Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
02/02/2024, 05:04
Static task
static1
Behavioral task
behavioral1
Sample
VirusShare-00f4688d22a38d97636ccacd12a6d809.vbs
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
VirusShare-00f4688d22a38d97636ccacd12a6d809.vbs
Resource
win10v2004-20231215-en
General
-
Target
VirusShare-00f4688d22a38d97636ccacd12a6d809.vbs
-
Size
47KB
-
MD5
00f4688d22a38d97636ccacd12a6d809
-
SHA1
7258d29991e94da7f53793aee6329c7853a0ce65
-
SHA256
2f478d678b9bfffd8217ad54345c27df346fa6bf28177ae0e0c7a37417284f4a
-
SHA512
ce87e9eda378d4197d0ac4408f68c7f8c3c03d7ab171bd00536bcbff968e9d71db2083ea97a870aaadb16b42ca63b67099ef08ff1e911e555b5ecb4943eb24c2
-
SSDEEP
768:Zk2vAJST7mMDtX+Mj58NPcBo3nK1rbLUAECAPlcnZlQ7:C+Oga0XZji6Bo3nsrfU4APlqE
Malware Config
Signatures
-
resource yara_rule behavioral2/files/0x0006000000023133-4.dat aspack_v212_v242 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation WScript.exe -
Executes dropped EXE 2 IoCs
pid Process 3088 rsmss.exe 60 rsmss.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ctfmon = "wscript.exe C:\\Windows\\dnet32.vbs %" WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vsmon = "C:\\Windows\\System32\\rsmss.exe" WScript.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\System32\rsmss.exe WScript.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\dnet32.vbs WScript.exe File opened for modification C:\Windows\dnet32.vbs WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4792 wrote to memory of 3088 4792 WScript.exe 84 PID 4792 wrote to memory of 3088 4792 WScript.exe 84 PID 4792 wrote to memory of 3088 4792 WScript.exe 84
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\VirusShare-00f4688d22a38d97636ccacd12a6d809.vbs"1⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Windows\System32\rsmss.exe"C:\Windows\System32\rsmss.exe"2⤵
- Executes dropped EXE
PID:3088
-
-
C:\Windows\System32\rsmss.exe"C:\Windows\System32\rsmss.exe"1⤵
- Executes dropped EXE
PID:60
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD555ec72ba6e45435c2893460dbdbc0f2b
SHA1ba2d3fe8fd36f3575b8be1a48c5857598908ee6e
SHA256b9896e1f9ee819c3e4e2b1b8898fa96b65fbff2b6dc5c26a6aa8791a67386b01
SHA512ac8791969dd9ebcc018f9ee6a275686018becc6a39a05e570fd2b867d66621fe306f014f0f9c7bebfb1b6cf6c5a67665fe18eef9ac55c2e89731709315e2bf73