Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/10/2024, 11:49

General

  • Target

    game/bgm/credits_ru.ogg

  • Size

    2.9MB

  • MD5

    50dd5ced325004d31ab39434007d90f4

  • SHA1

    84ceb8f88328460c178e964b1927e64904665546

  • SHA256

    95c0362086753aaa3c65238ce13f6456048b25c68001de223d0bd0d42a5a3348

  • SHA512

    aaede8d2005342e40e72d75060ef06bc3835b5066c2f2bf1b2a15426a67eae224d811636b34579f3f7dc485230bc35cc0e4289b08dc46614ab4cb235fefeae8f

  • SSDEEP

    49152:wqUktCDnBWV1bSVn+T4ZzsItowc0JrCqEJXOW22VetMLuCKZACNHr/i9JbBJ8bAw:xoBWV1u+T4u10QJNOW22VettCLCNHrKC

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SendNotifyMessage 5 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\game\bgm\credits_ru.ogg
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3700
    • C:\Program Files\VideoLAN\VLC\vlc.exe
      "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\game\bgm\credits_ru.ogg"
      2⤵
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:3412
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x398 0x150
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2868

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3412-5-0x00007FF6C0890000-0x00007FF6C0988000-memory.dmp

    Filesize

    992KB

  • memory/3412-6-0x00007FFF5B3C0000-0x00007FFF5B3F4000-memory.dmp

    Filesize

    208KB

  • memory/3412-13-0x00007FFF5B6D0000-0x00007FFF5B6ED000-memory.dmp

    Filesize

    116KB

  • memory/3412-14-0x00007FFF5B3A0000-0x00007FFF5B3B1000-memory.dmp

    Filesize

    68KB

  • memory/3412-7-0x00007FFF4B420000-0x00007FFF4B6D6000-memory.dmp

    Filesize

    2.7MB

  • memory/3412-16-0x00007FFF5B350000-0x00007FFF5B391000-memory.dmp

    Filesize

    260KB

  • memory/3412-15-0x00007FFF4BB10000-0x00007FFF4BD1B000-memory.dmp

    Filesize

    2.0MB

  • memory/3412-12-0x00007FFF5B6F0000-0x00007FFF5B701000-memory.dmp

    Filesize

    68KB

  • memory/3412-11-0x00007FFF5B710000-0x00007FFF5B727000-memory.dmp

    Filesize

    92KB

  • memory/3412-10-0x00007FFF5B7F0000-0x00007FFF5B801000-memory.dmp

    Filesize

    68KB

  • memory/3412-9-0x00007FFF5EC10000-0x00007FFF5EC27000-memory.dmp

    Filesize

    92KB

  • memory/3412-8-0x00007FFF61550000-0x00007FFF61568000-memory.dmp

    Filesize

    96KB

  • memory/3412-22-0x00007FFF5ADB0000-0x00007FFF5ADC1000-memory.dmp

    Filesize

    68KB

  • memory/3412-21-0x00007FFF5ADD0000-0x00007FFF5ADE1000-memory.dmp

    Filesize

    68KB

  • memory/3412-20-0x00007FFF5B110000-0x00007FFF5B121000-memory.dmp

    Filesize

    68KB

  • memory/3412-19-0x00007FFF5B130000-0x00007FFF5B148000-memory.dmp

    Filesize

    96KB

  • memory/3412-18-0x00007FFF5B150000-0x00007FFF5B171000-memory.dmp

    Filesize

    132KB

  • memory/3412-17-0x00007FFF4A180000-0x00007FFF4B230000-memory.dmp

    Filesize

    16.7MB

  • memory/3412-35-0x00007FFF4A180000-0x00007FFF4B230000-memory.dmp

    Filesize

    16.7MB