Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/08/2024, 01:43
Static task
static1
Behavioral task
behavioral1
Sample
7c2ab36c4db4cb30fe012065dbf33ffbe93657f199c01b2c673dc11665bebcfc.vbs
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
7c2ab36c4db4cb30fe012065dbf33ffbe93657f199c01b2c673dc11665bebcfc.vbs
Resource
win10v2004-20240802-en
General
-
Target
7c2ab36c4db4cb30fe012065dbf33ffbe93657f199c01b2c673dc11665bebcfc.vbs
-
Size
1KB
-
MD5
0ba4c2427b752c7315a05428a6eec521
-
SHA1
3ce6a1bcfbdac6f334800f9b8628b76235015d24
-
SHA256
7c2ab36c4db4cb30fe012065dbf33ffbe93657f199c01b2c673dc11665bebcfc
-
SHA512
9049a8ea8f83659b1b34d3e9a0f15f7bc6ad034702e0d98a59205a5101e73c701eb5bac0386bbc313a23edcb7834201f686e1b293358eb8bff4f9e6623ccaac9
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3220 wrote to memory of 3900 3220 WScript.exe 86 PID 3220 wrote to memory of 3900 3220 WScript.exe 86 PID 3900 wrote to memory of 1336 3900 net.exe 88 PID 3900 wrote to memory of 1336 3900 net.exe 88
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\7c2ab36c4db4cb30fe012065dbf33ffbe93657f199c01b2c673dc11665bebcfc.vbs"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3220 -
C:\Windows\System32\net.exe"C:\Windows\System32\net.exe" session2⤵
- Suspicious use of WriteProcessMemory
PID:3900 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 session3⤵PID:1336
-
-