Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
13/09/2022, 11:25
Static task
static1
Behavioral task
behavioral1
Sample
qbotagain.js
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
qbotagain.js
Resource
win10v2004-20220812-en
General
-
Target
qbotagain.js
-
Size
114KB
-
MD5
c030a938b6bebf1c124656ca120c741a
-
SHA1
bd869324ed7bd891ffd4d9907c890e7635e121a5
-
SHA256
0d055d602cf947aaeb575e8252466d83d851937e6c3c861b86a374bce8dda33f
-
SHA512
971776f1fed61bb48b5c902a9bd4d32d8282be18840c2c003ff57202acff9a825b5dc13c4e0e43047a4b818943af80068d183e3be8eea68a858c00c4d7731913
-
SSDEEP
1536:Vhoco1LtLgG4c3rWpY0Ji9oW/Vb5g8oXe4ntHJQQfzWZiZZuYoVzm+QUklu8uWzd:Ve6c6pYb9bx3sHCvVz4u8PzNrnc
Malware Config
Signatures
-
Blocklisted process makes network request 3 IoCs
flow pid Process 16 2828 wscript.exe 18 2828 wscript.exe 20 2828 wscript.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 944 PING.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2828 wrote to memory of 3244 2828 wscript.exe 87 PID 2828 wrote to memory of 3244 2828 wscript.exe 87 PID 3244 wrote to memory of 944 3244 cmd.exe 89 PID 3244 wrote to memory of 944 3244 cmd.exe 89 PID 3244 wrote to memory of 3356 3244 cmd.exe 94 PID 3244 wrote to memory of 3356 3244 cmd.exe 94
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\qbotagain.js1⤵
- Blocklisted process makes network request
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C ping go.com && regsvr32 _Vkc.dll2⤵
- Suspicious use of WriteProcessMemory
PID:3244 -
C:\Windows\system32\PING.EXEping go.com3⤵
- Runs ping.exe
PID:944
-
-
C:\Windows\system32\regsvr32.exeregsvr32 _Vkc.dll3⤵PID:3356
-
-