Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    2s
  • max time network
    8s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/07/2024, 17:40

Errors

Reason
Machine shutdown

General

  • Target

    15c7e5e81d3c9c27ac8ee54fe02dd9d9adadcdd13bd758a0d501ad60f531ef46.vbs

  • Size

    894B

  • MD5

    e4eb801891b1e2d31bbf92ab4dbdc129

  • SHA1

    b02944319c438a6bcdd52e1052eb1c23d7008230

  • SHA256

    15c7e5e81d3c9c27ac8ee54fe02dd9d9adadcdd13bd758a0d501ad60f531ef46

  • SHA512

    2ef19f1758a9c32d64f7ae8fe9716e98913bd5748acc76fe76b87d1b6bd6ea4eb349086b74f256ced24867bef284500c69c0e98a73335ca15828148a3a348a6a

Score
10/10

Malware Config

Signatures

  • UAC bypass 3 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 8 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\15c7e5e81d3c9c27ac8ee54fe02dd9d9adadcdd13bd758a0d501ad60f531ef46.vbs"
    1⤵
    • Checks computer location settings
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:3576
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-ItemProperty -Path REGISTRY::HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System -Name EnableLUA -Value 0
      2⤵
      • UAC bypass
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:980
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c start C:\Windows\death\msgbox.vbs
      2⤵
      • Checks computer location settings
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:3608
      • C:\Windows\System32\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Windows\death\msgbox.vbs"
        3⤵
          PID:4532
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /c start C:\Windows\death\msgbox.vbs
        2⤵
        • Checks computer location settings
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:4004
        • C:\Windows\System32\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Windows\death\msgbox.vbs"
          3⤵
            PID:2616
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /c start C:\Windows\death\msgbox.vbs
          2⤵
          • Checks computer location settings
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:3680
          • C:\Windows\System32\WScript.exe
            "C:\Windows\System32\WScript.exe" "C:\Windows\death\msgbox.vbs"
            3⤵
              PID:2512
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /c start C:\Windows\death\msgbox.vbs
            2⤵
              PID:4648
              • C:\Windows\System32\WScript.exe
                "C:\Windows\System32\WScript.exe" "C:\Windows\death\msgbox.vbs"
                3⤵
                  PID:4932
              • C:\Windows\System32\cmd.exe
                "C:\Windows\System32\cmd.exe" /c start C:\Windows\death\msgbox.vbs
                2⤵
                • Checks computer location settings
                PID:2192
                • C:\Windows\System32\WScript.exe
                  "C:\Windows\System32\WScript.exe" "C:\Windows\death\msgbox.vbs"
                  3⤵
                    PID:2216
                • C:\Windows\System32\cmd.exe
                  "C:\Windows\System32\cmd.exe" /c start C:\Windows\death\msgbox.vbs
                  2⤵
                  • Checks computer location settings
                  • Modifies registry class
                  • Suspicious use of WriteProcessMemory
                  PID:2804
                  • C:\Windows\System32\WScript.exe
                    "C:\Windows\System32\WScript.exe" "C:\Windows\death\msgbox.vbs"
                    3⤵
                      PID:1152
                  • C:\Windows\System32\cmd.exe
                    "C:\Windows\System32\cmd.exe" /c start C:\Windows\death\msgbox.vbs
                    2⤵
                    • Checks computer location settings
                    • Modifies registry class
                    • Suspicious use of WriteProcessMemory
                    PID:1232
                    • C:\Windows\System32\WScript.exe
                      "C:\Windows\System32\WScript.exe" "C:\Windows\death\msgbox.vbs"
                      3⤵
                        PID:4796
                    • C:\Windows\System32\cmd.exe
                      "C:\Windows\System32\cmd.exe" /c start C:\Windows\death\msgbox.vbs
                      2⤵
                        PID:1684
                        • C:\Windows\System32\WScript.exe
                          "C:\Windows\System32\WScript.exe" "C:\Windows\death\msgbox.vbs"
                          3⤵
                            PID:4324
                        • C:\Windows\System32\cmd.exe
                          "C:\Windows\System32\cmd.exe" /c start C:\Windows\death\msgbox.vbs
                          2⤵
                          • Checks computer location settings
                          PID:2352
                          • C:\Windows\System32\WScript.exe
                            "C:\Windows\System32\WScript.exe" "C:\Windows\death\msgbox.vbs"
                            3⤵
                              PID:3268
                          • C:\Windows\System32\cmd.exe
                            "C:\Windows\System32\cmd.exe" /c start C:\Windows\death\msgbox.vbs
                            2⤵
                              PID:4020
                              • C:\Windows\System32\WScript.exe
                                "C:\Windows\System32\WScript.exe" "C:\Windows\death\msgbox.vbs"
                                3⤵
                                  PID:1912
                              • C:\Windows\System32\cmd.exe
                                "C:\Windows\System32\cmd.exe" /c start C:\Windows\death\msgbox.vbs
                                2⤵
                                  PID:1592
                                  • C:\Windows\System32\WScript.exe
                                    "C:\Windows\System32\WScript.exe" "C:\Windows\death\msgbox.vbs"
                                    3⤵
                                      PID:3212
                                  • C:\Windows\System32\cmd.exe
                                    "C:\Windows\System32\cmd.exe" /c start C:\Windows\death\msgbox.vbs
                                    2⤵
                                      PID:2980
                                      • C:\Windows\System32\WScript.exe
                                        "C:\Windows\System32\WScript.exe" "C:\Windows\death\msgbox.vbs"
                                        3⤵
                                          PID:1052
                                      • C:\Windows\System32\cmd.exe
                                        "C:\Windows\System32\cmd.exe" /c start C:\Windows\death\msgbox.vbs
                                        2⤵
                                          PID:1008
                                          • C:\Windows\System32\WScript.exe
                                            "C:\Windows\System32\WScript.exe" "C:\Windows\death\msgbox.vbs"
                                            3⤵
                                              PID:5068
                                          • C:\Windows\System32\cmd.exe
                                            "C:\Windows\System32\cmd.exe" /c start C:\Windows\death\msgbox.vbs
                                            2⤵
                                              PID:2384
                                              • C:\Windows\System32\WScript.exe
                                                "C:\Windows\System32\WScript.exe" "C:\Windows\death\msgbox.vbs"
                                                3⤵
                                                  PID:4416
                                              • C:\Windows\System32\cmd.exe
                                                "C:\Windows\System32\cmd.exe" /c start C:\Windows\death\msgbox.vbs
                                                2⤵
                                                  PID:3200
                                                  • C:\Windows\System32\WScript.exe
                                                    "C:\Windows\System32\WScript.exe" "C:\Windows\death\msgbox.vbs"
                                                    3⤵
                                                      PID:3224
                                                  • C:\Windows\System32\cmd.exe
                                                    "C:\Windows\System32\cmd.exe" /c start C:\Windows\death\msgbox.vbs
                                                    2⤵
                                                      PID:1200
                                                      • C:\Windows\System32\WScript.exe
                                                        "C:\Windows\System32\WScript.exe" "C:\Windows\death\msgbox.vbs"
                                                        3⤵
                                                          PID:3336
                                                      • C:\Windows\System32\cmd.exe
                                                        "C:\Windows\System32\cmd.exe" /c shutdown /r /t 0
                                                        2⤵
                                                          PID:3604
                                                          • C:\Windows\system32\shutdown.exe
                                                            shutdown /r /t 0
                                                            3⤵
                                                              PID:2688
                                                        • C:\Windows\system32\LogonUI.exe
                                                          "LogonUI.exe" /flags:0x4 /state0:0xa39b3055 /state1:0x41c64e6d
                                                          1⤵
                                                            PID:4004
                                                          • C:\Windows\system32\DllHost.exe
                                                            C:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}
                                                            1⤵
                                                              PID:2804

                                                            Network

                                                            MITRE ATT&CK Enterprise v15

                                                            Replay Monitor

                                                            Loading Replay Monitor...

                                                            Downloads

                                                            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_54ktonsu.xbo.ps1

                                                              Filesize

                                                              60B

                                                              MD5

                                                              d17fe0a3f47be24a6453e9ef58c94641

                                                              SHA1

                                                              6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                              SHA256

                                                              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                              SHA512

                                                              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                            • C:\Windows\death\msgbox.vbs

                                                              Filesize

                                                              28B

                                                              MD5

                                                              b6e919a1dc3cba72b24ea865f4bf9e71

                                                              SHA1

                                                              d0301379a04c0a87c5637d5621fa68086fbb89d0

                                                              SHA256

                                                              907a059c55000bae173089ac312476ee122d28fb053dd872ec4dc6fea8bef907

                                                              SHA512

                                                              b17bdfc11ea71f2fc9d91cce7e72b321f40a06a969c771f025c96edcaed303513d3ee62aee20dd6891ed3198f254710ae40d0d3005f6ff51cd05612210626104

                                                            • memory/980-0-0x00007FFB832B3000-0x00007FFB832B5000-memory.dmp

                                                              Filesize

                                                              8KB

                                                            • memory/980-1-0x0000016927EA0000-0x0000016927EC2000-memory.dmp

                                                              Filesize

                                                              136KB

                                                            • memory/980-11-0x00007FFB832B0000-0x00007FFB83D71000-memory.dmp

                                                              Filesize

                                                              10.8MB

                                                            • memory/980-12-0x00007FFB832B0000-0x00007FFB83D71000-memory.dmp

                                                              Filesize

                                                              10.8MB

                                                            • memory/980-15-0x00007FFB832B0000-0x00007FFB83D71000-memory.dmp

                                                              Filesize

                                                              10.8MB