Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    2s
  • max time network
    8s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/07/2024, 17:40 UTC

Errors

Reason
Machine shutdown

General

  • Target

    15c7e5e81d3c9c27ac8ee54fe02dd9d9adadcdd13bd758a0d501ad60f531ef46.vbs

  • Size

    894B

  • MD5

    e4eb801891b1e2d31bbf92ab4dbdc129

  • SHA1

    b02944319c438a6bcdd52e1052eb1c23d7008230

  • SHA256

    15c7e5e81d3c9c27ac8ee54fe02dd9d9adadcdd13bd758a0d501ad60f531ef46

  • SHA512

    2ef19f1758a9c32d64f7ae8fe9716e98913bd5748acc76fe76b87d1b6bd6ea4eb349086b74f256ced24867bef284500c69c0e98a73335ca15828148a3a348a6a

Score
10/10

Malware Config

Signatures

  • UAC bypass 3 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 8 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\15c7e5e81d3c9c27ac8ee54fe02dd9d9adadcdd13bd758a0d501ad60f531ef46.vbs"
    1⤵
    • Checks computer location settings
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:3576
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-ItemProperty -Path REGISTRY::HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System -Name EnableLUA -Value 0
      2⤵
      • UAC bypass
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:980
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c start C:\Windows\death\msgbox.vbs
      2⤵
      • Checks computer location settings
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:3608
      • C:\Windows\System32\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Windows\death\msgbox.vbs"
        3⤵
          PID:4532
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /c start C:\Windows\death\msgbox.vbs
        2⤵
        • Checks computer location settings
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:4004
        • C:\Windows\System32\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Windows\death\msgbox.vbs"
          3⤵
            PID:2616
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /c start C:\Windows\death\msgbox.vbs
          2⤵
          • Checks computer location settings
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:3680
          • C:\Windows\System32\WScript.exe
            "C:\Windows\System32\WScript.exe" "C:\Windows\death\msgbox.vbs"
            3⤵
              PID:2512
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /c start C:\Windows\death\msgbox.vbs
            2⤵
              PID:4648
              • C:\Windows\System32\WScript.exe
                "C:\Windows\System32\WScript.exe" "C:\Windows\death\msgbox.vbs"
                3⤵
                  PID:4932
              • C:\Windows\System32\cmd.exe
                "C:\Windows\System32\cmd.exe" /c start C:\Windows\death\msgbox.vbs
                2⤵
                • Checks computer location settings
                PID:2192
                • C:\Windows\System32\WScript.exe
                  "C:\Windows\System32\WScript.exe" "C:\Windows\death\msgbox.vbs"
                  3⤵
                    PID:2216
                • C:\Windows\System32\cmd.exe
                  "C:\Windows\System32\cmd.exe" /c start C:\Windows\death\msgbox.vbs
                  2⤵
                  • Checks computer location settings
                  • Modifies registry class
                  • Suspicious use of WriteProcessMemory
                  PID:2804
                  • C:\Windows\System32\WScript.exe
                    "C:\Windows\System32\WScript.exe" "C:\Windows\death\msgbox.vbs"
                    3⤵
                      PID:1152
                  • C:\Windows\System32\cmd.exe
                    "C:\Windows\System32\cmd.exe" /c start C:\Windows\death\msgbox.vbs
                    2⤵
                    • Checks computer location settings
                    • Modifies registry class
                    • Suspicious use of WriteProcessMemory
                    PID:1232
                    • C:\Windows\System32\WScript.exe
                      "C:\Windows\System32\WScript.exe" "C:\Windows\death\msgbox.vbs"
                      3⤵
                        PID:4796
                    • C:\Windows\System32\cmd.exe
                      "C:\Windows\System32\cmd.exe" /c start C:\Windows\death\msgbox.vbs
                      2⤵
                        PID:1684
                        • C:\Windows\System32\WScript.exe
                          "C:\Windows\System32\WScript.exe" "C:\Windows\death\msgbox.vbs"
                          3⤵
                            PID:4324
                        • C:\Windows\System32\cmd.exe
                          "C:\Windows\System32\cmd.exe" /c start C:\Windows\death\msgbox.vbs
                          2⤵
                          • Checks computer location settings
                          PID:2352
                          • C:\Windows\System32\WScript.exe
                            "C:\Windows\System32\WScript.exe" "C:\Windows\death\msgbox.vbs"
                            3⤵
                              PID:3268
                          • C:\Windows\System32\cmd.exe
                            "C:\Windows\System32\cmd.exe" /c start C:\Windows\death\msgbox.vbs
                            2⤵
                              PID:4020
                              • C:\Windows\System32\WScript.exe
                                "C:\Windows\System32\WScript.exe" "C:\Windows\death\msgbox.vbs"
                                3⤵
                                  PID:1912
                              • C:\Windows\System32\cmd.exe
                                "C:\Windows\System32\cmd.exe" /c start C:\Windows\death\msgbox.vbs
                                2⤵
                                  PID:1592
                                  • C:\Windows\System32\WScript.exe
                                    "C:\Windows\System32\WScript.exe" "C:\Windows\death\msgbox.vbs"
                                    3⤵
                                      PID:3212
                                  • C:\Windows\System32\cmd.exe
                                    "C:\Windows\System32\cmd.exe" /c start C:\Windows\death\msgbox.vbs
                                    2⤵
                                      PID:2980
                                      • C:\Windows\System32\WScript.exe
                                        "C:\Windows\System32\WScript.exe" "C:\Windows\death\msgbox.vbs"
                                        3⤵
                                          PID:1052
                                      • C:\Windows\System32\cmd.exe
                                        "C:\Windows\System32\cmd.exe" /c start C:\Windows\death\msgbox.vbs
                                        2⤵
                                          PID:1008
                                          • C:\Windows\System32\WScript.exe
                                            "C:\Windows\System32\WScript.exe" "C:\Windows\death\msgbox.vbs"
                                            3⤵
                                              PID:5068
                                          • C:\Windows\System32\cmd.exe
                                            "C:\Windows\System32\cmd.exe" /c start C:\Windows\death\msgbox.vbs
                                            2⤵
                                              PID:2384
                                              • C:\Windows\System32\WScript.exe
                                                "C:\Windows\System32\WScript.exe" "C:\Windows\death\msgbox.vbs"
                                                3⤵
                                                  PID:4416
                                              • C:\Windows\System32\cmd.exe
                                                "C:\Windows\System32\cmd.exe" /c start C:\Windows\death\msgbox.vbs
                                                2⤵
                                                  PID:3200
                                                  • C:\Windows\System32\WScript.exe
                                                    "C:\Windows\System32\WScript.exe" "C:\Windows\death\msgbox.vbs"
                                                    3⤵
                                                      PID:3224
                                                  • C:\Windows\System32\cmd.exe
                                                    "C:\Windows\System32\cmd.exe" /c start C:\Windows\death\msgbox.vbs
                                                    2⤵
                                                      PID:1200
                                                      • C:\Windows\System32\WScript.exe
                                                        "C:\Windows\System32\WScript.exe" "C:\Windows\death\msgbox.vbs"
                                                        3⤵
                                                          PID:3336
                                                      • C:\Windows\System32\cmd.exe
                                                        "C:\Windows\System32\cmd.exe" /c shutdown /r /t 0
                                                        2⤵
                                                          PID:3604
                                                          • C:\Windows\system32\shutdown.exe
                                                            shutdown /r /t 0
                                                            3⤵
                                                              PID:2688
                                                        • C:\Windows\system32\LogonUI.exe
                                                          "LogonUI.exe" /flags:0x4 /state0:0xa39b3055 /state1:0x41c64e6d
                                                          1⤵
                                                            PID:4004
                                                          • C:\Windows\system32\DllHost.exe
                                                            C:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}
                                                            1⤵
                                                              PID:2804

                                                            Network

                                                            • flag-us
                                                              DNS
                                                              8.8.8.8.in-addr.arpa
                                                              Remote address:
                                                              8.8.8.8:53
                                                              Request
                                                              8.8.8.8.in-addr.arpa
                                                              IN PTR
                                                              Response
                                                              8.8.8.8.in-addr.arpa
                                                              IN PTR
                                                              dnsgoogle
                                                            • flag-us
                                                              DNS
                                                              28.118.140.52.in-addr.arpa
                                                              Remote address:
                                                              8.8.8.8:53
                                                              Request
                                                              28.118.140.52.in-addr.arpa
                                                              IN PTR
                                                              Response
                                                            • flag-us
                                                              DNS
                                                              73.144.22.2.in-addr.arpa
                                                              Remote address:
                                                              8.8.8.8:53
                                                              Request
                                                              73.144.22.2.in-addr.arpa
                                                              IN PTR
                                                              Response
                                                              73.144.22.2.in-addr.arpa
                                                              IN PTR
                                                              a2-22-144-73deploystaticakamaitechnologiescom
                                                            • flag-us
                                                              DNS
                                                              138.32.126.40.in-addr.arpa
                                                              Remote address:
                                                              8.8.8.8:53
                                                              Request
                                                              138.32.126.40.in-addr.arpa
                                                              IN PTR
                                                              Response
                                                            • flag-us
                                                              DNS
                                                              228.249.119.40.in-addr.arpa
                                                              Remote address:
                                                              8.8.8.8:53
                                                              Request
                                                              228.249.119.40.in-addr.arpa
                                                              IN PTR
                                                              Response
                                                            No results found
                                                            • 8.8.8.8:53
                                                              8.8.8.8.in-addr.arpa
                                                              dns
                                                              66 B
                                                              90 B
                                                              1
                                                              1

                                                              DNS Request

                                                              8.8.8.8.in-addr.arpa

                                                            • 8.8.8.8:53
                                                              28.118.140.52.in-addr.arpa
                                                              dns
                                                              72 B
                                                              158 B
                                                              1
                                                              1

                                                              DNS Request

                                                              28.118.140.52.in-addr.arpa

                                                            • 8.8.8.8:53
                                                              73.144.22.2.in-addr.arpa
                                                              dns
                                                              70 B
                                                              133 B
                                                              1
                                                              1

                                                              DNS Request

                                                              73.144.22.2.in-addr.arpa

                                                            • 8.8.8.8:53
                                                              138.32.126.40.in-addr.arpa
                                                              dns
                                                              72 B
                                                              158 B
                                                              1
                                                              1

                                                              DNS Request

                                                              138.32.126.40.in-addr.arpa

                                                            • 8.8.8.8:53
                                                              228.249.119.40.in-addr.arpa
                                                              dns
                                                              73 B
                                                              159 B
                                                              1
                                                              1

                                                              DNS Request

                                                              228.249.119.40.in-addr.arpa

                                                            MITRE ATT&CK Enterprise v15

                                                            Replay Monitor

                                                            Loading Replay Monitor...

                                                            Downloads

                                                            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_54ktonsu.xbo.ps1

                                                              Filesize

                                                              60B

                                                              MD5

                                                              d17fe0a3f47be24a6453e9ef58c94641

                                                              SHA1

                                                              6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                              SHA256

                                                              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                              SHA512

                                                              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                            • C:\Windows\death\msgbox.vbs

                                                              Filesize

                                                              28B

                                                              MD5

                                                              b6e919a1dc3cba72b24ea865f4bf9e71

                                                              SHA1

                                                              d0301379a04c0a87c5637d5621fa68086fbb89d0

                                                              SHA256

                                                              907a059c55000bae173089ac312476ee122d28fb053dd872ec4dc6fea8bef907

                                                              SHA512

                                                              b17bdfc11ea71f2fc9d91cce7e72b321f40a06a969c771f025c96edcaed303513d3ee62aee20dd6891ed3198f254710ae40d0d3005f6ff51cd05612210626104

                                                            • memory/980-0-0x00007FFB832B3000-0x00007FFB832B5000-memory.dmp

                                                              Filesize

                                                              8KB

                                                            • memory/980-1-0x0000016927EA0000-0x0000016927EC2000-memory.dmp

                                                              Filesize

                                                              136KB

                                                            • memory/980-11-0x00007FFB832B0000-0x00007FFB83D71000-memory.dmp

                                                              Filesize

                                                              10.8MB

                                                            • memory/980-12-0x00007FFB832B0000-0x00007FFB83D71000-memory.dmp

                                                              Filesize

                                                              10.8MB

                                                            • memory/980-15-0x00007FFB832B0000-0x00007FFB83D71000-memory.dmp

                                                              Filesize

                                                              10.8MB

                                                            We care about your privacy.

                                                            This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.