Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
100s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08/08/2024, 20:39
Static task
static1
Behavioral task
behavioral1
Sample
49a149e73c444f6ea743ffae3567324753555af9d12c2919d8d9742550383090.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
49a149e73c444f6ea743ffae3567324753555af9d12c2919d8d9742550383090.exe
Resource
win10v2004-20240802-en
General
-
Target
49a149e73c444f6ea743ffae3567324753555af9d12c2919d8d9742550383090.exe
-
Size
1.1MB
-
MD5
a771eb9e4ee3091ffb3770c2b9fb32f8
-
SHA1
c9c9216267b8045b6514602241cd9f81589c0699
-
SHA256
49a149e73c444f6ea743ffae3567324753555af9d12c2919d8d9742550383090
-
SHA512
fc69c7f13a21114d3f6dcc577715a83c7a970c2c0397ca8f8d5f1d57ef7bf46426555bc398c7cd50e438cc51bc7cb171e1e59e07572baa855e78ee2eb7cdaa1b
-
SSDEEP
24576:aH0dl8myX9Bg42QoXFkrzkmplSgRDYo0lG4Z8r7Qfbkiu5Qy:acallSllG4ZM7QzMx
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation 49a149e73c444f6ea743ffae3567324753555af9d12c2919d8d9742550383090.exe Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation WScript.exe -
Deletes itself 1 IoCs
pid Process 5812 svchcst.exe -
Executes dropped EXE 2 IoCs
pid Process 5812 svchcst.exe 4688 svchcst.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 49a149e73c444f6ea743ffae3567324753555af9d12c2919d8d9742550383090.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings 49a149e73c444f6ea743ffae3567324753555af9d12c2919d8d9742550383090.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3384 49a149e73c444f6ea743ffae3567324753555af9d12c2919d8d9742550383090.exe 3384 49a149e73c444f6ea743ffae3567324753555af9d12c2919d8d9742550383090.exe 3384 49a149e73c444f6ea743ffae3567324753555af9d12c2919d8d9742550383090.exe 3384 49a149e73c444f6ea743ffae3567324753555af9d12c2919d8d9742550383090.exe 5812 svchcst.exe 5812 svchcst.exe 5812 svchcst.exe 5812 svchcst.exe 5812 svchcst.exe 5812 svchcst.exe 5812 svchcst.exe 5812 svchcst.exe 5812 svchcst.exe 5812 svchcst.exe 5812 svchcst.exe 5812 svchcst.exe 5812 svchcst.exe 5812 svchcst.exe 5812 svchcst.exe 5812 svchcst.exe 5812 svchcst.exe 5812 svchcst.exe 5812 svchcst.exe 5812 svchcst.exe 5812 svchcst.exe 5812 svchcst.exe 5812 svchcst.exe 5812 svchcst.exe 5812 svchcst.exe 5812 svchcst.exe 5812 svchcst.exe 5812 svchcst.exe 5812 svchcst.exe 5812 svchcst.exe 5812 svchcst.exe 5812 svchcst.exe 5812 svchcst.exe 5812 svchcst.exe 5812 svchcst.exe 5812 svchcst.exe 5812 svchcst.exe 5812 svchcst.exe 5812 svchcst.exe 5812 svchcst.exe 5812 svchcst.exe 5812 svchcst.exe 5812 svchcst.exe 5812 svchcst.exe 5812 svchcst.exe 5812 svchcst.exe 5812 svchcst.exe 5812 svchcst.exe 5812 svchcst.exe 5812 svchcst.exe 5812 svchcst.exe 5812 svchcst.exe 5812 svchcst.exe 5812 svchcst.exe 5812 svchcst.exe 5812 svchcst.exe 5812 svchcst.exe 5812 svchcst.exe 5812 svchcst.exe 5812 svchcst.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3384 49a149e73c444f6ea743ffae3567324753555af9d12c2919d8d9742550383090.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3384 49a149e73c444f6ea743ffae3567324753555af9d12c2919d8d9742550383090.exe 3384 49a149e73c444f6ea743ffae3567324753555af9d12c2919d8d9742550383090.exe 5812 svchcst.exe 4688 svchcst.exe 4688 svchcst.exe 5812 svchcst.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3384 wrote to memory of 5964 3384 49a149e73c444f6ea743ffae3567324753555af9d12c2919d8d9742550383090.exe 87 PID 3384 wrote to memory of 5964 3384 49a149e73c444f6ea743ffae3567324753555af9d12c2919d8d9742550383090.exe 87 PID 3384 wrote to memory of 5964 3384 49a149e73c444f6ea743ffae3567324753555af9d12c2919d8d9742550383090.exe 87 PID 3384 wrote to memory of 2232 3384 49a149e73c444f6ea743ffae3567324753555af9d12c2919d8d9742550383090.exe 88 PID 3384 wrote to memory of 2232 3384 49a149e73c444f6ea743ffae3567324753555af9d12c2919d8d9742550383090.exe 88 PID 3384 wrote to memory of 2232 3384 49a149e73c444f6ea743ffae3567324753555af9d12c2919d8d9742550383090.exe 88 PID 5964 wrote to memory of 5812 5964 WScript.exe 90 PID 5964 wrote to memory of 5812 5964 WScript.exe 90 PID 5964 wrote to memory of 5812 5964 WScript.exe 90 PID 2232 wrote to memory of 4688 2232 WScript.exe 91 PID 2232 wrote to memory of 4688 2232 WScript.exe 91 PID 2232 wrote to memory of 4688 2232 WScript.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\49a149e73c444f6ea743ffae3567324753555af9d12c2919d8d9742550383090.exe"C:\Users\Admin\AppData\Local\Temp\49a149e73c444f6ea743ffae3567324753555af9d12c2919d8d9742550383090.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3384 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5964 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5812
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4688
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
753B
MD5bae269f373ffd290922c846c4d52a3a9
SHA164bc73ecc5778098ed6fb089b1f85b52539a6c10
SHA2567a197325e1ae12b1abe57bc38499eaa83c35f300edae0038b598d446041ef98c
SHA512c7c4f5b28927de49ac786cf9f7e8ee75288772f5d208239552b0ef0ceb973bd138dbc7bc02773ff1879a3821eb03749387ff5327cf723d64b802eba054089de2
-
Filesize
1.1MB
MD531ecd2309a0f3d6f6c158c7614a574ff
SHA122fb328ee99fcd956709bdcdb42a0c0a638edab3
SHA2569c5da292d9940b3be04e75e02a28907aa692a7d8997fb676fbe3c20ec3228763
SHA512b0a6d563cb70a3a8acde671b9c1e34f5f5db20fa0c1e37b90cf2fb8a81ccf080beefa4b659d4e454273ce1630431f6202d2baaaebb1c210d2d1740cb5de8d620