Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
128s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
25/11/2023, 09:51
Static task
static1
Behavioral task
behavioral1
Sample
9cc94cedd85793b3be9cb808dfd7e326ba1386b0bae08fee1519c1df8ea40d26.js
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
9cc94cedd85793b3be9cb808dfd7e326ba1386b0bae08fee1519c1df8ea40d26.js
Resource
win10v2004-20231023-en
General
-
Target
9cc94cedd85793b3be9cb808dfd7e326ba1386b0bae08fee1519c1df8ea40d26.js
-
Size
4KB
-
MD5
6ec662cb2923bc72fbbfbce78331109a
-
SHA1
fe3d25c1d4164161c4075122b6f99de415da6430
-
SHA256
9cc94cedd85793b3be9cb808dfd7e326ba1386b0bae08fee1519c1df8ea40d26
-
SHA512
4e6476aa0442d2533a4a44d3c0bbabc106d72e5266a4e5f5d8bbe4cf36e71506e5474e84017c8d862041927b99c2af14090fc975ec8502cfecd6844f0a441241
-
SSDEEP
96:l8rOmAMUpSH9hDks9gUQSOv0oKzPqHz8qZ/2EsL/eekJyK:2r8MUwHHDPgUJOJzRt4LGzJyK
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 6 2568 wscript.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1114462139-3090196418-29517368-1000\Control Panel\International\Geo\Nation wscript.exe -
Executes dropped EXE 1 IoCs
pid Process 1528 fmsign.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2568 wrote to memory of 1528 2568 wscript.exe 90 PID 2568 wrote to memory of 1528 2568 wscript.exe 90 PID 2568 wrote to memory of 1528 2568 wscript.exe 90
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\9cc94cedd85793b3be9cb808dfd7e326ba1386b0bae08fee1519c1df8ea40d26.js1⤵
- Blocklisted process makes network request
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\Temp\fmsign.exe"C:\Windows\Temp\fmsign.exe"2⤵
- Executes dropped EXE
PID:1528
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5bf6f221b0588d21e73f2095cc4eedaf2
SHA1171694b0fe53de3d2a799cb8822560b58309f20c
SHA256397584eda8f01bf29d148fcc38c1481e81c44a9e6fa45c95c041a7662c037157
SHA5124300762b097e4487d9a3f6fa0edd082e7397989302b3b226e9b8a166695b2269b9fe6514693f944e84ab0dc2fe735827ce1e3bf97529b9e734a239baaec5d939
-
Filesize
1.1MB
MD5bf6f221b0588d21e73f2095cc4eedaf2
SHA1171694b0fe53de3d2a799cb8822560b58309f20c
SHA256397584eda8f01bf29d148fcc38c1481e81c44a9e6fa45c95c041a7662c037157
SHA5124300762b097e4487d9a3f6fa0edd082e7397989302b3b226e9b8a166695b2269b9fe6514693f944e84ab0dc2fe735827ce1e3bf97529b9e734a239baaec5d939
-
Filesize
1.1MB
MD5bf6f221b0588d21e73f2095cc4eedaf2
SHA1171694b0fe53de3d2a799cb8822560b58309f20c
SHA256397584eda8f01bf29d148fcc38c1481e81c44a9e6fa45c95c041a7662c037157
SHA5124300762b097e4487d9a3f6fa0edd082e7397989302b3b226e9b8a166695b2269b9fe6514693f944e84ab0dc2fe735827ce1e3bf97529b9e734a239baaec5d939