Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1009s -
max time network
1017s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
30/12/2024, 11:02
Static task
static1
Behavioral task
behavioral1
Sample
vadwax.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
vadwax.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
vadwax.exe
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral4
Sample
vadwax.exe
Resource
win11-20241007-en
General
-
Target
vadwax.exe
-
Size
1205.9MB
-
MD5
2bdd63a7fd97796129b56bd964c8af83
-
SHA1
5ea8f5f06cb702b4e8d205cc08b860ffd2239c87
-
SHA256
f91d9de259052595946250a1440a2457dbda9ee8aec8add24419ff939f13e003
-
SHA512
f0383898783a2194e5a91de0d923a924787c40aa29f0095ef20bdef9e80ad515b7493edd1f5335b8c52e9b68469165103f92d6095a97a2e36a16f4b310582a7f
-
SSDEEP
196608:HW36QOxQ8JEgOpcqGs4anqH4mJsMQOgKmEiTBh:S63Q8JExpIGnqYxMNmEiTf
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1480 svcservice.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000\Software\Microsoft\Windows\CurrentVersion\Run\telemetry = "C:\\Users\\Admin\\AppData\\Roaming\\telemetry\\svcservice.exe" vadwax.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vadwax.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svcservice.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1600 vadwax.exe 1600 vadwax.exe 1600 vadwax.exe 1600 vadwax.exe 1480 svcservice.exe 1480 svcservice.exe 1480 svcservice.exe 1480 svcservice.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1600 wrote to memory of 1480 1600 vadwax.exe 77 PID 1600 wrote to memory of 1480 1600 vadwax.exe 77 PID 1600 wrote to memory of 1480 1600 vadwax.exe 77
Processes
-
C:\Users\Admin\AppData\Local\Temp\vadwax.exe"C:\Users\Admin\AppData\Local\Temp\vadwax.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1480
-