Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
155s -
max time network
168s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 02:34
Static task
static1
Behavioral task
behavioral1
Sample
24a49c42db23182b354a5672871d7656.js
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
24a49c42db23182b354a5672871d7656.js
Resource
win10v2004-20231215-en
General
-
Target
24a49c42db23182b354a5672871d7656.js
-
Size
16KB
-
MD5
24a49c42db23182b354a5672871d7656
-
SHA1
645a4265ec79be23b68720df010b825d405a1a64
-
SHA256
789e896d4629b24edcc81ea72ae6d7dca8469387665f376bfa342b4e9f06bf52
-
SHA512
38d82603b3e3fdf5e0d43a92e9155fd3e331d3a798cb14ec58ccd9379118ce53bdb1b6f1a65e8b6d7e0c41285a0d1476bcffcbac0abea384dba1ef894912466d
-
SSDEEP
384:b3eeQYggN0jQXGNNS/7puQORhTYrlvmIxaN+gszMpodvQ9NlB26:DVsTQXGufO/6vU/szM1vX26
Malware Config
Signatures
-
Blocklisted process makes network request 9 IoCs
flow pid Process 32 4604 wscript.exe 42 4604 wscript.exe 54 4604 wscript.exe 64 4604 wscript.exe 70 4604 wscript.exe 76 4604 wscript.exe 79 4604 wscript.exe 96 4604 wscript.exe 104 4604 wscript.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation wscript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\fvmVTYxeqb.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\fvmVTYxeqb.js wscript.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\B02N3ZE1UL = "\"C:\\Users\\Admin\\AppData\\Roaming\\fvmVTYxeqb.js\"" wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4604 wrote to memory of 3928 4604 wscript.exe 92 PID 4604 wrote to memory of 3928 4604 wscript.exe 92
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\24a49c42db23182b354a5672871d7656.js1⤵
- Blocklisted process makes network request
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\fvmVTYxeqb.js"2⤵
- Drops startup file
- Adds Run key to start application
PID:3928
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD52ba1970b35cbf6896dbdedb3e61eab35
SHA13a9a1d222950c40f16c89507c69287568344db68
SHA25636c4200b468fad9de5070cb4d457078ae7359d3a345c7dd07da6f2ef6a328837
SHA512e347ee9caccf4e83828c681918ae967f7f92a669a7e023a5017fe46af813164ba7701e4e605fb5db59e4577545d9a3896ae3c0bf8cc1807abcfcec8cd885ec0f