Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 08:31
Static task
static1
Behavioral task
behavioral1
Sample
137a79bb32e10321f3803bb74e98fd93.js
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
137a79bb32e10321f3803bb74e98fd93.js
Resource
win10v2004-20231215-en
General
-
Target
137a79bb32e10321f3803bb74e98fd93.js
-
Size
332KB
-
MD5
137a79bb32e10321f3803bb74e98fd93
-
SHA1
6d6f6567f58794b362f7c6837b8a082e0a9aea4d
-
SHA256
a9b5cf89510cfcc9b8ab7e311395540e1810f69f47ebf735134a04b376960ad0
-
SHA512
6594af60eba8b6645bdc77f0f1fb69ba4f71b8514e749641e08098f0249d3527bd9c62db00abf88b821179f8d9cf829dd556cfc64afdba1b8a7890d406c669b7
-
SSDEEP
6144:hjGBFq/NQhCpVrIIF2jGBFq/NQhCpVrIIF6:K/8N/88
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\Control Panel\International\Geo\Nation wscript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SKdxOqJGgU.js WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SKdxOqJGgU.js WScript.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 3632 icacls.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\0HKX5ALWLG = "\"C:\\Users\\Admin\\AppData\\Roaming\\SKdxOqJGgU.js\"" WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings wscript.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2400 wrote to memory of 4288 2400 wscript.exe 90 PID 2400 wrote to memory of 4288 2400 wscript.exe 90 PID 2400 wrote to memory of 3864 2400 wscript.exe 92 PID 2400 wrote to memory of 3864 2400 wscript.exe 92 PID 3864 wrote to memory of 3632 3864 javaw.exe 94 PID 3864 wrote to memory of 3632 3864 javaw.exe 94
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\137a79bb32e10321f3803bb74e98fd93.js1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\SKdxOqJGgU.js"2⤵
- Drops startup file
- Adds Run key to start application
PID:4288
-
-
C:\Program Files\Java\jre-1.8\bin\javaw.exe"C:\Program Files\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\scooxbax.txt"2⤵
- Suspicious use of WriteProcessMemory
PID:3864 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M3⤵
- Modifies file permissions
PID:3632
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD5a2c2acf83f50d54a60c217aa3a5f0c7b
SHA1868c03cb1d9f3d205c0bdc8a6b360f3a6dbdc6a7
SHA256460b3365dc4927d7c7b39698e85eb52fd3498e19df6da104312e490baeacfd7a
SHA51210a468a5f0ba2579830548ea129fcd8f8addd4581dc886fc0dfe14de939781fdae9432ee8e6effcec82d9d3c113471a847dca832eda6716dfdde63881e597dfb
-
Filesize
14KB
MD59a9a53136c9758629583522bfcca289f
SHA105a411594f466a9fffce9146dbd278b608ae1e46
SHA256e26dd03600eb13d42dc4248db99c7f5905c0f60dc85a16a7e0d382e5d52ac053
SHA512a73c60dce5351aa05d3b3e76afc66d50a78ed59ad5c1a46a65046a716d3057166cb88abea5fdedfce4a96e659d5b0540844fa834f826d933cddf6737beb5c7f2
-
Filesize
70KB
MD5cebb30928cec328617195c58c9ba8d88
SHA18b69f45ac6b92072bbb2c23e22804734aa8d2ecd
SHA2560fa24bbaf6e530ddc6822a7dfcbd2510249b5751abee9732990b80ea570f9840
SHA5125b4c013048c3b79e44e23c27c9f3e98eb9af6bd468585bc0fc67be8b04fc883fdc88361b267b6d5dbbf62fc4c028eef9fd52aaf2fcb8994eb3ef660c2aacd10d