Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
296s -
max time network
311s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
22/04/2024, 17:05
Static task
static1
Behavioral task
behavioral1
Sample
IPTOOLKIT-main/IPTOOLKIT.bat
Resource
win10v2004-20240226-en
General
-
Target
IPTOOLKIT-main/IPTOOLKIT.bat
-
Size
4KB
-
MD5
0ce7a6b2c21f3f15472a20687662625e
-
SHA1
93d69bad32ba246f22ea02a5f5696c34aea292c0
-
SHA256
89fe592e5b40bdd0ff3850893f50d3e178efa6bfaeb7dc64fba4a7d3841327a2
-
SHA512
6d5ebcb5c38b2d56627daaf9b7f262bb95d1dc6871214c207c2daec3f95464f69e50ee70480c97cc4ce1e343a61b3f2c4d49c8b1fefa73ac8b81d20287aa9763
-
SSDEEP
96:krExshDl8df//RcjGgydEDUjZzDffL5oEr6nriXoUi:kreshDetJcjTqEDUjZzbfL5KriYUi
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 165 1880 WScript.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation cmd.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 164 ipinfo.io -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1144 5008 WerFault.exe 120 -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3808065738-1666277613-1125846146-1000\{BA247A65-83F5-4275-963C-6E2A5E1A59E0} msedge.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2444 PING.EXE -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 165 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4260 powershell.exe 4260 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4260 powershell.exe -
Suspicious use of WriteProcessMemory 35 IoCs
description pid Process procid_target PID 4820 wrote to memory of 3952 4820 cmd.exe 93 PID 4820 wrote to memory of 3952 4820 cmd.exe 93 PID 4820 wrote to memory of 4104 4820 cmd.exe 94 PID 4820 wrote to memory of 4104 4820 cmd.exe 94 PID 4820 wrote to memory of 4260 4820 cmd.exe 95 PID 4820 wrote to memory of 4260 4820 cmd.exe 95 PID 4820 wrote to memory of 1864 4820 cmd.exe 106 PID 4820 wrote to memory of 1864 4820 cmd.exe 106 PID 4820 wrote to memory of 4268 4820 cmd.exe 117 PID 4820 wrote to memory of 4268 4820 cmd.exe 117 PID 4268 wrote to memory of 2972 4268 cmd.exe 119 PID 4268 wrote to memory of 2972 4268 cmd.exe 119 PID 4268 wrote to memory of 5008 4268 cmd.exe 120 PID 4268 wrote to memory of 5008 4268 cmd.exe 120 PID 4268 wrote to memory of 5008 4268 cmd.exe 120 PID 4820 wrote to memory of 1880 4820 cmd.exe 123 PID 4820 wrote to memory of 1880 4820 cmd.exe 123 PID 4820 wrote to memory of 2444 4820 cmd.exe 124 PID 4820 wrote to memory of 2444 4820 cmd.exe 124 PID 4820 wrote to memory of 4380 4820 cmd.exe 125 PID 4820 wrote to memory of 4380 4820 cmd.exe 125 PID 4380 wrote to memory of 1700 4380 cmd.exe 126 PID 4380 wrote to memory of 1700 4380 cmd.exe 126 PID 4820 wrote to memory of 3232 4820 cmd.exe 127 PID 4820 wrote to memory of 3232 4820 cmd.exe 127 PID 3232 wrote to memory of 3104 3232 cmd.exe 128 PID 3232 wrote to memory of 3104 3232 cmd.exe 128 PID 3232 wrote to memory of 1120 3232 cmd.exe 129 PID 3232 wrote to memory of 1120 3232 cmd.exe 129 PID 4820 wrote to memory of 4612 4820 cmd.exe 130 PID 4820 wrote to memory of 4612 4820 cmd.exe 130 PID 4612 wrote to memory of 4324 4612 cmd.exe 131 PID 4612 wrote to memory of 4324 4612 cmd.exe 131 PID 4612 wrote to memory of 2388 4612 cmd.exe 132 PID 4612 wrote to memory of 2388 4612 cmd.exe 132
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\IPTOOLKIT-main\IPTOOLKIT.bat"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Windows\system32\mode.commode 75, 302⤵PID:3952
-
-
C:\Windows\system32\chcp.comchcp 650012⤵PID:4104
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell exit2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://hardstresser.com/2⤵PID:1864
-
-
C:\Windows\system32\cmd.execmd /c "mode 87, 10 && title Spoofing 123123123... && echo. && arpspoof.exe 123123123"2⤵
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Windows\system32\mode.commode 87, 103⤵PID:2972
-
-
C:\Users\Admin\AppData\Local\Temp\IPTOOLKIT-main\files\arpspoof.exearpspoof.exe 1231231233⤵PID:5008
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5008 -s 2764⤵
- Program crash
PID:1144
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\webclient.vbs"2⤵
- Blocklisted process makes network request
PID:1880
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 2 -w 10002⤵
- Runs ping.exe
PID:2444
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c findstr /i "," C:\Users\Admin\AppData\Local\Temp\response.txt2⤵
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Windows\system32\findstr.exefindstr /i "," C:\Users\Admin\AppData\Local\Temp\response.txt3⤵PID:1700
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c nslookup 53.10.167.172 | find "Name"2⤵
- Suspicious use of WriteProcessMemory
PID:3232 -
C:\Windows\system32\nslookup.exenslookup 53.10.167.1723⤵PID:3104
-
-
C:\Windows\system32\find.exefind "Name"3⤵PID:1120
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c nslookup google.com | find "Name"2⤵
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Windows\system32\nslookup.exenslookup google.com3⤵PID:4324
-
-
C:\Windows\system32\find.exefind "Name"3⤵PID:2388
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4080 --field-trial-handle=2328,i,5873823382323802923,13134441441264702821,262144 --variations-seed-version /prefetch:81⤵PID:2172
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=18 --mojo-platform-channel-handle=5668 --field-trial-handle=2328,i,5873823382323802923,13134441441264702821,262144 --variations-seed-version /prefetch:11⤵PID:680
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=19 --mojo-platform-channel-handle=3980 --field-trial-handle=2328,i,5873823382323802923,13134441441264702821,262144 --variations-seed-version /prefetch:11⤵PID:1976
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=5592 --field-trial-handle=2328,i,5873823382323802923,13134441441264702821,262144 --variations-seed-version /prefetch:81⤵PID:2252
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=21 --mojo-platform-channel-handle=5520 --field-trial-handle=2328,i,5873823382323802923,13134441441264702821,262144 --variations-seed-version /prefetch:11⤵PID:780
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=784 --field-trial-handle=2328,i,5873823382323802923,13134441441264702821,262144 --variations-seed-version /prefetch:81⤵PID:3380
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --mojo-platform-channel-handle=5824 --field-trial-handle=2328,i,5873823382323802923,13134441441264702821,262144 --variations-seed-version /prefetch:81⤵PID:3216
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=4792 --field-trial-handle=2328,i,5873823382323802923,13134441441264702821,262144 --variations-seed-version /prefetch:81⤵
- Modifies registry class
PID:876
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\f096c31dc24b4ffa9a06df7b2595d940 /t 4324 /p 38561⤵PID:2020
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 5008 -ip 50081⤵PID:4004
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
269B
MD5119f51264c1f12f2342d39ede961ad22
SHA1f1a94385c1c8db59e36631e399c6751530a6ad85
SHA2562b07555e3e107b8653c96910264c711c751bfa69e18550e998f89b021b7e083e
SHA51248ce66ea0a164b711315eb86f745f53ebae6931676960b1e3da936c4aed0daca6cb68120312a04cd261099b2a97ef84741e16ac1a7c094072dca78e1bfed183d
-
Filesize
552B
MD5ca7fb865eaa381eda9a18adb23ff2355
SHA1a321e8314811a5b43080e6787aed8753f7f8f1dc
SHA256c78ab830f8e3454b5082ba5271a56177341fe965ef7fbce8d7285ca596fdc73c
SHA512365511f969570a7a2b295c24442fe4343b67988cf21c6e073f263d1b9424b9f10f7b19d512eab45e312c4273ef8e99d358774c74c18e138a22dee29d7f05a9db