Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    171s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/10/2024, 14:02

General

  • Target

    Bird.webm

  • Size

    3.9MB

  • MD5

    56c6040a0028702b0ed2f9961086b516

  • SHA1

    6917bc5b0efc1add8f1254f1c83be2143e6b7368

  • SHA256

    04a95e618528f6a68b180adcda9d4d35eafb15a9d6672ecffa4c3894a2866315

  • SHA512

    58dcd88fec440f4d0fdceab8d3b87edf79a093af389f005ae4a84bd841ebe9001f3588814f1ce0b67719a91cce7b3d67c64ac124c1081f4203db8168210f27e1

  • SSDEEP

    3072:g/oP9/DlNVTlEVplKViPRVvldVQPHVtlY/KloVDl3/AlnVGPTVvlwVuPdVnlV/8U:8jmZxW

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 9 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Bird.webm
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2660
    • C:\Program Files\VideoLAN\VLC\vlc.exe
      "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\Bird.webm"
      2⤵
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:4112
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x4a0 0x444
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2732

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4112-8-0x00007FFB61E60000-0x00007FFB61E94000-memory.dmp

    Filesize

    208KB

  • memory/4112-7-0x00007FF713C60000-0x00007FF713D58000-memory.dmp

    Filesize

    992KB

  • memory/4112-16-0x00007FFB61500000-0x00007FFB61511000-memory.dmp

    Filesize

    68KB

  • memory/4112-9-0x00007FFB61580000-0x00007FFB61836000-memory.dmp

    Filesize

    2.7MB

  • memory/4112-15-0x00007FFB61520000-0x00007FFB6153D000-memory.dmp

    Filesize

    116KB

  • memory/4112-17-0x00007FFB52490000-0x00007FFB5269B000-memory.dmp

    Filesize

    2.0MB

  • memory/4112-14-0x00007FFB61540000-0x00007FFB61551000-memory.dmp

    Filesize

    68KB

  • memory/4112-13-0x00007FFB61560000-0x00007FFB61577000-memory.dmp

    Filesize

    92KB

  • memory/4112-12-0x00007FFB61C20000-0x00007FFB61C31000-memory.dmp

    Filesize

    68KB

  • memory/4112-11-0x00007FFB61D70000-0x00007FFB61D87000-memory.dmp

    Filesize

    92KB

  • memory/4112-10-0x00007FFB61D90000-0x00007FFB61DA8000-memory.dmp

    Filesize

    96KB

  • memory/4112-24-0x00007FFB61400000-0x00007FFB61411000-memory.dmp

    Filesize

    68KB

  • memory/4112-23-0x00007FFB61420000-0x00007FFB61431000-memory.dmp

    Filesize

    68KB

  • memory/4112-22-0x00007FFB61440000-0x00007FFB61451000-memory.dmp

    Filesize

    68KB

  • memory/4112-21-0x00007FFB61460000-0x00007FFB61478000-memory.dmp

    Filesize

    96KB

  • memory/4112-20-0x00007FFB61480000-0x00007FFB614A1000-memory.dmp

    Filesize

    132KB

  • memory/4112-19-0x00007FFB614B0000-0x00007FFB614F1000-memory.dmp

    Filesize

    260KB

  • memory/4112-18-0x00007FFB513E0000-0x00007FFB52490000-memory.dmp

    Filesize

    16.7MB

  • memory/4112-36-0x00007FFB513E0000-0x00007FFB52490000-memory.dmp

    Filesize

    16.7MB

  • memory/4112-54-0x00007FFB513E0000-0x00007FFB52490000-memory.dmp

    Filesize

    16.7MB