Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1010s -
max time network
1018s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241211-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241211-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
30/12/2024, 11:02
Static task
static1
Behavioral task
behavioral1
Sample
vadwax.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
vadwax.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
vadwax.exe
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral4
Sample
vadwax.exe
Resource
win11-20241007-en
General
-
Target
vadwax.exe
-
Size
1205.9MB
-
MD5
2bdd63a7fd97796129b56bd964c8af83
-
SHA1
5ea8f5f06cb702b4e8d205cc08b860ffd2239c87
-
SHA256
f91d9de259052595946250a1440a2457dbda9ee8aec8add24419ff939f13e003
-
SHA512
f0383898783a2194e5a91de0d923a924787c40aa29f0095ef20bdef9e80ad515b7493edd1f5335b8c52e9b68469165103f92d6095a97a2e36a16f4b310582a7f
-
SSDEEP
196608:HW36QOxQ8JEgOpcqGs4anqH4mJsMQOgKmEiTBh:S63Q8JExpIGnqYxMNmEiTf
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3226857575-536881564-1522996248-1000\Control Panel\International\Geo\Nation vadwax.exe -
Executes dropped EXE 1 IoCs
pid Process 116 svcservice.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3226857575-536881564-1522996248-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\telemetry = "C:\\Users\\Admin\\AppData\\Roaming\\telemetry\\svcservice.exe" vadwax.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vadwax.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svcservice.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1556 vadwax.exe 1556 vadwax.exe 1556 vadwax.exe 1556 vadwax.exe 116 svcservice.exe 116 svcservice.exe 116 svcservice.exe 116 svcservice.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1556 wrote to memory of 116 1556 vadwax.exe 89 PID 1556 wrote to memory of 116 1556 vadwax.exe 89 PID 1556 wrote to memory of 116 1556 vadwax.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\vadwax.exe"C:\Users\Admin\AppData\Local\Temp\vadwax.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:116
-