PID 1068 wrote to memory of 344 1068 chrome.exe 87 PID 1068 wrote to memory of 344 1068 chrome.exe 87 PID 1068 wrote to memory of 344 1068 chrome.exe 87 PID 1068 wrote to memory of 344 1068 chrome.exe 87 PID 1068 wrote to memory of 344 1068 chrome.exe 87 PID 1068 wrote to memory of 344 1068 chrome.exe 87 PID 1068 wrote to memory of 344 1068 chrome.exe 87 PID 1068 wrote to memory of 2232 1068 chrome.exe 88 PID 1068 wrote to memory of 2232 1068 chrome.exe 88 PID 1068 wrote to memory of 820 1068 chrome.exe 89 PID 1068 wrote to memory of 820 1068 chrome.exe 89 PID 1068 wrote to memory of 820 1068 chrome.exe 89 PID 1068 wrote to memory of 820 1068 chrome.exe 89 PID 1068 wrote to memory of 820 1068 chrome.exe 89 PID 1068 wrote to memory of 820 1068 chrome.exe 89 PID 1068 wrote to memory of 820 1068 chrome.exe 89 PID 1068 wrote to memory of 820 1068 chrome.exe 89 PID 1068 wrote to memory of 820 1068 chrome.exe 89 PID 1068 wrote to memory of 820 1068 chrome.exe 89 PID 1068 wrote to memory of 820 1068 chrome.exe 89 PID 1068 wrote to memory of 820 1068 chrome.exe 89
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Vega X.exe.config"1⤵
- Modifies registry class
PID:4988
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:824
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:68 -
C:\Windows\system32\ScriptRunner.exeScriptrunner.exe -appvscript calc.exe2⤵
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Windows\System32\calc.exe"C:\Windows\System32\calc.exe"3⤵
- Modifies registry class
PID:2368
-
-
-
C:\Windows\system32\ScriptRunner.exeScriptrunner.exe =appvscript explorer.exe2⤵PID:5028
-
-
C:\Windows\system32\ScriptRunner.exeScriptrunner.exe -appvscript chrome.exe2⤵
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"3⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ff9872e9758,0x7ff9872e9768,0x7ff9872e97784⤵PID:644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1532 --field-trial-handle=1832,i,14608050495582060496,12890124904504620806,131072 /prefetch:24⤵PID:344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1828 --field-trial-handle=1832,i,14608050495582060496,12890124904504620806,131072 /prefetch:84⤵PID:2232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2112 --field-trial-handle=1832,i,14608050495582060496,12890124904504620806,131072 /prefetch:84⤵PID:820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2960 --field-trial-handle=1832,i,14608050495582060496,12890124904504620806,131072 /prefetch:14⤵PID:3192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2968 --field-trial-handle=1832,i,14608050495582060496,12890124904504620806,131072 /prefetch:14⤵PID:2904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4444 --field-trial-handle=1832,i,14608050495582060496,12890124904504620806,131072 /prefetch:14⤵PID:4640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4592 --field-trial-handle=1832,i,14608050495582060496,12890124904504620806,131072 /prefetch:84⤵PID:1984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4732 --field-trial-handle=1832,i,14608050495582060496,12890124904504620806,131072 /prefetch:84⤵PID:700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4704 --field-trial-handle=1832,i,14608050495582060496,12890124904504620806,131072 /prefetch:84⤵PID:480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4976 --field-trial-handle=1832,i,14608050495582060496,12890124904504620806,131072 /prefetch:84⤵PID:2652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5020 --field-trial-handle=1832,i,14608050495582060496,12890124904504620806,131072 /prefetch:84⤵PID:4652
-
-
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:3612
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3888
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4500
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
425B
MD52ead231ce66abe78de975d1b05d590a4
SHA1c269fde7c1d36005928089b0689cecd0a2bc1e1c
SHA25671879c54d43afa910afbabfc59235151a78b42049f79f152773fbfca74b2f294
SHA512038480a37fe4227fe04f7323fea842037df486901aab0529145046718ffb48c99e62107f534857ca0023dbb5b72be778bc4911ae2873c01ad826865c44537fdd