Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1800s -
max time network
1801s -
platform
windows11-21h2_x64 -
resource
win11-20240419-en -
resource tags
arch:x64arch:x86image:win11-20240419-enlocale:en-usos:windows11-21h2-x64system -
submitted
13/06/2024, 09:01
Static task
static1
Behavioral task
behavioral1
Sample
Phishing.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
Phishing.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
Phishing.exe
Resource
win11-20240419-en
General
-
Target
Phishing.exe
-
Size
600KB
-
MD5
2437e352ff0a8776a4db6a9ad491e3aa
-
SHA1
a78d5b3bed12f8347870b68017af6143b618fcbe
-
SHA256
7855ddefcaaa6271873f7c667152310ce54b2a998b086e9d6c00e0baf2c7e74f
-
SHA512
c3ec585dded4052eb9d10a8d55b05c6f34ba10c384b172bc2b64402726ef1d4d1a22e65f50b25f579eb150a3f24d3e5b35ed74bdd131e4dc3cf084a18c5b0ec8
-
SSDEEP
6144:wOYGXaPNxdgSdcq2pVZPOJHAbKhKXgTTSjpdqAzn2n3ignO:kGqN/XdctpVtkRLTodqAzs3igO
Malware Config
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3212 3924 wscript.exe 84 -
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell and hide display window.
pid Process 2264 powershell.exe 3160 powershell.exe 2264 powershell.exe 3160 powershell.exe -
Deletes itself 1 IoCs
pid Process 4444 wscript.exe -
Loads dropped DLL 1 IoCs
pid Process 1108 regsvr32.exe -
Registers COM server for autorun 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000_Classes\WOW6432Node\CLSID\{89565275-A714-4a43-912E-978B935EDCCC}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000_Classes\WOW6432Node\CLSID\{89565275-A714-4a43-912E-978B935EDCCC}\InProcServer32\ = "C:\\Users\\Admin\\AppData\\Local\\dynwrapx.dll" regsvr32.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 12 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000_Classes\WOW6432Node\CLSID\{89565275-A714-4a43-912E-978B935EDCCC}\InProcServer32 regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000_Classes\DynamicWrapperX\CLSID regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000_Classes\DynamicWrapperX regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000_Classes\DynamicWrapperX\CLSID\ = "{89565275-A714-4a43-912E-978B935EDCCC}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinNT wscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinNT wscript.exe Key created \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000_Classes\WOW6432Node regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000_Classes\WOW6432Node\CLSID regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000_Classes\WOW6432Node\CLSID\{89565275-A714-4a43-912E-978B935EDCCC} regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000_Classes\WOW6432Node\CLSID\{89565275-A714-4a43-912E-978B935EDCCC}\InProcServer32\ = "C:\\Users\\Admin\\AppData\\Local\\dynwrapx.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinNT\test = "1" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinNT\test = "1" wscript.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2264 powershell.exe 3160 powershell.exe 2264 powershell.exe 3160 powershell.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4444 wscript.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2264 powershell.exe Token: SeDebugPrivilege 3160 powershell.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4812 wrote to memory of 3152 4812 Phishing.exe 76 PID 4812 wrote to memory of 3152 4812 Phishing.exe 76 PID 4812 wrote to memory of 3152 4812 Phishing.exe 76 PID 3152 wrote to memory of 2264 3152 cmd.exe 78 PID 3152 wrote to memory of 2264 3152 cmd.exe 78 PID 3152 wrote to memory of 2264 3152 cmd.exe 78 PID 3152 wrote to memory of 4444 3152 cmd.exe 79 PID 3152 wrote to memory of 4444 3152 cmd.exe 79 PID 3152 wrote to memory of 4444 3152 cmd.exe 79 PID 4444 wrote to memory of 3160 4444 wscript.exe 82 PID 4444 wrote to memory of 3160 4444 wscript.exe 82 PID 4444 wrote to memory of 3160 4444 wscript.exe 82 PID 4444 wrote to memory of 1108 4444 wscript.exe 86 PID 4444 wrote to memory of 1108 4444 wscript.exe 86 PID 4444 wrote to memory of 1108 4444 wscript.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\Phishing.exe"C:\Users\Admin\AppData\Local\Temp\Phishing.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c (start /MIN powershell.exe -NonI -W Hidden -Exec Bypass Add-MpPreference -ExclusionPath "C:") & (start /MIN wscript.exe /E:jscript 7020189421 246 "C:\Users\Admin\AppData\Local\Temp\Phishing.exe")2⤵
- Suspicious use of WriteProcessMemory
PID:3152 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NonI -W Hidden -Exec Bypass Add-MpPreference -ExclusionPath "C:"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2264
-
-
C:\Windows\SysWOW64\wscript.exewscript.exe /E:jscript 7020189421 246 "C:\Users\Admin\AppData\Local\Temp\Phishing.exe"3⤵
- Deletes itself
- Modifies registry class
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NonI -W Hidden -Exec Bypass Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3160
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /i /s "C:\Users\Admin\AppData\Local\dynwrapx.dll"4⤵
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
PID:1108
-
-
-
-
C:\Windows\SysWOW64\wscript.exeC:\Windows\SysWOW64\wscript.exe "C:\Users\Admin\AppData\Local\a3a1c2970.js" 2461⤵
- Process spawned unexpected child process
- Modifies registry class
PID:3212
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5d0c46cad6c0778401e21910bd6b56b70
SHA17be418951ea96326aca445b8dfe449b2bfa0dca6
SHA2569600b3fdf0565ccb49e21656aa4b24d7c18f776bfd04d9ee984b134707550f02
SHA512057531b468f7fbbb2175a696a8aab274dec0d17d9f71df309edcff35e064f3378050066a3df47ccd03048fac461594ec75e3d4fe64f9dd79949d129f51e02949
-
Filesize
18KB
MD5f199c074dff4730b7b287f915cad4fb8
SHA16be39a1a9ca8b887fcc3d665588fb45511750aa0
SHA25631c0419f466564310ac909a6ea41106abb83d7613cb1d1d5aee1bae2137ed8de
SHA512d17d51ef6b323041c17216e19bee474fc5b7775eba08abbfc7d5b4058dcc9b4ff279ad99af3a2862e67d268f7037c437a6a7e047b5822448853ae4746983a858
-
Filesize
57KB
MD5be003dd8d5d2f98619cb1b71cb183b66
SHA117bdd34900ca4fa1e51043480d0f09ebfcf33675
SHA256694f6b1eca8889f565f705a2724c147212816a2401a0819f497255bce4db24c5
SHA5129c52de6426d0270e7eb6a494c77d50f6e49463f3b68e05fd691d1ca240bbdfcda253dfb4e67004c9fd7df0a2f668daabfe8904dba6fcfa09e4c2ae63efaee346
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
13KB
MD50a235e8362613509efd31bfdbb22f978
SHA18bcb0297001dfd4963e8d17270ad0d2024a96912
SHA256175c6cc0a98c16f18e333b5622415d3d962a5d1c05044d34823c8541d6abfcd5
SHA512bb2cf2457ba063c971c9944f9a6fda4a89eab80265e270f6371a826bdfc753a62828c83f984897127f213837adb8f90956263dd51823e270c5081fafea630db4
-
Filesize
13KB
MD5ca820517f8fd74d21944d846df6b7c20
SHA11f87eeb37156d64de97d042b9bcfbaf185f8737d
SHA2561b5eb6d4680f7d4da7e2a1a1060b9f13565e082346e375a92244bb55672d49d7
SHA51227e83483f9dd50b2f897b5b93171b17c0e78719b6f05070c7ef4d69fb80f31cb1342b50685e43a7401fc13e56c83d5a52ed7ccfb69ac5bd3c33461fa10f3985a