Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
22/07/2024, 02:49
Static task
static1
Behavioral task
behavioral1
Sample
d11fbabb7433f02e9affcae1882fcdfbb90cfeff6545d607d75ee194ec2e6d8c.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d11fbabb7433f02e9affcae1882fcdfbb90cfeff6545d607d75ee194ec2e6d8c.exe
Resource
win10v2004-20240709-en
General
-
Target
d11fbabb7433f02e9affcae1882fcdfbb90cfeff6545d607d75ee194ec2e6d8c.exe
-
Size
1.1MB
-
MD5
8e651777e0bc60e6ac0c50482ff7e4fa
-
SHA1
a0cb7b8577d95ddd1a520804109674d3fab696a0
-
SHA256
d11fbabb7433f02e9affcae1882fcdfbb90cfeff6545d607d75ee194ec2e6d8c
-
SHA512
d125e9903d65199cebaa7efe61159f1aeaf329baeb6395638556b3bd68577817677d4067d3da097d4ddc51789fe437a67838e4fe2f5d6d664ece5535d43ccb0d
-
SSDEEP
24576:CH0dl8myX9Bg42QoXFkrzkmmlSgRDko0lG4Z8r7Qfbkiu5Qe:CcaClSFlG4ZM7QzMV
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation d11fbabb7433f02e9affcae1882fcdfbb90cfeff6545d607d75ee194ec2e6d8c.exe Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation svchcst.exe Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation WScript.exe -
Deletes itself 1 IoCs
pid Process 4772 svchcst.exe -
Executes dropped EXE 3 IoCs
pid Process 4772 svchcst.exe 2924 svchcst.exe 4780 svchcst.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000_Classes\Local Settings svchcst.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe Key created \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000_Classes\Local Settings d11fbabb7433f02e9affcae1882fcdfbb90cfeff6545d607d75ee194ec2e6d8c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3592 d11fbabb7433f02e9affcae1882fcdfbb90cfeff6545d607d75ee194ec2e6d8c.exe 3592 d11fbabb7433f02e9affcae1882fcdfbb90cfeff6545d607d75ee194ec2e6d8c.exe 3592 d11fbabb7433f02e9affcae1882fcdfbb90cfeff6545d607d75ee194ec2e6d8c.exe 3592 d11fbabb7433f02e9affcae1882fcdfbb90cfeff6545d607d75ee194ec2e6d8c.exe 4772 svchcst.exe 4772 svchcst.exe 4772 svchcst.exe 4772 svchcst.exe 4772 svchcst.exe 4772 svchcst.exe 4772 svchcst.exe 4772 svchcst.exe 4772 svchcst.exe 4772 svchcst.exe 4772 svchcst.exe 4772 svchcst.exe 4772 svchcst.exe 4772 svchcst.exe 4772 svchcst.exe 4772 svchcst.exe 4772 svchcst.exe 4772 svchcst.exe 4772 svchcst.exe 4772 svchcst.exe 4772 svchcst.exe 4772 svchcst.exe 4772 svchcst.exe 4772 svchcst.exe 4772 svchcst.exe 4772 svchcst.exe 4772 svchcst.exe 4772 svchcst.exe 4772 svchcst.exe 4772 svchcst.exe 4772 svchcst.exe 4772 svchcst.exe 4772 svchcst.exe 4772 svchcst.exe 4772 svchcst.exe 4772 svchcst.exe 4772 svchcst.exe 4772 svchcst.exe 4772 svchcst.exe 4772 svchcst.exe 4772 svchcst.exe 4772 svchcst.exe 4772 svchcst.exe 4772 svchcst.exe 4772 svchcst.exe 4772 svchcst.exe 4772 svchcst.exe 4772 svchcst.exe 4772 svchcst.exe 4772 svchcst.exe 4772 svchcst.exe 4772 svchcst.exe 4772 svchcst.exe 4772 svchcst.exe 4772 svchcst.exe 4772 svchcst.exe 4772 svchcst.exe 4772 svchcst.exe 4772 svchcst.exe 4772 svchcst.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3592 d11fbabb7433f02e9affcae1882fcdfbb90cfeff6545d607d75ee194ec2e6d8c.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 3592 d11fbabb7433f02e9affcae1882fcdfbb90cfeff6545d607d75ee194ec2e6d8c.exe 3592 d11fbabb7433f02e9affcae1882fcdfbb90cfeff6545d607d75ee194ec2e6d8c.exe 4772 svchcst.exe 4772 svchcst.exe 2924 svchcst.exe 2924 svchcst.exe 4780 svchcst.exe 4780 svchcst.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 3592 wrote to memory of 3896 3592 d11fbabb7433f02e9affcae1882fcdfbb90cfeff6545d607d75ee194ec2e6d8c.exe 87 PID 3592 wrote to memory of 3896 3592 d11fbabb7433f02e9affcae1882fcdfbb90cfeff6545d607d75ee194ec2e6d8c.exe 87 PID 3592 wrote to memory of 3896 3592 d11fbabb7433f02e9affcae1882fcdfbb90cfeff6545d607d75ee194ec2e6d8c.exe 87 PID 3592 wrote to memory of 984 3592 d11fbabb7433f02e9affcae1882fcdfbb90cfeff6545d607d75ee194ec2e6d8c.exe 88 PID 3592 wrote to memory of 984 3592 d11fbabb7433f02e9affcae1882fcdfbb90cfeff6545d607d75ee194ec2e6d8c.exe 88 PID 3592 wrote to memory of 984 3592 d11fbabb7433f02e9affcae1882fcdfbb90cfeff6545d607d75ee194ec2e6d8c.exe 88 PID 3896 wrote to memory of 4772 3896 WScript.exe 95 PID 3896 wrote to memory of 4772 3896 WScript.exe 95 PID 3896 wrote to memory of 4772 3896 WScript.exe 95 PID 4772 wrote to memory of 3872 4772 svchcst.exe 96 PID 4772 wrote to memory of 3872 4772 svchcst.exe 96 PID 4772 wrote to memory of 3872 4772 svchcst.exe 96 PID 4772 wrote to memory of 1744 4772 svchcst.exe 97 PID 4772 wrote to memory of 1744 4772 svchcst.exe 97 PID 4772 wrote to memory of 1744 4772 svchcst.exe 97 PID 1744 wrote to memory of 2924 1744 WScript.exe 100 PID 1744 wrote to memory of 2924 1744 WScript.exe 100 PID 1744 wrote to memory of 2924 1744 WScript.exe 100 PID 3872 wrote to memory of 4780 3872 WScript.exe 101 PID 3872 wrote to memory of 4780 3872 WScript.exe 101 PID 3872 wrote to memory of 4780 3872 WScript.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\d11fbabb7433f02e9affcae1882fcdfbb90cfeff6545d607d75ee194ec2e6d8c.exe"C:\Users\Admin\AppData\Local\Temp\d11fbabb7433f02e9affcae1882fcdfbb90cfeff6545d607d75ee194ec2e6d8c.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3592 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3896 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"4⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3872 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4780
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"4⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2924
-
-
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:984
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92B
MD567b9b3e2ded7086f393ebbc36c5e7bca
SHA1e6299d0450b9a92a18cc23b5704a2b475652c790
SHA25644063c266686263f14cd2a83fee124fb3e61a9171a6aab69709464f49511011d
SHA512826fbc9481f46b1ae3db828a665c55c349023caf563e6e8c17321f5f3af3e4c3914955db6f0eebfc6defe561315435d47310b4d0499ab9c2c85bb61264dedc09
-
Filesize
696B
MD55ef4272f4d6f345fc8cc1b2f059c81b4
SHA178bcb559f775d70e10396e1d6d7b95c28d2645d1
SHA25619f8d5209b4a5789cdfd5b67cb0b9f6c3546c62912bcb1ef1c69a15602beb652
SHA512002693255c600456d965b5a7e36f780deec4d80cd9fe56f7f974b8762e2b140002a1dabf4b059d6163c9cc00a0e1e9da71899e13347fb4bb2985bbc7058469cb
-
Filesize
753B
MD5215cc4e126dc8b2b199d791c1bed45ef
SHA1d9f60623562cc8e56fe2daead6b0148d76ff5702
SHA2569fb7c865c8d19712eaf6d7717867f94d06406b12d0e690230285e39ecd52d8a2
SHA512b4c5335e7c7387bc38b767079c254508bc3561c4d00530cc42ecfad001a3f24aaf3cee983624df3f472303b2d743663c7c569d35e8c714cefa9b024f032495be
-
Filesize
1.1MB
MD5090737c9d0f7693741f7644d2772f181
SHA190b920e8e8b000c3a590b5f01379f5071e8d1e2b
SHA256864b31878d39a0955fd40899e18f48851858e420cfaf59c8151497e2c02e6c7b
SHA5127bc89bace6feaa5de0cc36c153aef0163b96a2c9841a86a5f910029a08dec58651f75c0a6550155eb39b4ac6c637f4deabc61dab53f626a4a99c51e5409358f7
-
Filesize
1.1MB
MD5c0d26b212bb2d235f911425860c2a202
SHA10b7c02594103436025ef0c933ac50b93eed83bc5
SHA25614935d6391e2f4c1072df4b981afd14a4b9b81619f6d7dff056ce87ec6a961c4
SHA5128aefa6dd8e5669c850e53b62a4d663571630b19b6a35a303c27cf009781e674a525abee411dfd7a7c023cccff039db459383834736d07a26d14658b29450a9b0