Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
18/09/2023, 08:35
Static task
static1
Behavioral task
behavioral1
Sample
f81fc9932396dc9a4ebe06e2841986e235880178375a55f8e2202454646c0d05.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
f81fc9932396dc9a4ebe06e2841986e235880178375a55f8e2202454646c0d05.exe
Resource
win10v2004-20230915-en
General
-
Target
f81fc9932396dc9a4ebe06e2841986e235880178375a55f8e2202454646c0d05.exe
-
Size
1.1MB
-
MD5
33be0eddd39568cdf56604347bcc7c86
-
SHA1
13360cd482e89e8bd26acad2c52658c9c0d5cc66
-
SHA256
f81fc9932396dc9a4ebe06e2841986e235880178375a55f8e2202454646c0d05
-
SHA512
f36bcccbb8cac492174e3afe7b4e6ddb95e33ecc20e394bd4b12d45485ac4a55fb2fdbafafc599679ee7446cb51f9f4d455f7c24f8e840cbb65e9b5305696661
-
SSDEEP
24576:CH0dl8myX9Bg42QoXFkrzkmmlSgRDko0lG4Z8r7Qfbkiu5Qg:CcaClSFlG4ZM7QzMH
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\Control Panel\International\Geo\Nation f81fc9932396dc9a4ebe06e2841986e235880178375a55f8e2202454646c0d05.exe Key value queried \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\Control Panel\International\Geo\Nation WScript.exe -
Executes dropped EXE 3 IoCs
pid Process 3264 svchcst.exe 3948 svchcst.exe 1308 svchcst.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000_Classes\Local Settings f81fc9932396dc9a4ebe06e2841986e235880178375a55f8e2202454646c0d05.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4604 f81fc9932396dc9a4ebe06e2841986e235880178375a55f8e2202454646c0d05.exe 4604 f81fc9932396dc9a4ebe06e2841986e235880178375a55f8e2202454646c0d05.exe 4604 f81fc9932396dc9a4ebe06e2841986e235880178375a55f8e2202454646c0d05.exe 4604 f81fc9932396dc9a4ebe06e2841986e235880178375a55f8e2202454646c0d05.exe 4604 f81fc9932396dc9a4ebe06e2841986e235880178375a55f8e2202454646c0d05.exe 4604 f81fc9932396dc9a4ebe06e2841986e235880178375a55f8e2202454646c0d05.exe 3264 svchcst.exe 3264 svchcst.exe 3264 svchcst.exe 3264 svchcst.exe 3264 svchcst.exe 3264 svchcst.exe 3264 svchcst.exe 3264 svchcst.exe 3264 svchcst.exe 3264 svchcst.exe 3264 svchcst.exe 3264 svchcst.exe 3264 svchcst.exe 3264 svchcst.exe 3264 svchcst.exe 3264 svchcst.exe 3264 svchcst.exe 3264 svchcst.exe 3264 svchcst.exe 3264 svchcst.exe 3264 svchcst.exe 3264 svchcst.exe 3264 svchcst.exe 3264 svchcst.exe 3264 svchcst.exe 3264 svchcst.exe 3264 svchcst.exe 3264 svchcst.exe 3264 svchcst.exe 3264 svchcst.exe 3264 svchcst.exe 3264 svchcst.exe 3264 svchcst.exe 3264 svchcst.exe 3264 svchcst.exe 3264 svchcst.exe 3264 svchcst.exe 3264 svchcst.exe 3264 svchcst.exe 3264 svchcst.exe 3264 svchcst.exe 3264 svchcst.exe 3264 svchcst.exe 3264 svchcst.exe 3264 svchcst.exe 3264 svchcst.exe 3264 svchcst.exe 3264 svchcst.exe 3264 svchcst.exe 3264 svchcst.exe 3264 svchcst.exe 3264 svchcst.exe 3264 svchcst.exe 3264 svchcst.exe 3264 svchcst.exe 3264 svchcst.exe 3264 svchcst.exe 3264 svchcst.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4604 f81fc9932396dc9a4ebe06e2841986e235880178375a55f8e2202454646c0d05.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 4604 f81fc9932396dc9a4ebe06e2841986e235880178375a55f8e2202454646c0d05.exe 4604 f81fc9932396dc9a4ebe06e2841986e235880178375a55f8e2202454646c0d05.exe 3948 svchcst.exe 3264 svchcst.exe 3264 svchcst.exe 3948 svchcst.exe 1308 svchcst.exe 1308 svchcst.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4604 wrote to memory of 2056 4604 f81fc9932396dc9a4ebe06e2841986e235880178375a55f8e2202454646c0d05.exe 86 PID 4604 wrote to memory of 2056 4604 f81fc9932396dc9a4ebe06e2841986e235880178375a55f8e2202454646c0d05.exe 86 PID 4604 wrote to memory of 2056 4604 f81fc9932396dc9a4ebe06e2841986e235880178375a55f8e2202454646c0d05.exe 86 PID 4604 wrote to memory of 1860 4604 f81fc9932396dc9a4ebe06e2841986e235880178375a55f8e2202454646c0d05.exe 87 PID 4604 wrote to memory of 1860 4604 f81fc9932396dc9a4ebe06e2841986e235880178375a55f8e2202454646c0d05.exe 87 PID 4604 wrote to memory of 1860 4604 f81fc9932396dc9a4ebe06e2841986e235880178375a55f8e2202454646c0d05.exe 87 PID 4604 wrote to memory of 4376 4604 f81fc9932396dc9a4ebe06e2841986e235880178375a55f8e2202454646c0d05.exe 88 PID 4604 wrote to memory of 4376 4604 f81fc9932396dc9a4ebe06e2841986e235880178375a55f8e2202454646c0d05.exe 88 PID 4604 wrote to memory of 4376 4604 f81fc9932396dc9a4ebe06e2841986e235880178375a55f8e2202454646c0d05.exe 88 PID 2056 wrote to memory of 3264 2056 WScript.exe 93 PID 2056 wrote to memory of 3264 2056 WScript.exe 93 PID 2056 wrote to memory of 3264 2056 WScript.exe 93 PID 4376 wrote to memory of 3948 4376 WScript.exe 92 PID 4376 wrote to memory of 3948 4376 WScript.exe 92 PID 4376 wrote to memory of 3948 4376 WScript.exe 92 PID 1860 wrote to memory of 1308 1860 WScript.exe 94 PID 1860 wrote to memory of 1308 1860 WScript.exe 94 PID 1860 wrote to memory of 1308 1860 WScript.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\f81fc9932396dc9a4ebe06e2841986e235880178375a55f8e2202454646c0d05.exe"C:\Users\Admin\AppData\Local\Temp\f81fc9932396dc9a4ebe06e2841986e235880178375a55f8e2202454646c0d05.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3264
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1308
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3948
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
753B
MD548a722a43674f675637a58771d026a7f
SHA17045ac06fac83c49bc8dd8e9e9de6b4d82d892c0
SHA256e30846ec9927e964ee072a031f625db4fae90222c230f118f4091e40e204e9f6
SHA512bdb27d536cbc5ea7d69cb40e08784d055ac5201749cd414a1848ab05f2639c719f8825023c6e14f00e7234619cd7faf8cf82329baf462df180b0af6a48b0b1ce
-
Filesize
753B
MD548a722a43674f675637a58771d026a7f
SHA17045ac06fac83c49bc8dd8e9e9de6b4d82d892c0
SHA256e30846ec9927e964ee072a031f625db4fae90222c230f118f4091e40e204e9f6
SHA512bdb27d536cbc5ea7d69cb40e08784d055ac5201749cd414a1848ab05f2639c719f8825023c6e14f00e7234619cd7faf8cf82329baf462df180b0af6a48b0b1ce
-
Filesize
1.1MB
MD5aa34ffa7152b96fcef9d876b28facc91
SHA1a6995d736b022470b341825dba3c109a2af58683
SHA2568526c9c0351ec500447815c890c8bf29a773283aad09854af631b89db3e41ca9
SHA5125fef8ff35e5b58eb91b1ee5b5307e6baef23e9c3e39a1638217bc32c0ecb4a002a09f1d8feb335572b75160006e505c383776e0862d3cf4592757e99b5a0f278
-
Filesize
1.1MB
MD5aa34ffa7152b96fcef9d876b28facc91
SHA1a6995d736b022470b341825dba3c109a2af58683
SHA2568526c9c0351ec500447815c890c8bf29a773283aad09854af631b89db3e41ca9
SHA5125fef8ff35e5b58eb91b1ee5b5307e6baef23e9c3e39a1638217bc32c0ecb4a002a09f1d8feb335572b75160006e505c383776e0862d3cf4592757e99b5a0f278
-
Filesize
1.1MB
MD5aa34ffa7152b96fcef9d876b28facc91
SHA1a6995d736b022470b341825dba3c109a2af58683
SHA2568526c9c0351ec500447815c890c8bf29a773283aad09854af631b89db3e41ca9
SHA5125fef8ff35e5b58eb91b1ee5b5307e6baef23e9c3e39a1638217bc32c0ecb4a002a09f1d8feb335572b75160006e505c383776e0862d3cf4592757e99b5a0f278
-
Filesize
1.1MB
MD5aa34ffa7152b96fcef9d876b28facc91
SHA1a6995d736b022470b341825dba3c109a2af58683
SHA2568526c9c0351ec500447815c890c8bf29a773283aad09854af631b89db3e41ca9
SHA5125fef8ff35e5b58eb91b1ee5b5307e6baef23e9c3e39a1638217bc32c0ecb4a002a09f1d8feb335572b75160006e505c383776e0862d3cf4592757e99b5a0f278