Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
34s -
max time network
36s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
06/07/2024, 12:49
Static task
static1
Behavioral task
behavioral1
Sample
Voltsploit.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Voltsploit.exe
Resource
win10v2004-20240704-en
General
-
Target
Voltsploit.exe
-
Size
32.7MB
-
MD5
6520ffe8272c83805bb8937f48372c17
-
SHA1
b6617ed5e25e5765bd71628093288d29b094baba
-
SHA256
12f044076f5c4879640cc50ecfad22876b235136bef1a04a566bd3e6fa6569e7
-
SHA512
479e0fe94bb93985ac9c7a70e5901d397e6c9f6c0dec0b1f5df13558896565bfa26b516bb406867e732608e646efcbba914125f57c85da2125f490d6704b649a
-
SSDEEP
393216:CtJKPxXnM5Izeo7TEMoNeQtezfDLRZBE2+qBvtgaYjfLZJRzZu97SCKH3pTfHkkq:L0IRTN5KezfhZB4+ZCFGWCM7HkkruMu
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-771719357-2485960699-3367710044-1000\Control Panel\International\Geo\Nation Voltsploit.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 644 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 644 AUDIODG.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1944 wrote to memory of 1440 1944 Voltsploit.exe 85 PID 1944 wrote to memory of 1440 1944 Voltsploit.exe 85 PID 1944 wrote to memory of 1440 1944 Voltsploit.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\Voltsploit.exe"C:\Users\Admin\AppData\Local\Temp\Voltsploit.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\matrix.bat" "2⤵PID:1440
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4b8 0x4901⤵
- Suspicious use of AdjustPrivilegeToken
PID:644
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
270B
MD55744fef3d00802cdab3d9d9fb03b2821
SHA156b0eaad9185c62ecd831ce7d3288c6cfb63ff3d
SHA25692b73f05d52df9a3db460664af974b7ebdea1c5ced5f4e1801874e6e6387d8ca
SHA5124def8a413704a5372a8381600770b7004d7330315df61655464e10027572a0cedd1d0424e4dd63ab3daeb11e1aba7effb27d7f94d27c5ecc73ebeb5a5ab8dcf5