Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
55s -
max time network
57s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09/03/2024, 17:46
Static task
static1
Behavioral task
behavioral1
Sample
Your pc is hacked.vbs
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Your pc is hacked.vbs
Resource
win10v2004-20240226-en
Errors
General
-
Target
Your pc is hacked.vbs
-
Size
1007B
-
MD5
febb56298189dc506b75b1969349f424
-
SHA1
848405f1fd01c5c9ec0305222c988c2e22c9ef64
-
SHA256
a7ef2888a56f4f9b2c957b794998169df566dcc5610f675c54609b89ee31f98b
-
SHA512
94829a7052c41d469dc240bdb0e91ded80f5c8a34789e4d276fb29e5a3f3ad608f77aa09f826bffd437a6e76eb1490108f847ac944741d5a366c7218fbc1d6a9
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 1 IoCs
pid Process 4468 taskkill.exe -
Modifies data under HKEY_USERS 15 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "125" LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: 33 3552 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3552 AUDIODG.EXE Token: SeDebugPrivilege 4468 taskkill.exe Token: SeShutdownPrivilege 4816 shutdown.exe Token: SeRemoteShutdownPrivilege 4816 shutdown.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3520 LogonUI.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3544 wrote to memory of 1012 3544 WScript.exe 97 PID 3544 wrote to memory of 1012 3544 WScript.exe 97 PID 3544 wrote to memory of 4468 3544 WScript.exe 99 PID 3544 wrote to memory of 4468 3544 WScript.exe 99 PID 3544 wrote to memory of 4816 3544 WScript.exe 102 PID 3544 wrote to memory of 4816 3544 WScript.exe 102
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Your pc is hacked.vbs"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3544 -
C:\Windows\System32\notepad.exe"C:\Windows\System32\notepad.exe"2⤵PID:1012
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /F /im notepad.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4468
-
-
C:\Windows\System32\shutdown.exe"C:\Windows\System32\shutdown.exe" -s -t 30 -f -m \\2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4816
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x538 0x5301⤵
- Suspicious use of AdjustPrivilegeToken
PID:3552
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa390c055 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:3520
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Speech\Files\UserLexicons\SP_FCB69F1EFB9B4FBA8B0FABECC390D97B.dat
Filesize940B
MD55b87673fc6150f85c94d58e04ef8e01a
SHA19e4750bbf4b0af5cc00086295403a9c2883c7228
SHA256839c9761f85f9d99c04e474415a601277f600ccd1486bdf9ae6f03d66e483fde
SHA5128a3cd766ee481abcd524d747fec0de8fd704448007eafa976d1e1c3786f1a0af11e0cc2da881edd74367d6ad0cfc2791c38fa919708647879fb3c7a28967f117