Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
6s -
max time network
7s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
28/04/2024, 11:10
Static task
static1
Behavioral task
behavioral1
Sample
code.vbs
Resource
win7-20240220-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
code.vbs
Resource
win10v2004-20240419-en
5 signatures
150 seconds
General
-
Target
code.vbs
-
Size
190B
-
MD5
3328b723936164875d2b87956c3bc0ed
-
SHA1
de856b5fc8fa8f2dc4df03b59029c76b4b3a3222
-
SHA256
c4ded1df8209bf46e95a12590163769a2a26780cd322064ed1ed37eeae425288
-
SHA512
fb72494eb0c5cb4bffffeb767c838e74e644683d70f63cca9e995d6136a45e30ab521038304b8c637ff9fa7d18153c937c4980d635c62b6e868bb0847ae411a3
Score
7/10
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 2 IoCs
pid Process 3092 taskkill.exe 2308 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3092 taskkill.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1548 wrote to memory of 3092 1548 WScript.exe 86 PID 1548 wrote to memory of 3092 1548 WScript.exe 86 PID 1548 wrote to memory of 1572 1548 WScript.exe 88 PID 1548 wrote to memory of 1572 1548 WScript.exe 88 PID 1548 wrote to memory of 1884 1548 WScript.exe 90 PID 1548 wrote to memory of 1884 1548 WScript.exe 90 PID 1548 wrote to memory of 2336 1548 WScript.exe 91 PID 1548 wrote to memory of 2336 1548 WScript.exe 91 PID 1548 wrote to memory of 4060 1548 WScript.exe 94 PID 1548 wrote to memory of 4060 1548 WScript.exe 94 PID 1548 wrote to memory of 5056 1548 WScript.exe 96 PID 1548 wrote to memory of 5056 1548 WScript.exe 96 PID 1548 wrote to memory of 3296 1548 WScript.exe 98 PID 1548 wrote to memory of 3296 1548 WScript.exe 98 PID 1548 wrote to memory of 3868 1548 WScript.exe 100 PID 1548 wrote to memory of 3868 1548 WScript.exe 100 PID 1548 wrote to memory of 4688 1548 WScript.exe 103 PID 1548 wrote to memory of 4688 1548 WScript.exe 103 PID 1548 wrote to memory of 1068 1548 WScript.exe 105 PID 1548 wrote to memory of 1068 1548 WScript.exe 105 PID 1548 wrote to memory of 2596 1548 WScript.exe 107 PID 1548 wrote to memory of 2596 1548 WScript.exe 107 PID 1548 wrote to memory of 2152 1548 WScript.exe 109 PID 1548 wrote to memory of 2152 1548 WScript.exe 109 PID 1548 wrote to memory of 2508 1548 WScript.exe 111 PID 1548 wrote to memory of 2508 1548 WScript.exe 111 PID 1548 wrote to memory of 4072 1548 WScript.exe 116 PID 1548 wrote to memory of 4072 1548 WScript.exe 116
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\code.vbs"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /f /im explorer.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3092
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:1572
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:1884
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:2336
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:4060
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:5056
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:3296
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:3868
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:4688
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:1068
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:2596
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:2152
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:2508
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:4072
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:3132
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:1772
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:4972
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:3268
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:5068
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:376
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:2504
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /f /im svchost.exe2⤵
- Kills process with taskkill
PID:2308
-