Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03/03/2023, 15:24
Static task
static1
Behavioral task
behavioral1
Sample
swift _ copy168678689699.js
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
swift _ copy168678689699.js
Resource
win10v2004-20230220-en
General
-
Target
swift _ copy168678689699.js
-
Size
356KB
-
MD5
d5e78c598c5cd83e6b82896dcabd665e
-
SHA1
24877b354e0378bf350ddab24006e6a02773e2ec
-
SHA256
5168f3064a0f58965109c158f0c6030b0c755064ab8f1462a611997da0e6730a
-
SHA512
9205a3c37c743fd84da763379500797e4a2bb1c9fd905d34786a2fcb93fdc4c320bd6862870173eea766c00f34ab0731ddbd693cef6f4068da12864fe9d93c32
-
SSDEEP
6144:GQqCe7DlgnirYAym5NCl1Z+qvjdg7EKHWg2xlI6ClynjXWHm4DihNDMhWxe4RveG:NzU8nZ+uLlI6937/DclsRtktXk
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings wscript.exe -
Runs .reg file with regedit 1 IoCs
pid Process 3860 regedit.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2776 wrote to memory of 3860 2776 wscript.exe 86 PID 2776 wrote to memory of 3860 2776 wscript.exe 86 PID 2776 wrote to memory of 3348 2776 wscript.exe 92 PID 2776 wrote to memory of 3348 2776 wscript.exe 92
Processes
-
C:\Windows\system32\wscript.exewscript.exe "C:\Users\Admin\AppData\Local\Temp\swift _ copy168678689699.js"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\regedit.exe"regedit.exe" "C:\Users\Admin\AppData\Local\Temp\ebgeaegdbdecaedfebace.reg"2⤵
- Runs .reg file with regedit
PID:3860
-
-
C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe"C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\jdqwyxlxad.txt"2⤵PID:3348
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
143B
MD50e5411d7ecba9a435afda71c6c39d8fd
SHA12d6812052bf7be1b5e213e1d813ae39faa07284c
SHA256cb68d50df5817e51ec5b2f72893dc4c749bf3504519107e0a78dda84d55f09e2
SHA512903ac6e5c8a12607af267b54bcbbedfa5542c5b4f7ea289ab7c6a32a424d5b846ae406d830cb4ad48e2b46f92c504163c0856af8c3e09685a8855f39f616ddb1
-
Filesize
164KB
MD5a38a8c84ca9380e033bce578883e53eb
SHA13819e72452f4df494e73f0451753382407c65827
SHA25672a590d7d30481cf2194cb4541dca53d7a58d237c067ab6466b685b82c491aba
SHA512b0a17b026e402d80ce882ea4c036a730a545d0844eee740c35373b9b4f6d59e498bbb2a8af3b3335ee186129df43f31e7134627ce0e14e8bbc65d80e3e0b415a