Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
12/05/2024, 20:14
Static task
static1
Behavioral task
behavioral1
Sample
1ea428efc4ed247035bd60c3c89990862e59bfe06ff85293218856675f8c5650.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
1ea428efc4ed247035bd60c3c89990862e59bfe06ff85293218856675f8c5650.exe
Resource
win10v2004-20240508-en
General
-
Target
1ea428efc4ed247035bd60c3c89990862e59bfe06ff85293218856675f8c5650.exe
-
Size
1.1MB
-
MD5
ffbf739ca37b3b5b8ac99e862022f732
-
SHA1
c8fdf6104b78e8648f35b38fac06553b48a61f02
-
SHA256
1ea428efc4ed247035bd60c3c89990862e59bfe06ff85293218856675f8c5650
-
SHA512
e1a6bb925f6ce60257cd6449a0c97c5aabac42b5c82d8149a00764e2cee5d87ae3f636cea0fea0d872757868f72dfd0a4443b6d8e42266ff236c17c2c5fee6ee
-
SSDEEP
24576:CH0dl8myX9Bg42QoXFkrzkmmlSgRDko0lG4Z8r7Qfbkiu5QI:CcaClSFlG4ZM7QzMv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation 1ea428efc4ed247035bd60c3c89990862e59bfe06ff85293218856675f8c5650.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation WScript.exe -
Deletes itself 1 IoCs
pid Process 876 svchcst.exe -
Executes dropped EXE 2 IoCs
pid Process 876 svchcst.exe 1748 svchcst.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe Key created \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000_Classes\Local Settings 1ea428efc4ed247035bd60c3c89990862e59bfe06ff85293218856675f8c5650.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4776 1ea428efc4ed247035bd60c3c89990862e59bfe06ff85293218856675f8c5650.exe 4776 1ea428efc4ed247035bd60c3c89990862e59bfe06ff85293218856675f8c5650.exe 4776 1ea428efc4ed247035bd60c3c89990862e59bfe06ff85293218856675f8c5650.exe 4776 1ea428efc4ed247035bd60c3c89990862e59bfe06ff85293218856675f8c5650.exe 876 svchcst.exe 876 svchcst.exe 876 svchcst.exe 876 svchcst.exe 876 svchcst.exe 876 svchcst.exe 876 svchcst.exe 876 svchcst.exe 876 svchcst.exe 876 svchcst.exe 876 svchcst.exe 876 svchcst.exe 876 svchcst.exe 876 svchcst.exe 876 svchcst.exe 876 svchcst.exe 876 svchcst.exe 876 svchcst.exe 876 svchcst.exe 876 svchcst.exe 876 svchcst.exe 876 svchcst.exe 876 svchcst.exe 876 svchcst.exe 876 svchcst.exe 876 svchcst.exe 876 svchcst.exe 876 svchcst.exe 876 svchcst.exe 876 svchcst.exe 876 svchcst.exe 876 svchcst.exe 876 svchcst.exe 876 svchcst.exe 876 svchcst.exe 876 svchcst.exe 876 svchcst.exe 876 svchcst.exe 876 svchcst.exe 876 svchcst.exe 876 svchcst.exe 876 svchcst.exe 876 svchcst.exe 876 svchcst.exe 876 svchcst.exe 876 svchcst.exe 876 svchcst.exe 876 svchcst.exe 876 svchcst.exe 876 svchcst.exe 876 svchcst.exe 876 svchcst.exe 876 svchcst.exe 876 svchcst.exe 876 svchcst.exe 876 svchcst.exe 876 svchcst.exe 876 svchcst.exe 876 svchcst.exe 876 svchcst.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4776 1ea428efc4ed247035bd60c3c89990862e59bfe06ff85293218856675f8c5650.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 4776 1ea428efc4ed247035bd60c3c89990862e59bfe06ff85293218856675f8c5650.exe 4776 1ea428efc4ed247035bd60c3c89990862e59bfe06ff85293218856675f8c5650.exe 876 svchcst.exe 876 svchcst.exe 1748 svchcst.exe 1748 svchcst.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4776 wrote to memory of 5052 4776 1ea428efc4ed247035bd60c3c89990862e59bfe06ff85293218856675f8c5650.exe 83 PID 4776 wrote to memory of 5052 4776 1ea428efc4ed247035bd60c3c89990862e59bfe06ff85293218856675f8c5650.exe 83 PID 4776 wrote to memory of 5052 4776 1ea428efc4ed247035bd60c3c89990862e59bfe06ff85293218856675f8c5650.exe 83 PID 4776 wrote to memory of 1940 4776 1ea428efc4ed247035bd60c3c89990862e59bfe06ff85293218856675f8c5650.exe 84 PID 4776 wrote to memory of 1940 4776 1ea428efc4ed247035bd60c3c89990862e59bfe06ff85293218856675f8c5650.exe 84 PID 4776 wrote to memory of 1940 4776 1ea428efc4ed247035bd60c3c89990862e59bfe06ff85293218856675f8c5650.exe 84 PID 5052 wrote to memory of 876 5052 WScript.exe 91 PID 5052 wrote to memory of 876 5052 WScript.exe 91 PID 5052 wrote to memory of 876 5052 WScript.exe 91 PID 1940 wrote to memory of 1748 1940 WScript.exe 92 PID 1940 wrote to memory of 1748 1940 WScript.exe 92 PID 1940 wrote to memory of 1748 1940 WScript.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\1ea428efc4ed247035bd60c3c89990862e59bfe06ff85293218856675f8c5650.exe"C:\Users\Admin\AppData\Local\Temp\1ea428efc4ed247035bd60c3c89990862e59bfe06ff85293218856675f8c5650.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Deletes itself
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:876
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1748
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
753B
MD53cf4238174770d6572fa1f2b06a95d5d
SHA1208d822e4dcec2461d9542b65904ba8c03744450
SHA2565e0569c6c70205d2886e2e42f2027d5fb18f83fcd2e1ae90ae95cd6ca693e9dd
SHA5129e8bc0cd56d8a7572dc54eaed2c4f6f5326e6728ffa3f8adfd3d8eb74e94999681bb309db0aea89d5a004668bc49e5ff4c97f7146bc01e8db729e6679f899811
-
Filesize
1.1MB
MD5c1333e046773fde45404e4183c574525
SHA1f0fe84ff53542d141d6082b2885d99a67245c085
SHA25645e11298b7f48a9115bf15431e51204976565490311967d7df71998d285bc2e7
SHA512067bd5b2afa1c9d55e5cd48e2ac5603e243cad2d6a3ac5c92e4fae74e5021b676a2d5c649ef565802d165119a293be2adba3a79c2aaf7bb360832282714d99c3