Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
1$RECYCLE.B...GOK.js
windows7-x64
10$RECYCLE.B...GOK.js
windows10-2004-x64
10$RECYCLE.B...KV.scr
windows7-x64
1$RECYCLE.B...KV.scr
windows10-2004-x64
1$RECYCLE.B...XJ.exe
windows7-x64
3$RECYCLE.B...XJ.exe
windows10-2004-x64
3$RECYCLE.B...6RL.js
windows7-x64
10$RECYCLE.B...6RL.js
windows10-2004-x64
10$RECYCLE.B...IB.exe
windows7-x64
1$RECYCLE.B...IB.exe
windows10-2004-x64
1$RECYCLE.B...S1.bat
windows7-x64
7$RECYCLE.B...S1.bat
windows10-2004-x64
7pdf-extensions.vbs
windows7-x64
3pdf-extensions.vbs
windows10-2004-x64
10Analysis
-
max time kernel
147s -
max time network
171s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
31/03/2023, 16:01
Static task
static1
Behavioral task
behavioral1
Sample
$RECYCLE.BIN/$R5K4GOK.js
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
$RECYCLE.BIN/$R5K4GOK.js
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
$RECYCLE.BIN/$R7M8AKV.scr
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
$RECYCLE.BIN/$R7M8AKV.scr
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
$RECYCLE.BIN/$RC3SQXJ.exe
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
$RECYCLE.BIN/$RC3SQXJ.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral7
Sample
$RECYCLE.BIN/$RCMX6RL.js
Resource
win7-20230220-en
Behavioral task
behavioral8
Sample
$RECYCLE.BIN/$RCMX6RL.js
Resource
win10v2004-20230220-en
Behavioral task
behavioral9
Sample
$RECYCLE.BIN/$RHL25IB.exe
Resource
win7-20230220-en
Behavioral task
behavioral10
Sample
$RECYCLE.BIN/$RHL25IB.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral11
Sample
$RECYCLE.BIN/$RJXIQS1.bat
Resource
win7-20230220-en
Behavioral task
behavioral12
Sample
$RECYCLE.BIN/$RJXIQS1.bat
Resource
win10v2004-20230220-en
Behavioral task
behavioral13
Sample
pdf-extensions.vbs
Resource
win7-20230220-en
General
-
Target
$RECYCLE.BIN/$RCMX6RL.js
-
Size
30KB
-
MD5
5755b6a40493ddbef7a340f21189a16c
-
SHA1
88a3c0693ec96eb4cbdbd1bdeece2519cdadb5b5
-
SHA256
476eed72d60eff3ae7cec8fe621e38cd12131c567501f0e7b7688b8618800bc2
-
SHA512
107c48d26e7e64acc987bf49871780e7ac29c577c495a5d804f45cd5a1ef14b80917d5e55b3e9b41ba769e5fa77d1aada9bc80d1dc33c88e0717e4389c53746f
-
SSDEEP
768:HUYnBbm0aifjNfwp1nXFCfIaf9fgyQ7buighAZK:9zamq1n1Cwaf9gbuIZK
Malware Config
Extracted
vjw0rm
http://demon666.duckdns.org:9011
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 9 5104 wscript.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation wscript.exe -
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\$RCMX6RL.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\OyfYmewQFR.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\OyfYmewQFR.js wscript.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Windows\CurrentVersion\Run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WQ38R62NDG = "\"C:\\Users\\Admin\\AppData\\Roaming\\$RCMX6RL.js\"" wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 5104 wrote to memory of 1684 5104 wscript.exe 85 PID 5104 wrote to memory of 1684 5104 wscript.exe 85
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\$RECYCLE.BIN\$RCMX6RL.js1⤵
- Blocklisted process makes network request
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\OyfYmewQFR.js"2⤵
- Drops startup file
PID:1684
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD5c34487a0360e4c414e536f15289cc26b
SHA116e4ee131c22aa2a4e37a518ed9bc9da4c01b238
SHA2562de9986d593e85a018c4b83a4e42fc93af26b55190277a2232dca2fa43214ff0
SHA5120697f603cd78e4d0c78f5ba18f428ab4d189f9dfff7cef22b04b8ab5a9509d99dcbce7d3bb339744ccb61c3b5d25139e7b5448cbe5d1ee4f62de90e87cf3ccd5