Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
90s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
02/02/2024, 22:13
Static task
static1
Behavioral task
behavioral1
Sample
a25ef143ea779565740ae42676a034135d13218bb08dd8e0bba5622fcfbc548e.vbs
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
a25ef143ea779565740ae42676a034135d13218bb08dd8e0bba5622fcfbc548e.vbs
Resource
win10v2004-20231215-en
General
-
Target
a25ef143ea779565740ae42676a034135d13218bb08dd8e0bba5622fcfbc548e.vbs
-
Size
2KB
-
MD5
2739364af8db075cbbe82f9161fb5d8b
-
SHA1
bbf1a630746de540b8fad0ab858a9d205c3152f9
-
SHA256
a25ef143ea779565740ae42676a034135d13218bb08dd8e0bba5622fcfbc548e
-
SHA512
a13008edf830e08889c3b49591514c8e1057106b2ca555cb2e72fbbc74b7e7e74e5c805d8511ebac117b75b2f20944ff5a0fee498429df6613eab4c786729380
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Control Panel\International\Geo\Nation WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4292 wrote to memory of 4996 4292 WScript.exe 40 PID 4292 wrote to memory of 4996 4292 WScript.exe 40 PID 4292 wrote to memory of 3460 4292 WScript.exe 38 PID 4292 wrote to memory of 3460 4292 WScript.exe 38 PID 4996 wrote to memory of 3224 4996 cmd.exe 36 PID 4996 wrote to memory of 3224 4996 cmd.exe 36 PID 4996 wrote to memory of 2168 4996 cmd.exe 35 PID 4996 wrote to memory of 2168 4996 cmd.exe 35 PID 3460 wrote to memory of 3288 3460 cmd.exe 34 PID 3460 wrote to memory of 3288 3460 cmd.exe 34 PID 3460 wrote to memory of 908 3460 cmd.exe 33 PID 3460 wrote to memory of 908 3460 cmd.exe 33
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\a25ef143ea779565740ae42676a034135d13218bb08dd8e0bba5622fcfbc548e.vbs"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4292 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c echo Y| cacls "C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Internat Explorer.html" /P Everyone:R2⤵
- Suspicious use of WriteProcessMemory
PID:3460
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c echo Y| cacls "C:\Users\Admin\Desktop\Internat Explorer.html" /P Everyone:R2⤵
- Suspicious use of WriteProcessMemory
PID:4996
-
-
C:\Windows\system32\cacls.execacls "C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Internat Explorer.html" /P Everyone:R1⤵PID:908
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"1⤵PID:3288
-
C:\Windows\system32\cacls.execacls "C:\Users\Admin\Desktop\Internat Explorer.html" /P Everyone:R1⤵PID:2168
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"1⤵PID:3224
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
147B
MD516e5d16a1ad6b9f68adad2836694b730
SHA196a30a1dd3cfe79f602f7b3baf6943773b688172
SHA25625101505aacfa314773673d4adfaef69b10cec59a2ac521880401b802076a4a4
SHA512c68f5c523fd7b0d20d6093efc39975aec5250b0a3a5663a083ffe272e4797a275daa27f4179f76e83549f2f1207d8ff90d00ec1b86606f5ccc57c94ec1ff2c96