Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    55s
  • max time network
    57s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/03/2024, 17:46

Errors

Reason
Machine shutdown

General

  • Target

    Your pc is hacked.vbs

  • Size

    1007B

  • MD5

    febb56298189dc506b75b1969349f424

  • SHA1

    848405f1fd01c5c9ec0305222c988c2e22c9ef64

  • SHA256

    a7ef2888a56f4f9b2c957b794998169df566dcc5610f675c54609b89ee31f98b

  • SHA512

    94829a7052c41d469dc240bdb0e91ded80f5c8a34789e4d276fb29e5a3f3ad608f77aa09f826bffd437a6e76eb1490108f847ac944741d5a366c7218fbc1d6a9

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Kills process with taskkill 1 IoCs
  • Modifies data under HKEY_USERS 15 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Your pc is hacked.vbs"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3544
    • C:\Windows\System32\notepad.exe
      "C:\Windows\System32\notepad.exe"
      2⤵
        PID:1012
      • C:\Windows\System32\taskkill.exe
        "C:\Windows\System32\taskkill.exe" /F /im notepad.exe
        2⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:4468
      • C:\Windows\System32\shutdown.exe
        "C:\Windows\System32\shutdown.exe" -s -t 30 -f -m \\
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:4816
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x538 0x530
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:3552
    • C:\Windows\system32\LogonUI.exe
      "LogonUI.exe" /flags:0x4 /state0:0xa390c055 /state1:0x41c64e6d
      1⤵
      • Modifies data under HKEY_USERS
      • Suspicious use of SetWindowsHookEx
      PID:3520

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Speech\Files\UserLexicons\SP_FCB69F1EFB9B4FBA8B0FABECC390D97B.dat

      Filesize

      940B

      MD5

      5b87673fc6150f85c94d58e04ef8e01a

      SHA1

      9e4750bbf4b0af5cc00086295403a9c2883c7228

      SHA256

      839c9761f85f9d99c04e474415a601277f600ccd1486bdf9ae6f03d66e483fde

      SHA512

      8a3cd766ee481abcd524d747fec0de8fd704448007eafa976d1e1c3786f1a0af11e0cc2da881edd74367d6ad0cfc2791c38fa919708647879fb3c7a28967f117