Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1009s -
max time network
1016s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2024, 11:02
Static task
static1
Behavioral task
behavioral1
Sample
vadwax.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
vadwax.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
vadwax.exe
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral4
Sample
vadwax.exe
Resource
win11-20241007-en
General
-
Target
vadwax.exe
-
Size
1205.9MB
-
MD5
2bdd63a7fd97796129b56bd964c8af83
-
SHA1
5ea8f5f06cb702b4e8d205cc08b860ffd2239c87
-
SHA256
f91d9de259052595946250a1440a2457dbda9ee8aec8add24419ff939f13e003
-
SHA512
f0383898783a2194e5a91de0d923a924787c40aa29f0095ef20bdef9e80ad515b7493edd1f5335b8c52e9b68469165103f92d6095a97a2e36a16f4b310582a7f
-
SSDEEP
196608:HW36QOxQ8JEgOpcqGs4anqH4mJsMQOgKmEiTBh:S63Q8JExpIGnqYxMNmEiTf
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation vadwax.exe -
Executes dropped EXE 1 IoCs
pid Process 4880 svcservice.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\telemetry = "C:\\Users\\Admin\\AppData\\Roaming\\telemetry\\svcservice.exe" vadwax.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svcservice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vadwax.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1180 vadwax.exe 1180 vadwax.exe 1180 vadwax.exe 1180 vadwax.exe 4880 svcservice.exe 4880 svcservice.exe 4880 svcservice.exe 4880 svcservice.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1180 wrote to memory of 4880 1180 vadwax.exe 91 PID 1180 wrote to memory of 4880 1180 vadwax.exe 91 PID 1180 wrote to memory of 4880 1180 vadwax.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\vadwax.exe"C:\Users\Admin\AppData\Local\Temp\vadwax.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4880
-