Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    172s
  • max time network
    179s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/11/2022, 17:00

General

  • Target

    df6093cc8395612fbbd4363266ff5c78ce332367b4230866380f722296a9cdec.vbs

  • Size

    4KB

  • MD5

    21dea128e711313098d82c5c5be4f0e0

  • SHA1

    396275c129f66afa3f17a7b71a4ef6c20e9b2d7a

  • SHA256

    df6093cc8395612fbbd4363266ff5c78ce332367b4230866380f722296a9cdec

  • SHA512

    51773370565ca927e0416287bbac87774aa93781c2c0556b3b7ef128fa09365d6d62a24c2da276c1693ce0ab0679850a9b46488b23fea24a29532d45b34a7bfe

  • SSDEEP

    96:ffJwI7iv7wAbiPtb5UQG4OmDp/otZRvxDEAfExD9TQuDGm59QyPv+J/PEmZeAeiB:fBx7ivcAbAwJcV/otZMAcxDXDjT/P2Jr

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 7 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops autorun.inf file 1 TTPs 2 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 39 IoCs
  • Runs .reg file with regedit 2 IoCs
  • Runs net.exe
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\df6093cc8395612fbbd4363266ff5c78ce332367b4230866380f722296a9cdec.vbs"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1736
    • C:\Windows\System32\net.exe
      "C:\Windows\System32\net.exe" stoP SHAredAccESS
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4808
      • C:\Windows\system32\net1.exe
        C:\Windows\system32\net1 stoP SHAredAccESS
        3⤵
          PID:2652
      • C:\Windows\regedit.exe
        "C:\Windows\regedit.exe" /S sYSINFO.Reg
        2⤵
        • Runs .reg file with regedit
        PID:1296
      • C:\Windows\explorer.exe
        "C:\Windows\explorer.exe" .\
        2⤵
          PID:4740
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /C dAtE 12/7/2019
          2⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:3480
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /c dAte 11/21/2022
          2⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:556
        • C:\Windows\System32\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Windows\System32\PRNcfg.VBs"
          2⤵
          • Blocklisted process makes network request
          • Checks computer location settings
          • Drops autorun.inf file
          • Drops file in System32 directory
          • Suspicious use of WriteProcessMemory
          PID:3888
          • C:\Windows\System32\net.exe
            "C:\Windows\System32\net.exe" stOP shaREdaccESS
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:3544
            • C:\Windows\system32\net1.exe
              C:\Windows\system32\net1 stOP shaREdaccESS
              4⤵
                PID:3692
            • C:\Windows\regedit.exe
              "C:\Windows\regedit.exe" /S SySINFo.reg
              3⤵
              • Runs .reg file with regedit
              PID:1860
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe" /C DAte 11/11/2022
              3⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:4328
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe" /c dATE 11/21/2022
              3⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:1472
        • C:\Windows\explorer.exe
          C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
          1⤵
          • Modifies Internet Explorer settings
          • Modifies registry class
          • Suspicious behavior: AddClipboardFormatListener
          • Suspicious use of SetWindowsHookEx
          PID:4532
        • C:\Windows\System32\rundll32.exe
          C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
          1⤵
            PID:204

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Windows\SYSTEM32\SySINFo.reg

            Filesize

            497B

            MD5

            d484e805ad95e6bba830fbc72550facc

            SHA1

            eac5889f3b4bfab1b0e9bf063ce8272bd80d1cf9

            SHA256

            19cde613f139d155d756c7cf648f9f3d62c26568acb212af210cc3416e9365e0

            SHA512

            7cdf242b757f066a0e0e1125c952804bb64a14e189ab70e809f590f55ed83e0ba95771a7ae6b22f0ae774008055f95ad7dd9e3e483ca2f20e6fa731ea30b1588

          • C:\Windows\SYSTEM32\sYSINFO.Reg

            Filesize

            497B

            MD5

            1fca1f6483e39feb3f2769ec9680b151

            SHA1

            1294b13e913928624aa8b341fae933eb73a771b8

            SHA256

            6fac50eeb6342a2071d3fd8cca4b44a1db170063d157e7e54e8c995e70a7a31f

            SHA512

            4eb0ff47b918dac8af538f5beca9e4f574f10685f96d41a0a5ac4c818ec5bbd5168139e140f8a50e3bd82ea5ca5410863d0d06ea4d4ce44e6e8c71e34114d817

          • C:\Windows\System32\PRNcfg.VBs

            Filesize

            4KB

            MD5

            1a40e1f845eef1388153e986469160b9

            SHA1

            c19fd4428d1c256be7132723d2f0ddfc4ebeb652

            SHA256

            b19db9a62239ca5d934594a98f57335413cb8d01fd68b215e8507e88a7ea3721

            SHA512

            bc125c186d2d4b8a3235cc1807ad3607e07280ebc370aed2c0753bb79928d679ec1bd85f26c8c792df6e7082f87946670470ab9ebda8467a2fbf62665b4d1c5a