Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05/08/2024, 19:51
Static task
static1
Behavioral task
behavioral1
Sample
a97974a9207e20a5eb6848212afec2c9c27f5c83abca3a70e51eae6be1b1b56e.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a97974a9207e20a5eb6848212afec2c9c27f5c83abca3a70e51eae6be1b1b56e.exe
Resource
win10v2004-20240802-en
General
-
Target
a97974a9207e20a5eb6848212afec2c9c27f5c83abca3a70e51eae6be1b1b56e.exe
-
Size
1.1MB
-
MD5
73d908cd0e8e8658fc4a0ce8d71c66bc
-
SHA1
3e9302fbde0d06776ed05d85f7043c9f704ea95e
-
SHA256
a97974a9207e20a5eb6848212afec2c9c27f5c83abca3a70e51eae6be1b1b56e
-
SHA512
c5a76ea7ecff74f3f389023ad41773b8cb2848da747054914ba11a20164102fb02e9136cc88a58b26d325df644945ebd32564e96d41b65a8f3aba1bcb21e06a7
-
SSDEEP
24576:CH0dl8myX9Bg42QoXFkrzkmmlSgRDko0lG4Z8r7Qfbkiu5Qk:CcaClSFlG4ZM7QzMD
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation a97974a9207e20a5eb6848212afec2c9c27f5c83abca3a70e51eae6be1b1b56e.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation WScript.exe -
Deletes itself 1 IoCs
pid Process 2264 svchcst.exe -
Executes dropped EXE 2 IoCs
pid Process 2264 svchcst.exe 4848 svchcst.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a97974a9207e20a5eb6848212afec2c9c27f5c83abca3a70e51eae6be1b1b56e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings a97974a9207e20a5eb6848212afec2c9c27f5c83abca3a70e51eae6be1b1b56e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4820 a97974a9207e20a5eb6848212afec2c9c27f5c83abca3a70e51eae6be1b1b56e.exe 4820 a97974a9207e20a5eb6848212afec2c9c27f5c83abca3a70e51eae6be1b1b56e.exe 4820 a97974a9207e20a5eb6848212afec2c9c27f5c83abca3a70e51eae6be1b1b56e.exe 4820 a97974a9207e20a5eb6848212afec2c9c27f5c83abca3a70e51eae6be1b1b56e.exe 2264 svchcst.exe 2264 svchcst.exe 2264 svchcst.exe 2264 svchcst.exe 2264 svchcst.exe 2264 svchcst.exe 2264 svchcst.exe 2264 svchcst.exe 2264 svchcst.exe 2264 svchcst.exe 2264 svchcst.exe 2264 svchcst.exe 2264 svchcst.exe 2264 svchcst.exe 2264 svchcst.exe 2264 svchcst.exe 2264 svchcst.exe 2264 svchcst.exe 2264 svchcst.exe 2264 svchcst.exe 2264 svchcst.exe 2264 svchcst.exe 2264 svchcst.exe 2264 svchcst.exe 2264 svchcst.exe 2264 svchcst.exe 2264 svchcst.exe 2264 svchcst.exe 2264 svchcst.exe 2264 svchcst.exe 2264 svchcst.exe 2264 svchcst.exe 2264 svchcst.exe 2264 svchcst.exe 2264 svchcst.exe 2264 svchcst.exe 2264 svchcst.exe 2264 svchcst.exe 2264 svchcst.exe 2264 svchcst.exe 2264 svchcst.exe 2264 svchcst.exe 2264 svchcst.exe 2264 svchcst.exe 2264 svchcst.exe 2264 svchcst.exe 2264 svchcst.exe 2264 svchcst.exe 2264 svchcst.exe 2264 svchcst.exe 2264 svchcst.exe 2264 svchcst.exe 2264 svchcst.exe 2264 svchcst.exe 2264 svchcst.exe 2264 svchcst.exe 2264 svchcst.exe 2264 svchcst.exe 2264 svchcst.exe 2264 svchcst.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4820 a97974a9207e20a5eb6848212afec2c9c27f5c83abca3a70e51eae6be1b1b56e.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 4820 a97974a9207e20a5eb6848212afec2c9c27f5c83abca3a70e51eae6be1b1b56e.exe 4820 a97974a9207e20a5eb6848212afec2c9c27f5c83abca3a70e51eae6be1b1b56e.exe 2264 svchcst.exe 2264 svchcst.exe 4848 svchcst.exe 4848 svchcst.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4820 wrote to memory of 1616 4820 a97974a9207e20a5eb6848212afec2c9c27f5c83abca3a70e51eae6be1b1b56e.exe 87 PID 4820 wrote to memory of 1616 4820 a97974a9207e20a5eb6848212afec2c9c27f5c83abca3a70e51eae6be1b1b56e.exe 87 PID 4820 wrote to memory of 1616 4820 a97974a9207e20a5eb6848212afec2c9c27f5c83abca3a70e51eae6be1b1b56e.exe 87 PID 4820 wrote to memory of 1204 4820 a97974a9207e20a5eb6848212afec2c9c27f5c83abca3a70e51eae6be1b1b56e.exe 86 PID 4820 wrote to memory of 1204 4820 a97974a9207e20a5eb6848212afec2c9c27f5c83abca3a70e51eae6be1b1b56e.exe 86 PID 4820 wrote to memory of 1204 4820 a97974a9207e20a5eb6848212afec2c9c27f5c83abca3a70e51eae6be1b1b56e.exe 86 PID 1204 wrote to memory of 4848 1204 WScript.exe 90 PID 1204 wrote to memory of 4848 1204 WScript.exe 90 PID 1204 wrote to memory of 4848 1204 WScript.exe 90 PID 1616 wrote to memory of 2264 1616 WScript.exe 89 PID 1616 wrote to memory of 2264 1616 WScript.exe 89 PID 1616 wrote to memory of 2264 1616 WScript.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\a97974a9207e20a5eb6848212afec2c9c27f5c83abca3a70e51eae6be1b1b56e.exe"C:\Users\Admin\AppData\Local\Temp\a97974a9207e20a5eb6848212afec2c9c27f5c83abca3a70e51eae6be1b1b56e.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4848
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2264
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
753B
MD5dd21caa5dd2fcbcc5465ac066176515a
SHA14f0a10fe173e110ae8d1db1214b5a8f854f984da
SHA2562b33c65955722efe28f292691ee60420f8915576b3277d6275be051c8ba3653f
SHA51213c3f8f02b17bde0e27571186a2e10da4474e71d01be04f47342f9246a3e5d14d587b3036dce1dc3c933c946f4d59d6b84b2bbe9be064105cf1b6cf5a27f7c9d
-
Filesize
1.1MB
MD565fe6eb332d393ae0eb6f044632d09fd
SHA1eced5b852618833e8acdc64f3b1822d146b4c370
SHA256ac0d1df8590ab7adef8c507c4adcd7cd4bc88f0af2ec676e4a488a1f596dbeca
SHA5126cdad0cf1240e592304381881e584aad138b378a943de68f318914022899974a1f9c2001e241dcd466fb158fffc518ddbf7fa249c1e2351e2e3345067fc2c04a