Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1797s -
max time network
1805s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
13/06/2024, 09:01
Static task
static1
Behavioral task
behavioral1
Sample
Phishing.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
Phishing.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
Phishing.exe
Resource
win11-20240419-en
General
-
Target
Phishing.exe
-
Size
600KB
-
MD5
2437e352ff0a8776a4db6a9ad491e3aa
-
SHA1
a78d5b3bed12f8347870b68017af6143b618fcbe
-
SHA256
7855ddefcaaa6271873f7c667152310ce54b2a998b086e9d6c00e0baf2c7e74f
-
SHA512
c3ec585dded4052eb9d10a8d55b05c6f34ba10c384b172bc2b64402726ef1d4d1a22e65f50b25f579eb150a3f24d3e5b35ed74bdd131e4dc3cf084a18c5b0ec8
-
SSDEEP
6144:wOYGXaPNxdgSdcq2pVZPOJHAbKhKXgTTSjpdqAzn2n3ignO:kGqN/XdctpVtkRLTodqAzs3igO
Malware Config
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3676 2020 wscript.exe 93 -
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell and hide display window.
pid Process 1268 powershell.exe 3460 powershell.exe 1268 powershell.exe 3460 powershell.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Phishing.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation wscript.exe -
Deletes itself 1 IoCs
pid Process 2172 wscript.exe -
Loads dropped DLL 1 IoCs
pid Process 3672 regsvr32.exe -
Registers COM server for autorun 1 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000_Classes\WOW6432Node\CLSID\{89565275-A714-4a43-912E-978B935EDCCC}\InProcServer32\ = "C:\\Users\\Admin\\AppData\\Local\\dynwrapx.dll" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000_Classes\WOW6432Node\CLSID\{89565275-A714-4a43-912E-978B935EDCCC}\InProcServer32 regsvr32.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 12 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000_Classes\WOW6432Node\CLSID\{89565275-A714-4a43-912E-978B935EDCCC}\InProcServer32 regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000_Classes\WOW6432Node\CLSID regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000_Classes\WOW6432Node\CLSID\{89565275-A714-4a43-912E-978B935EDCCC}\InProcServer32\ = "C:\\Users\\Admin\\AppData\\Local\\dynwrapx.dll" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000_Classes\DynamicWrapperX regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinNT\test = "1" wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000_Classes\DynamicWrapperX\CLSID\ = "{89565275-A714-4a43-912E-978B935EDCCC}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinNT wscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinNT wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinNT\test = "1" wscript.exe Key created \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000_Classes\WOW6432Node regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000_Classes\WOW6432Node\CLSID\{89565275-A714-4a43-912E-978B935EDCCC} regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000_Classes\DynamicWrapperX\CLSID regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1268 powershell.exe 3460 powershell.exe 1268 powershell.exe 3460 powershell.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2172 wscript.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1268 powershell.exe Token: SeDebugPrivilege 3460 powershell.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 228 wrote to memory of 2944 228 Phishing.exe 84 PID 228 wrote to memory of 2944 228 Phishing.exe 84 PID 228 wrote to memory of 2944 228 Phishing.exe 84 PID 2944 wrote to memory of 1268 2944 cmd.exe 86 PID 2944 wrote to memory of 1268 2944 cmd.exe 86 PID 2944 wrote to memory of 1268 2944 cmd.exe 86 PID 2944 wrote to memory of 2172 2944 cmd.exe 88 PID 2944 wrote to memory of 2172 2944 cmd.exe 88 PID 2944 wrote to memory of 2172 2944 cmd.exe 88 PID 2172 wrote to memory of 3460 2172 wscript.exe 91 PID 2172 wrote to memory of 3460 2172 wscript.exe 91 PID 2172 wrote to memory of 3460 2172 wscript.exe 91 PID 2172 wrote to memory of 3672 2172 wscript.exe 95 PID 2172 wrote to memory of 3672 2172 wscript.exe 95 PID 2172 wrote to memory of 3672 2172 wscript.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\Phishing.exe"C:\Users\Admin\AppData\Local\Temp\Phishing.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c (start /MIN powershell.exe -NonI -W Hidden -Exec Bypass Add-MpPreference -ExclusionPath "C:") & (start /MIN wscript.exe /E:jscript 7020189421 246 "C:\Users\Admin\AppData\Local\Temp\Phishing.exe")2⤵
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NonI -W Hidden -Exec Bypass Add-MpPreference -ExclusionPath "C:"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1268
-
-
C:\Windows\SysWOW64\wscript.exewscript.exe /E:jscript 7020189421 246 "C:\Users\Admin\AppData\Local\Temp\Phishing.exe"3⤵
- Checks computer location settings
- Deletes itself
- Modifies registry class
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NonI -W Hidden -Exec Bypass Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3460
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /i /s "C:\Users\Admin\AppData\Local\dynwrapx.dll"4⤵
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
PID:3672
-
-
-
-
C:\Windows\SysWOW64\wscript.exeC:\Windows\SysWOW64\wscript.exe "C:\Users\Admin\AppData\Local\5a32ead20.js" 2461⤵
- Process spawned unexpected child process
- Modifies registry class
PID:3676
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
18KB
MD5cae47573d2373bd3abc0abc85d4b88ed
SHA1b9f84681de5383c8a476d90f28e3ff2f7e02673c
SHA2560ca852586fcb3ad6e91ef53d26adc26ff29a369dcff84e400eb2c6c814ce2bca
SHA512f1482d6fccdc05c02400952de27290384e469048c680be520dc33b4cad4a06a0fc36f6c8da3b387d95cf52073ac0c479be431930f211280223e4a5636b3c0f6c
-
Filesize
57KB
MD5be003dd8d5d2f98619cb1b71cb183b66
SHA117bdd34900ca4fa1e51043480d0f09ebfcf33675
SHA256694f6b1eca8889f565f705a2724c147212816a2401a0819f497255bce4db24c5
SHA5129c52de6426d0270e7eb6a494c77d50f6e49463f3b68e05fd691d1ca240bbdfcda253dfb4e67004c9fd7df0a2f668daabfe8904dba6fcfa09e4c2ae63efaee346
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
13KB
MD50a235e8362613509efd31bfdbb22f978
SHA18bcb0297001dfd4963e8d17270ad0d2024a96912
SHA256175c6cc0a98c16f18e333b5622415d3d962a5d1c05044d34823c8541d6abfcd5
SHA512bb2cf2457ba063c971c9944f9a6fda4a89eab80265e270f6371a826bdfc753a62828c83f984897127f213837adb8f90956263dd51823e270c5081fafea630db4
-
Filesize
13KB
MD5ca820517f8fd74d21944d846df6b7c20
SHA11f87eeb37156d64de97d042b9bcfbaf185f8737d
SHA2561b5eb6d4680f7d4da7e2a1a1060b9f13565e082346e375a92244bb55672d49d7
SHA51227e83483f9dd50b2f897b5b93171b17c0e78719b6f05070c7ef4d69fb80f31cb1342b50685e43a7401fc13e56c83d5a52ed7ccfb69ac5bd3c33461fa10f3985a