Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
12/11/2023, 01:45
Static task
static1
Behavioral task
behavioral1
Sample
c84a4b4a093f6c8724fc665d5aeb2be5338ce2d2c5c0691b946c64f2e1c9ee40.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
c84a4b4a093f6c8724fc665d5aeb2be5338ce2d2c5c0691b946c64f2e1c9ee40.exe
Resource
win10v2004-20231020-en
General
-
Target
c84a4b4a093f6c8724fc665d5aeb2be5338ce2d2c5c0691b946c64f2e1c9ee40.exe
-
Size
1.1MB
-
MD5
8366bdd359e719935c0925b4bf5631cf
-
SHA1
34684eaf9c5d331ec3176cfdc6675f3d015044ba
-
SHA256
c84a4b4a093f6c8724fc665d5aeb2be5338ce2d2c5c0691b946c64f2e1c9ee40
-
SHA512
97541eca8d802017bfc57ee6459a401f4468bf3253814f2d344d067788154d3185364094c2714b9c99776fdc66e770d4addb7361d691243de701208a96c81b5b
-
SSDEEP
24576:gRW3N/0f/oAPoRBchI5anfOlAUAi1K6oElG4lBujFAvCyRS:g5ApamAUAQ/lG4lBmFAvZS
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation c84a4b4a093f6c8724fc665d5aeb2be5338ce2d2c5c0691b946c64f2e1c9ee40.exe Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation WScript.exe -
Deletes itself 1 IoCs
pid Process 4996 svchcst.exe -
Executes dropped EXE 3 IoCs
pid Process 4996 svchcst.exe 4324 svchcst.exe 4860 svchcst.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000_Classes\Local Settings c84a4b4a093f6c8724fc665d5aeb2be5338ce2d2c5c0691b946c64f2e1c9ee40.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1656 c84a4b4a093f6c8724fc665d5aeb2be5338ce2d2c5c0691b946c64f2e1c9ee40.exe 1656 c84a4b4a093f6c8724fc665d5aeb2be5338ce2d2c5c0691b946c64f2e1c9ee40.exe 1656 c84a4b4a093f6c8724fc665d5aeb2be5338ce2d2c5c0691b946c64f2e1c9ee40.exe 1656 c84a4b4a093f6c8724fc665d5aeb2be5338ce2d2c5c0691b946c64f2e1c9ee40.exe 1656 c84a4b4a093f6c8724fc665d5aeb2be5338ce2d2c5c0691b946c64f2e1c9ee40.exe 1656 c84a4b4a093f6c8724fc665d5aeb2be5338ce2d2c5c0691b946c64f2e1c9ee40.exe 4996 svchcst.exe 4996 svchcst.exe 4996 svchcst.exe 4996 svchcst.exe 4996 svchcst.exe 4996 svchcst.exe 4996 svchcst.exe 4996 svchcst.exe 4996 svchcst.exe 4996 svchcst.exe 4996 svchcst.exe 4996 svchcst.exe 4996 svchcst.exe 4996 svchcst.exe 4996 svchcst.exe 4996 svchcst.exe 4996 svchcst.exe 4996 svchcst.exe 4996 svchcst.exe 4996 svchcst.exe 4996 svchcst.exe 4996 svchcst.exe 4996 svchcst.exe 4996 svchcst.exe 4996 svchcst.exe 4996 svchcst.exe 4996 svchcst.exe 4996 svchcst.exe 4996 svchcst.exe 4996 svchcst.exe 4996 svchcst.exe 4996 svchcst.exe 4996 svchcst.exe 4996 svchcst.exe 4996 svchcst.exe 4996 svchcst.exe 4996 svchcst.exe 4996 svchcst.exe 4996 svchcst.exe 4996 svchcst.exe 4996 svchcst.exe 4996 svchcst.exe 4996 svchcst.exe 4996 svchcst.exe 4996 svchcst.exe 4996 svchcst.exe 4996 svchcst.exe 4996 svchcst.exe 4996 svchcst.exe 4996 svchcst.exe 4996 svchcst.exe 4996 svchcst.exe 4996 svchcst.exe 4996 svchcst.exe 4996 svchcst.exe 4996 svchcst.exe 4996 svchcst.exe 4996 svchcst.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1656 c84a4b4a093f6c8724fc665d5aeb2be5338ce2d2c5c0691b946c64f2e1c9ee40.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1656 c84a4b4a093f6c8724fc665d5aeb2be5338ce2d2c5c0691b946c64f2e1c9ee40.exe 1656 c84a4b4a093f6c8724fc665d5aeb2be5338ce2d2c5c0691b946c64f2e1c9ee40.exe 4996 svchcst.exe 4996 svchcst.exe 4324 svchcst.exe 4324 svchcst.exe 4860 svchcst.exe 4860 svchcst.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1656 wrote to memory of 1536 1656 c84a4b4a093f6c8724fc665d5aeb2be5338ce2d2c5c0691b946c64f2e1c9ee40.exe 89 PID 1656 wrote to memory of 1536 1656 c84a4b4a093f6c8724fc665d5aeb2be5338ce2d2c5c0691b946c64f2e1c9ee40.exe 89 PID 1656 wrote to memory of 1536 1656 c84a4b4a093f6c8724fc665d5aeb2be5338ce2d2c5c0691b946c64f2e1c9ee40.exe 89 PID 1656 wrote to memory of 1872 1656 c84a4b4a093f6c8724fc665d5aeb2be5338ce2d2c5c0691b946c64f2e1c9ee40.exe 90 PID 1656 wrote to memory of 1872 1656 c84a4b4a093f6c8724fc665d5aeb2be5338ce2d2c5c0691b946c64f2e1c9ee40.exe 90 PID 1656 wrote to memory of 1872 1656 c84a4b4a093f6c8724fc665d5aeb2be5338ce2d2c5c0691b946c64f2e1c9ee40.exe 90 PID 1656 wrote to memory of 4056 1656 c84a4b4a093f6c8724fc665d5aeb2be5338ce2d2c5c0691b946c64f2e1c9ee40.exe 91 PID 1656 wrote to memory of 4056 1656 c84a4b4a093f6c8724fc665d5aeb2be5338ce2d2c5c0691b946c64f2e1c9ee40.exe 91 PID 1656 wrote to memory of 4056 1656 c84a4b4a093f6c8724fc665d5aeb2be5338ce2d2c5c0691b946c64f2e1c9ee40.exe 91 PID 1872 wrote to memory of 4996 1872 WScript.exe 102 PID 1872 wrote to memory of 4996 1872 WScript.exe 102 PID 1872 wrote to memory of 4996 1872 WScript.exe 102 PID 4056 wrote to memory of 4324 4056 WScript.exe 103 PID 4056 wrote to memory of 4324 4056 WScript.exe 103 PID 4056 wrote to memory of 4324 4056 WScript.exe 103 PID 1536 wrote to memory of 4860 1536 WScript.exe 104 PID 1536 wrote to memory of 4860 1536 WScript.exe 104 PID 1536 wrote to memory of 4860 1536 WScript.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\c84a4b4a093f6c8724fc665d5aeb2be5338ce2d2c5c0691b946c64f2e1c9ee40.exe"C:\Users\Admin\AppData\Local\Temp\c84a4b4a093f6c8724fc665d5aeb2be5338ce2d2c5c0691b946c64f2e1c9ee40.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4860
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Deletes itself
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4996
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4324
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
753B
MD5edc1af53c38fb22a8027907db5649c3d
SHA14df3b96fb12a8efa17b025ff8876a5916f2f4194
SHA256afccf366c9cec7bc8f5c32323f8576a6daec9b41b1f6b9f7b9962d616bb4d0b1
SHA512aace1e9536aec2787d5dc13c34a27b6459f8b2621152fcbf1f27bea54e1864abc9dc84c2770f0306288d1e21b2e85d98826576e65d7c7cc048190b92bea38ef4
-
Filesize
753B
MD5edc1af53c38fb22a8027907db5649c3d
SHA14df3b96fb12a8efa17b025ff8876a5916f2f4194
SHA256afccf366c9cec7bc8f5c32323f8576a6daec9b41b1f6b9f7b9962d616bb4d0b1
SHA512aace1e9536aec2787d5dc13c34a27b6459f8b2621152fcbf1f27bea54e1864abc9dc84c2770f0306288d1e21b2e85d98826576e65d7c7cc048190b92bea38ef4
-
Filesize
1.1MB
MD5ee64ab4f00dedb4b81946d9f7ebe00b0
SHA166ea602f446d1c6384a4dfd4bbc03b7eb95e26af
SHA2567c12aec4eafcb2843a923d10d2b6b96349a12ef6733f97138f3286419836d2a2
SHA512f8adf67271a4aef8359c895f8524b5c824338f5adb8fdf7b83c4984c0c6909a2dfd239d64863ad5a89fdb837f81e5d7aebe69cfbefeb2c30e08ebaa539600e49
-
Filesize
1.1MB
MD5ee64ab4f00dedb4b81946d9f7ebe00b0
SHA166ea602f446d1c6384a4dfd4bbc03b7eb95e26af
SHA2567c12aec4eafcb2843a923d10d2b6b96349a12ef6733f97138f3286419836d2a2
SHA512f8adf67271a4aef8359c895f8524b5c824338f5adb8fdf7b83c4984c0c6909a2dfd239d64863ad5a89fdb837f81e5d7aebe69cfbefeb2c30e08ebaa539600e49
-
Filesize
1.1MB
MD5ee64ab4f00dedb4b81946d9f7ebe00b0
SHA166ea602f446d1c6384a4dfd4bbc03b7eb95e26af
SHA2567c12aec4eafcb2843a923d10d2b6b96349a12ef6733f97138f3286419836d2a2
SHA512f8adf67271a4aef8359c895f8524b5c824338f5adb8fdf7b83c4984c0c6909a2dfd239d64863ad5a89fdb837f81e5d7aebe69cfbefeb2c30e08ebaa539600e49
-
Filesize
1.1MB
MD5ee64ab4f00dedb4b81946d9f7ebe00b0
SHA166ea602f446d1c6384a4dfd4bbc03b7eb95e26af
SHA2567c12aec4eafcb2843a923d10d2b6b96349a12ef6733f97138f3286419836d2a2
SHA512f8adf67271a4aef8359c895f8524b5c824338f5adb8fdf7b83c4984c0c6909a2dfd239d64863ad5a89fdb837f81e5d7aebe69cfbefeb2c30e08ebaa539600e49