Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
114s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
04/07/2024, 21:05
Static task
static1
Behavioral task
behavioral1
Sample
41f305966b37c2b271e7ab24916974e1d718a1030a040ddf1d244ad20d87bed5.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
41f305966b37c2b271e7ab24916974e1d718a1030a040ddf1d244ad20d87bed5.exe
Resource
win10v2004-20240704-en
General
-
Target
41f305966b37c2b271e7ab24916974e1d718a1030a040ddf1d244ad20d87bed5.exe
-
Size
1.1MB
-
MD5
5594ca4026e51f7dba91b57d9f145451
-
SHA1
4c4cd7fd06f710cd38cc8f76ff2057a35576d5da
-
SHA256
41f305966b37c2b271e7ab24916974e1d718a1030a040ddf1d244ad20d87bed5
-
SHA512
68c27464b7a5d28611d1717f8410922cb9e88132d66d9fce8963c5d525d0b864f0c9c99d39244f1962454173b075b003002693de519b8947d158d9789497349a
-
SSDEEP
24576:aH0dl8myX9Bg42QoXFkrzkmplSgRDYo0lG4Z8r7Qfbkiu5QX:acallSllG4ZM7QzMw
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-661257284-3186977026-4220467887-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-661257284-3186977026-4220467887-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-661257284-3186977026-4220467887-1000\Control Panel\International\Geo\Nation 41f305966b37c2b271e7ab24916974e1d718a1030a040ddf1d244ad20d87bed5.exe -
Deletes itself 1 IoCs
pid Process 1044 svchcst.exe -
Executes dropped EXE 2 IoCs
pid Process 1708 svchcst.exe 1044 svchcst.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-661257284-3186977026-4220467887-1000_Classes\Local Settings 41f305966b37c2b271e7ab24916974e1d718a1030a040ddf1d244ad20d87bed5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4912 41f305966b37c2b271e7ab24916974e1d718a1030a040ddf1d244ad20d87bed5.exe 4912 41f305966b37c2b271e7ab24916974e1d718a1030a040ddf1d244ad20d87bed5.exe 4912 41f305966b37c2b271e7ab24916974e1d718a1030a040ddf1d244ad20d87bed5.exe 4912 41f305966b37c2b271e7ab24916974e1d718a1030a040ddf1d244ad20d87bed5.exe 1044 svchcst.exe 1044 svchcst.exe 1044 svchcst.exe 1044 svchcst.exe 1044 svchcst.exe 1044 svchcst.exe 1044 svchcst.exe 1044 svchcst.exe 1044 svchcst.exe 1044 svchcst.exe 1044 svchcst.exe 1044 svchcst.exe 1044 svchcst.exe 1044 svchcst.exe 1044 svchcst.exe 1044 svchcst.exe 1044 svchcst.exe 1044 svchcst.exe 1044 svchcst.exe 1044 svchcst.exe 1044 svchcst.exe 1044 svchcst.exe 1044 svchcst.exe 1044 svchcst.exe 1044 svchcst.exe 1044 svchcst.exe 1044 svchcst.exe 1044 svchcst.exe 1044 svchcst.exe 1044 svchcst.exe 1044 svchcst.exe 1044 svchcst.exe 1044 svchcst.exe 1044 svchcst.exe 1044 svchcst.exe 1044 svchcst.exe 1044 svchcst.exe 1044 svchcst.exe 1044 svchcst.exe 1044 svchcst.exe 1044 svchcst.exe 1044 svchcst.exe 1044 svchcst.exe 1044 svchcst.exe 1044 svchcst.exe 1044 svchcst.exe 1044 svchcst.exe 1044 svchcst.exe 1044 svchcst.exe 1044 svchcst.exe 1044 svchcst.exe 1044 svchcst.exe 1044 svchcst.exe 1044 svchcst.exe 1044 svchcst.exe 1044 svchcst.exe 1044 svchcst.exe 1044 svchcst.exe 1044 svchcst.exe 1044 svchcst.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4912 41f305966b37c2b271e7ab24916974e1d718a1030a040ddf1d244ad20d87bed5.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 4912 41f305966b37c2b271e7ab24916974e1d718a1030a040ddf1d244ad20d87bed5.exe 4912 41f305966b37c2b271e7ab24916974e1d718a1030a040ddf1d244ad20d87bed5.exe 1708 svchcst.exe 1044 svchcst.exe 1044 svchcst.exe 1708 svchcst.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4912 wrote to memory of 3688 4912 41f305966b37c2b271e7ab24916974e1d718a1030a040ddf1d244ad20d87bed5.exe 90 PID 4912 wrote to memory of 3688 4912 41f305966b37c2b271e7ab24916974e1d718a1030a040ddf1d244ad20d87bed5.exe 90 PID 4912 wrote to memory of 3688 4912 41f305966b37c2b271e7ab24916974e1d718a1030a040ddf1d244ad20d87bed5.exe 90 PID 4912 wrote to memory of 5024 4912 41f305966b37c2b271e7ab24916974e1d718a1030a040ddf1d244ad20d87bed5.exe 91 PID 4912 wrote to memory of 5024 4912 41f305966b37c2b271e7ab24916974e1d718a1030a040ddf1d244ad20d87bed5.exe 91 PID 4912 wrote to memory of 5024 4912 41f305966b37c2b271e7ab24916974e1d718a1030a040ddf1d244ad20d87bed5.exe 91 PID 3688 wrote to memory of 1708 3688 WScript.exe 94 PID 3688 wrote to memory of 1708 3688 WScript.exe 94 PID 3688 wrote to memory of 1708 3688 WScript.exe 94 PID 5024 wrote to memory of 1044 5024 WScript.exe 95 PID 5024 wrote to memory of 1044 5024 WScript.exe 95 PID 5024 wrote to memory of 1044 5024 WScript.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\41f305966b37c2b271e7ab24916974e1d718a1030a040ddf1d244ad20d87bed5.exe"C:\Users\Admin\AppData\Local\Temp\41f305966b37c2b271e7ab24916974e1d718a1030a040ddf1d244ad20d87bed5.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3688 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1708
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Deletes itself
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1044
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3712,i,13421008738336098502,1902686380018635081,262144 --variations-seed-version --mojo-platform-channel-handle=4292 /prefetch:81⤵PID:4212
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
753B
MD52e324ea33b722f4500f5c09f8ef673f9
SHA1967e9d22224da70d5ef4b5f3b630baee366ec8f2
SHA256ceb5a9d6642b22009955809e0eced6404a8dadeff2423058242ed3dc4a1bd503
SHA512cd227e36a796961de578ce53f8d5e6e5c55affe148b5a5cda413f6f0341dc1e858c2fd364b92387cdeeabbade1753f4f2ce5d8f998072d58cc0415c47e3d83cc
-
Filesize
1.1MB
MD5d5037478e1e69bfbf2bb068b97fa69e9
SHA1d93523934480cde6c8ffcdd816cf0de500bf7254
SHA2565bdabc702d17c85ea13ea56b3d912dddd9fd4be0cf2e34e3e6de0c278520334a
SHA512aba16e20c253a31defe7944a1e92e8d0a2fa262503e22bbf98e739da03dea60bc39219fa38e6de9aaac72906502d263efcc2a8b396e253f4cdecc8fcf0d73799