Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
2s -
max time network
8s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
04/07/2024, 17:40 UTC
Static task
static1
Behavioral task
behavioral1
Sample
15c7e5e81d3c9c27ac8ee54fe02dd9d9adadcdd13bd758a0d501ad60f531ef46.vbs
Resource
win7-20240508-en
Errors
General
-
Target
15c7e5e81d3c9c27ac8ee54fe02dd9d9adadcdd13bd758a0d501ad60f531ef46.vbs
-
Size
894B
-
MD5
e4eb801891b1e2d31bbf92ab4dbdc129
-
SHA1
b02944319c438a6bcdd52e1052eb1c23d7008230
-
SHA256
15c7e5e81d3c9c27ac8ee54fe02dd9d9adadcdd13bd758a0d501ad60f531ef46
-
SHA512
2ef19f1758a9c32d64f7ae8fe9716e98913bd5748acc76fe76b87d1b6bd6ea4eb349086b74f256ced24867bef284500c69c0e98a73335ca15828148a3a348a6a
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" powershell.exe -
Checks computer location settings 2 TTPs 8 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation cmd.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\death\msgbox.vbs WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\Local Settings cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 980 powershell.exe 980 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 980 powershell.exe -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 3576 wrote to memory of 980 3576 WScript.exe 82 PID 3576 wrote to memory of 980 3576 WScript.exe 82 PID 3576 wrote to memory of 3608 3576 WScript.exe 84 PID 3576 wrote to memory of 3608 3576 WScript.exe 84 PID 3576 wrote to memory of 4004 3576 WScript.exe 137 PID 3576 wrote to memory of 4004 3576 WScript.exe 137 PID 3576 wrote to memory of 3680 3576 WScript.exe 89 PID 3576 wrote to memory of 3680 3576 WScript.exe 89 PID 3576 wrote to memory of 4648 3576 WScript.exe 91 PID 3576 wrote to memory of 4648 3576 WScript.exe 91 PID 3576 wrote to memory of 2192 3576 WScript.exe 93 PID 3576 wrote to memory of 2192 3576 WScript.exe 93 PID 3576 wrote to memory of 2804 3576 WScript.exe 139 PID 3576 wrote to memory of 2804 3576 WScript.exe 139 PID 3576 wrote to memory of 1232 3576 WScript.exe 97 PID 3576 wrote to memory of 1232 3576 WScript.exe 97 PID 3576 wrote to memory of 1684 3576 WScript.exe 99 PID 3576 wrote to memory of 1684 3576 WScript.exe 99 PID 3576 wrote to memory of 2352 3576 WScript.exe 100 PID 3576 wrote to memory of 2352 3576 WScript.exe 100 PID 3576 wrote to memory of 4020 3576 WScript.exe 103 PID 3576 wrote to memory of 4020 3576 WScript.exe 103 PID 3576 wrote to memory of 1592 3576 WScript.exe 105 PID 3576 wrote to memory of 1592 3576 WScript.exe 105 PID 3576 wrote to memory of 2980 3576 WScript.exe 107 PID 3576 wrote to memory of 2980 3576 WScript.exe 107 PID 4004 wrote to memory of 2616 4004 cmd.exe 109 PID 4004 wrote to memory of 2616 4004 cmd.exe 109 PID 3576 wrote to memory of 1008 3576 WScript.exe 110 PID 3576 wrote to memory of 1008 3576 WScript.exe 110 PID 3576 wrote to memory of 2384 3576 WScript.exe 112 PID 3576 wrote to memory of 2384 3576 WScript.exe 112 PID 3576 wrote to memory of 3200 3576 WScript.exe 114 PID 3576 wrote to memory of 3200 3576 WScript.exe 114 PID 3680 wrote to memory of 2512 3680 cmd.exe 115 PID 3680 wrote to memory of 2512 3680 cmd.exe 115 PID 3576 wrote to memory of 1200 3576 WScript.exe 116 PID 3576 wrote to memory of 1200 3576 WScript.exe 116 PID 3608 wrote to memory of 4532 3608 cmd.exe 119 PID 3608 wrote to memory of 4532 3608 cmd.exe 119 PID 1232 wrote to memory of 4796 1232 cmd.exe 120 PID 1232 wrote to memory of 4796 1232 cmd.exe 120 PID 2804 wrote to memory of 1152 2804 cmd.exe 121 PID 2804 wrote to memory of 1152 2804 cmd.exe 121
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\15c7e5e81d3c9c27ac8ee54fe02dd9d9adadcdd13bd758a0d501ad60f531ef46.vbs"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3576 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-ItemProperty -Path REGISTRY::HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System -Name EnableLUA -Value 02⤵
- UAC bypass
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:980
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c start C:\Windows\death\msgbox.vbs2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3608 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\death\msgbox.vbs"3⤵PID:4532
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c start C:\Windows\death\msgbox.vbs2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4004 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\death\msgbox.vbs"3⤵PID:2616
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c start C:\Windows\death\msgbox.vbs2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\death\msgbox.vbs"3⤵PID:2512
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c start C:\Windows\death\msgbox.vbs2⤵PID:4648
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\death\msgbox.vbs"3⤵PID:4932
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c start C:\Windows\death\msgbox.vbs2⤵
- Checks computer location settings
PID:2192 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\death\msgbox.vbs"3⤵PID:2216
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c start C:\Windows\death\msgbox.vbs2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\death\msgbox.vbs"3⤵PID:1152
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c start C:\Windows\death\msgbox.vbs2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\death\msgbox.vbs"3⤵PID:4796
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c start C:\Windows\death\msgbox.vbs2⤵PID:1684
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\death\msgbox.vbs"3⤵PID:4324
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c start C:\Windows\death\msgbox.vbs2⤵
- Checks computer location settings
PID:2352 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\death\msgbox.vbs"3⤵PID:3268
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c start C:\Windows\death\msgbox.vbs2⤵PID:4020
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\death\msgbox.vbs"3⤵PID:1912
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c start C:\Windows\death\msgbox.vbs2⤵PID:1592
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\death\msgbox.vbs"3⤵PID:3212
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c start C:\Windows\death\msgbox.vbs2⤵PID:2980
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\death\msgbox.vbs"3⤵PID:1052
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c start C:\Windows\death\msgbox.vbs2⤵PID:1008
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\death\msgbox.vbs"3⤵PID:5068
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c start C:\Windows\death\msgbox.vbs2⤵PID:2384
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\death\msgbox.vbs"3⤵PID:4416
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c start C:\Windows\death\msgbox.vbs2⤵PID:3200
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\death\msgbox.vbs"3⤵PID:3224
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c start C:\Windows\death\msgbox.vbs2⤵PID:1200
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\death\msgbox.vbs"3⤵PID:3336
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c shutdown /r /t 02⤵PID:3604
-
C:\Windows\system32\shutdown.exeshutdown /r /t 03⤵PID:2688
-
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa39b3055 /state1:0x41c64e6d1⤵PID:4004
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:2804
Network
-
Remote address:8.8.8.8:53Request8.8.8.8.in-addr.arpaIN PTRResponse8.8.8.8.in-addr.arpaIN PTRdnsgoogle
-
Remote address:8.8.8.8:53Request28.118.140.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request73.144.22.2.in-addr.arpaIN PTRResponse73.144.22.2.in-addr.arpaIN PTRa2-22-144-73deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request138.32.126.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request228.249.119.40.in-addr.arpaIN PTRResponse
-
66 B 90 B 1 1
DNS Request
8.8.8.8.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
28.118.140.52.in-addr.arpa
-
70 B 133 B 1 1
DNS Request
73.144.22.2.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
138.32.126.40.in-addr.arpa
-
73 B 159 B 1 1
DNS Request
228.249.119.40.in-addr.arpa
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
28B
MD5b6e919a1dc3cba72b24ea865f4bf9e71
SHA1d0301379a04c0a87c5637d5621fa68086fbb89d0
SHA256907a059c55000bae173089ac312476ee122d28fb053dd872ec4dc6fea8bef907
SHA512b17bdfc11ea71f2fc9d91cce7e72b321f40a06a969c771f025c96edcaed303513d3ee62aee20dd6891ed3198f254710ae40d0d3005f6ff51cd05612210626104