Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
04/06/2024, 06:16
Static task
static1
Behavioral task
behavioral1
Sample
update_task.vbs
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
update_task.vbs
Resource
win10v2004-20240508-en
General
-
Target
update_task.vbs
-
Size
630B
-
MD5
bfe9fe92e21ce31902de4ae152744674
-
SHA1
70ea30e26fd362dbb24c43a7bbc0d54bc00a6863
-
SHA256
afaeaeaf6c92fea88f20d826a28a0f2bb0124146c91b1f7877de4b89c4133b8f
-
SHA512
09120e6221f23573690760ce00696e7f21f0f6abed5d75fe4e08e0787efb96b7877b083538315f9e2c9087e189e92c8c98a0d516bfbe7aa1381347cc86cf0190
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2528 wrote to memory of 464 2528 WScript.exe 91 PID 2528 wrote to memory of 464 2528 WScript.exe 91 PID 2528 wrote to memory of 4008 2528 WScript.exe 93 PID 2528 wrote to memory of 4008 2528 WScript.exe 93 PID 2528 wrote to memory of 4644 2528 WScript.exe 95 PID 2528 wrote to memory of 4644 2528 WScript.exe 95 PID 2528 wrote to memory of 4608 2528 WScript.exe 97 PID 2528 wrote to memory of 4608 2528 WScript.exe 97 PID 2528 wrote to memory of 4080 2528 WScript.exe 99 PID 2528 wrote to memory of 4080 2528 WScript.exe 99 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 4008 attrib.exe 4608 attrib.exe
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\update_task.vbs"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\System32\certutil.exe"C:\Windows\System32\certutil.exe" -decode .\e.txt .\PasswordSlip.exe2⤵PID:464
-
-
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" +h .\PasswordSlip.exe2⤵
- Views/modifies file attributes
PID:4008
-
-
C:\Windows\System32\expand.exe"C:\Windows\System32\expand.exe" C:\Windows\System32\notepad.exe .2⤵PID:4644
-
-
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" +h .\notepad.exe2⤵
- Views/modifies file attributes
PID:4608
-
-
C:\Windows\System32\forfiles.exe"C:\Windows\System32\forfiles.exe" /p . /m notepad.exe /c .\PasswordSlip.exe2⤵PID:4080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4076,i,1809100026287847100,9768898026582633513,262144 --variations-seed-version --mojo-platform-channel-handle=1276 /prefetch:81⤵PID:3432
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
207KB
MD51c1760ed4d19cdbecb2398216922628b
SHA166b6158b28cc2b970e454b6a8cf1824dd99e4029
SHA256d66458a3eb1b68715b552b3af32a9d2e889bbf8ac0c23c1afa8d0982023d1ce2
SHA512f058eda0c65e59105a7c794721697782f1e1db759c69a11dab09ca454aa89767addcc8ecefa54995527bc2cae983e44c9ed42b0973fdb47435b31428150b96db