Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22/12/2023, 12:54
Static task
static1
Behavioral task
behavioral1
Sample
9154158d95df39303de36b475a790529.js
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9154158d95df39303de36b475a790529.js
Resource
win10v2004-20231215-en
General
-
Target
9154158d95df39303de36b475a790529.js
-
Size
207KB
-
MD5
9154158d95df39303de36b475a790529
-
SHA1
b79ad43d110887b9302bbfca092517a1fb0f43f3
-
SHA256
ce8e23a1309e4fbe54a48d36c5c68af97df72073acce4a930df3246a34a75f32
-
SHA512
de36f4d45c7b03f8cb70498bfd7a9285303814eb20a9a7f09a7855db6daacf817e4e6a0f63f6e63dd46b8bff7d4704155daa4fb2e9ca5a4902957dead3ee7a82
-
SSDEEP
6144:Fsz4hHiD3tMMqaMqKg+CJpjEwIjzHAOweb:FfimpXUJpa3r
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation wscript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WOChiHyFPM.js WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WOChiHyFPM.js WScript.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 4916 icacls.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SEJOKAOI5S = "\"C:\\Users\\Admin\\AppData\\Roaming\\WOChiHyFPM.js\"" WScript.exe -
Drops file in Program Files directory 12 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jre-1.8\bin\server\dll\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\dll\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\symbols\dll\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\symbols\dll\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\dll\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\symbols\dll\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\dll\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\symbols\dll\jvm.pdb javaw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000_Classes\Local Settings wscript.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1924 wrote to memory of 940 1924 wscript.exe 91 PID 1924 wrote to memory of 940 1924 wscript.exe 91 PID 1924 wrote to memory of 2608 1924 wscript.exe 92 PID 1924 wrote to memory of 2608 1924 wscript.exe 92 PID 2608 wrote to memory of 4916 2608 javaw.exe 94 PID 2608 wrote to memory of 4916 2608 javaw.exe 94
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\9154158d95df39303de36b475a790529.js1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\WOChiHyFPM.js"2⤵
- Drops startup file
- Adds Run key to start application
PID:940
-
-
C:\Program Files\Java\jre-1.8\bin\javaw.exe"C:\Program Files\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\ypoxbwojq.txt"2⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M3⤵
- Modifies file permissions
PID:4916
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD555644bb2e65b1ea504fc4eeb028b83e1
SHA1226cc4d5f8843f29f00a727d48559e1ca47afc07
SHA2566cb261b10133750f5a02dccf5ae96c3d50fae9ad3b62e8d80f4adbf70d4969ee
SHA512085c7d12c25f6c95963ee54283b0f6240530b4f0b8223b418e3384c2883c5dce7013e5e4c32231cace4937d1e8a54252b3e7a06e106512363287e73e92777392
-
Filesize
10KB
MD55f1405a47e8cf0bc0188332a4a791761
SHA1638fe4be43f13d79266be5ee35b7879fdeafc71a
SHA256d9d12a49414db2909da558bed4013e0987fe61140f3c4e17501800ac32d422f7
SHA512d2e722dea389123c24534bc661352a7bf42188b47428bb24f1507db4b68f0d47e49b3f95d8cab3f7d5470aa31f51fa72be5d63a4560e785d04860d2a5bd54313
-
Filesize
92KB
MD52e458a59025b390fbdf7d3717314b507
SHA1d5a84f501bfa81682ebde5e31a68794140141785
SHA2566b723bd260b53c68c716ef218c78718d3e99ab4d4238a4bd823fd0cd6ec8007b
SHA5122b463bc4ef98264560abad47053549c463fc9ee098c97cd60d58c959ba67f4ddf2ca60856f6564802a9f056740fbedbb6bdc829388c136c13b334563465d1f22