Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    29s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/12/2023, 01:47

General

  • Target

    234bf13ed07d0a10a651a1c37c0a367f.exe

  • Size

    430KB

  • MD5

    234bf13ed07d0a10a651a1c37c0a367f

  • SHA1

    350a64e34ece1da83a360bf3f0d91497478c0d97

  • SHA256

    78b501509d17af404f51089714d6b064d2e0cee0b2904a190ce3a6db359aceab

  • SHA512

    5009fbd2d4e17eb276ea5c35d6793d9e5b603e4cbecd48c83947c95e3a53289d26aab0b4e6647be9e4b145baf4e75ce6aa6af5773bce731a767e3edb1df8f591

  • SSDEEP

    12288:ibee0PGl89WazvzkmMxM+ltxQMAn0Iv1b70ZSf2/:2edGBazvZMHltxtIv1bUS+/

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\234bf13ed07d0a10a651a1c37c0a367f.exe
    "C:\Users\Admin\AppData\Local\Temp\234bf13ed07d0a10a651a1c37c0a367f.exe"
    1⤵
    • Checks computer location settings
    • Drops startup file
    • Adds Run key to start application
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious behavior: RenamesItself
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2680
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS1.vbs"
      2⤵
        PID:4908
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS1.vbs"
        2⤵
          PID:3868
        • C:\Windows\SysWOW64\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS1.vbs"
          2⤵
            PID:2788
          • C:\Windows\SysWOW64\WScript.exe
            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS1.vbs"
            2⤵
              PID:3704
            • C:\Windows\SysWOW64\WScript.exe
              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS1.vbs"
              2⤵
                PID:2888
              • C:\Windows\SysWOW64\WScript.exe
                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS1.vbs"
                2⤵
                  PID:4008

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Roaming\Microsoft\VBS1.vbs

                Filesize

                653B

                MD5

                6a8d17e84294466a95c85c114f0ab3e3

                SHA1

                e8a3b15f2b25c0b8b47cc06686e99fe43e67b728

                SHA256

                51e394223c13ed3a480608d380043f91e5df94e53049c8b993e595caf16d6181

                SHA512

                7ca86c5ac9f50ac834b174c465f861b5152f3a93544df48607db09dae67b2d977be649d1b8e307b34bd96c0e3de97efecff64003485d16e73f8cca2b2fb212ba

              • memory/2680-0-0x0000000000400000-0x0000000000575000-memory.dmp

                Filesize

                1.5MB

              • memory/2680-1-0x0000000000400000-0x0000000000575000-memory.dmp

                Filesize

                1.5MB

              • memory/2680-22-0x0000000000400000-0x0000000000575000-memory.dmp

                Filesize

                1.5MB