Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
04/05/2023, 09:42
Static task
static1
Behavioral task
behavioral1
Sample
253c19f1078fd5ec04602276f8f1ca1aab6bd4349b75e4052cdbf78cb1bd9767.vbs
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
253c19f1078fd5ec04602276f8f1ca1aab6bd4349b75e4052cdbf78cb1bd9767.vbs
Resource
win10v2004-20230220-en
General
-
Target
253c19f1078fd5ec04602276f8f1ca1aab6bd4349b75e4052cdbf78cb1bd9767.vbs
-
Size
927B
-
MD5
984572d249eddd2e08c4575ab0b26eb7
-
SHA1
f031a105ca244c8a4ec91aefedbecedd79651361
-
SHA256
253c19f1078fd5ec04602276f8f1ca1aab6bd4349b75e4052cdbf78cb1bd9767
-
SHA512
8e2976de35f5eb0695848d6ec044a192e0902ff976eab08221b6e11d156669237fc717396c0c1224803c1a5146a002ce98931cb43816173b1c425163fb0731ba
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation WScript.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\chrome_debug.log chrome.exe File opened for modification C:\Program Files\Google\Chrome\Application\debug.log chrome.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2412 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3304 chrome.exe 3304 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3304 chrome.exe Token: SeCreatePagefilePrivilege 3304 chrome.exe Token: SeShutdownPrivilege 3304 chrome.exe Token: SeCreatePagefilePrivilege 3304 chrome.exe Token: SeShutdownPrivilege 3304 chrome.exe Token: SeCreatePagefilePrivilege 3304 chrome.exe Token: SeShutdownPrivilege 3304 chrome.exe Token: SeCreatePagefilePrivilege 3304 chrome.exe Token: SeShutdownPrivilege 3304 chrome.exe Token: SeCreatePagefilePrivilege 3304 chrome.exe Token: SeShutdownPrivilege 3304 chrome.exe Token: SeCreatePagefilePrivilege 3304 chrome.exe Token: SeShutdownPrivilege 3304 chrome.exe Token: SeCreatePagefilePrivilege 3304 chrome.exe Token: SeShutdownPrivilege 3304 chrome.exe Token: SeCreatePagefilePrivilege 3304 chrome.exe Token: SeShutdownPrivilege 3304 chrome.exe Token: SeCreatePagefilePrivilege 3304 chrome.exe Token: SeShutdownPrivilege 3304 chrome.exe Token: SeCreatePagefilePrivilege 3304 chrome.exe Token: SeShutdownPrivilege 3304 chrome.exe Token: SeCreatePagefilePrivilege 3304 chrome.exe Token: SeShutdownPrivilege 3304 chrome.exe Token: SeCreatePagefilePrivilege 3304 chrome.exe Token: SeShutdownPrivilege 3304 chrome.exe Token: SeCreatePagefilePrivilege 3304 chrome.exe Token: SeShutdownPrivilege 3304 chrome.exe Token: SeCreatePagefilePrivilege 3304 chrome.exe Token: SeShutdownPrivilege 3304 chrome.exe Token: SeCreatePagefilePrivilege 3304 chrome.exe Token: SeShutdownPrivilege 3304 chrome.exe Token: SeCreatePagefilePrivilege 3304 chrome.exe Token: SeShutdownPrivilege 3304 chrome.exe Token: SeCreatePagefilePrivilege 3304 chrome.exe Token: SeShutdownPrivilege 3304 chrome.exe Token: SeCreatePagefilePrivilege 3304 chrome.exe Token: SeShutdownPrivilege 3304 chrome.exe Token: SeCreatePagefilePrivilege 3304 chrome.exe Token: SeShutdownPrivilege 3304 chrome.exe Token: SeCreatePagefilePrivilege 3304 chrome.exe Token: SeShutdownPrivilege 3304 chrome.exe Token: SeCreatePagefilePrivilege 3304 chrome.exe Token: SeShutdownPrivilege 3304 chrome.exe Token: SeCreatePagefilePrivilege 3304 chrome.exe Token: SeShutdownPrivilege 3304 chrome.exe Token: SeCreatePagefilePrivilege 3304 chrome.exe Token: SeShutdownPrivilege 3304 chrome.exe Token: SeCreatePagefilePrivilege 3304 chrome.exe Token: SeShutdownPrivilege 3304 chrome.exe Token: SeCreatePagefilePrivilege 3304 chrome.exe Token: SeShutdownPrivilege 3304 chrome.exe Token: SeCreatePagefilePrivilege 3304 chrome.exe Token: SeShutdownPrivilege 3304 chrome.exe Token: SeCreatePagefilePrivilege 3304 chrome.exe Token: SeShutdownPrivilege 3304 chrome.exe Token: SeCreatePagefilePrivilege 3304 chrome.exe Token: SeShutdownPrivilege 3304 chrome.exe Token: SeCreatePagefilePrivilege 3304 chrome.exe Token: SeShutdownPrivilege 3304 chrome.exe Token: SeCreatePagefilePrivilege 3304 chrome.exe Token: SeShutdownPrivilege 3304 chrome.exe Token: SeCreatePagefilePrivilege 3304 chrome.exe Token: SeShutdownPrivilege 3304 chrome.exe Token: SeCreatePagefilePrivilege 3304 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4052 wrote to memory of 2412 4052 WScript.exe 85 PID 4052 wrote to memory of 2412 4052 WScript.exe 85 PID 4052 wrote to memory of 3304 4052 WScript.exe 87 PID 4052 wrote to memory of 3304 4052 WScript.exe 87 PID 3304 wrote to memory of 5016 3304 chrome.exe 88 PID 3304 wrote to memory of 5016 3304 chrome.exe 88 PID 3304 wrote to memory of 220 3304 chrome.exe 89 PID 3304 wrote to memory of 220 3304 chrome.exe 89 PID 3304 wrote to memory of 220 3304 chrome.exe 89 PID 3304 wrote to memory of 220 3304 chrome.exe 89 PID 3304 wrote to memory of 220 3304 chrome.exe 89 PID 3304 wrote to memory of 220 3304 chrome.exe 89 PID 3304 wrote to memory of 220 3304 chrome.exe 89 PID 3304 wrote to memory of 220 3304 chrome.exe 89 PID 3304 wrote to memory of 220 3304 chrome.exe 89 PID 3304 wrote to memory of 220 3304 chrome.exe 89 PID 3304 wrote to memory of 220 3304 chrome.exe 89 PID 3304 wrote to memory of 220 3304 chrome.exe 89 PID 3304 wrote to memory of 220 3304 chrome.exe 89 PID 3304 wrote to memory of 220 3304 chrome.exe 89 PID 3304 wrote to memory of 220 3304 chrome.exe 89 PID 3304 wrote to memory of 220 3304 chrome.exe 89 PID 3304 wrote to memory of 220 3304 chrome.exe 89 PID 3304 wrote to memory of 220 3304 chrome.exe 89 PID 3304 wrote to memory of 220 3304 chrome.exe 89 PID 3304 wrote to memory of 220 3304 chrome.exe 89 PID 3304 wrote to memory of 220 3304 chrome.exe 89 PID 3304 wrote to memory of 220 3304 chrome.exe 89 PID 3304 wrote to memory of 220 3304 chrome.exe 89 PID 3304 wrote to memory of 220 3304 chrome.exe 89 PID 3304 wrote to memory of 220 3304 chrome.exe 89 PID 3304 wrote to memory of 220 3304 chrome.exe 89 PID 3304 wrote to memory of 220 3304 chrome.exe 89 PID 3304 wrote to memory of 220 3304 chrome.exe 89 PID 3304 wrote to memory of 220 3304 chrome.exe 89 PID 3304 wrote to memory of 220 3304 chrome.exe 89 PID 3304 wrote to memory of 220 3304 chrome.exe 89 PID 3304 wrote to memory of 220 3304 chrome.exe 89 PID 3304 wrote to memory of 220 3304 chrome.exe 89 PID 3304 wrote to memory of 220 3304 chrome.exe 89 PID 3304 wrote to memory of 220 3304 chrome.exe 89 PID 3304 wrote to memory of 220 3304 chrome.exe 89 PID 3304 wrote to memory of 220 3304 chrome.exe 89 PID 3304 wrote to memory of 220 3304 chrome.exe 89 PID 3304 wrote to memory of 220 3304 chrome.exe 89 PID 3304 wrote to memory of 220 3304 chrome.exe 89 PID 3304 wrote to memory of 2272 3304 chrome.exe 90 PID 3304 wrote to memory of 2272 3304 chrome.exe 90 PID 3304 wrote to memory of 4372 3304 chrome.exe 91 PID 3304 wrote to memory of 4372 3304 chrome.exe 91 PID 3304 wrote to memory of 4372 3304 chrome.exe 91 PID 3304 wrote to memory of 4372 3304 chrome.exe 91 PID 3304 wrote to memory of 4372 3304 chrome.exe 91 PID 3304 wrote to memory of 4372 3304 chrome.exe 91 PID 3304 wrote to memory of 4372 3304 chrome.exe 91 PID 3304 wrote to memory of 4372 3304 chrome.exe 91 PID 3304 wrote to memory of 4372 3304 chrome.exe 91 PID 3304 wrote to memory of 4372 3304 chrome.exe 91 PID 3304 wrote to memory of 4372 3304 chrome.exe 91 PID 3304 wrote to memory of 4372 3304 chrome.exe 91 PID 3304 wrote to memory of 4372 3304 chrome.exe 91 PID 3304 wrote to memory of 4372 3304 chrome.exe 91 PID 3304 wrote to memory of 4372 3304 chrome.exe 91 PID 3304 wrote to memory of 4372 3304 chrome.exe 91
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\253c19f1078fd5ec04602276f8f1ca1aab6bd4349b75e4052cdbf78cb1bd9767.vbs"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Windows\System32\PING.EXE"C:\Windows\System32\PING.EXE" -n 1 -w 300 www.google.com.822357336680094.windows-display-service.com2⤵
- Runs ping.exe
PID:2412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --headless --disable-gpu --remote-debugging-port=9222 http://www.google.com.822357336680094.windows-display-service.com2⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3304 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9a3b89758,0x7ff9a3b89768,0x7ff9a3b897783⤵PID:5016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --headless --use-angle=swiftshader-webgl --headless --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1408 --field-trial-handle=1424,i,11846158445030458997,14210040548517459358,131072 --disable-features=PaintHolding /prefetch:23⤵PID:220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --use-angle=swiftshader-webgl --use-gl=angle --headless --mojo-platform-channel-handle=1708 --field-trial-handle=1424,i,11846158445030458997,14210040548517459358,131072 --disable-features=PaintHolding /prefetch:83⤵
- Drops file in Program Files directory
PID:2272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --headless --lang=en-US --first-renderer-process --remote-debugging-port=9222 --allow-pre-commit-input --disable-databases --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=4 --mojo-platform-channel-handle=1964 --field-trial-handle=1424,i,11846158445030458997,14210040548517459358,131072 --disable-features=PaintHolding /prefetch:13⤵PID:4372
-
-