Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/08/2024, 00:08
Static task
static1
Behavioral task
behavioral1
Sample
e27dac42621d2d54d2924491dd23f93152e042df9f66bd17e03bea7820f8d28b.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
e27dac42621d2d54d2924491dd23f93152e042df9f66bd17e03bea7820f8d28b.exe
Resource
win10v2004-20240802-en
General
-
Target
e27dac42621d2d54d2924491dd23f93152e042df9f66bd17e03bea7820f8d28b.exe
-
Size
1.1MB
-
MD5
817ded36ac83df717fca28eb5389a9e1
-
SHA1
acca237258df7f7442ff3d9e759913ea83edbaa0
-
SHA256
e27dac42621d2d54d2924491dd23f93152e042df9f66bd17e03bea7820f8d28b
-
SHA512
2ddbd81c633d9d6fb24a75ea0c32a74eec5c4049ddb29c2c032b2b1392e4a7917a5afc672811bd7702803c44fa68c971e57ca3ab4538bc71ebb90e148e3fe252
-
SSDEEP
24576:CH0dl8myX9Bg42QoXFkrzkmmlSgRDko0lG4Z8r7Qfbkiu5Qr:CcaClSFlG4ZM7QzMs
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation e27dac42621d2d54d2924491dd23f93152e042df9f66bd17e03bea7820f8d28b.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation WScript.exe -
Deletes itself 1 IoCs
pid Process 4784 svchcst.exe -
Executes dropped EXE 2 IoCs
pid Process 3064 svchcst.exe 4784 svchcst.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e27dac42621d2d54d2924491dd23f93152e042df9f66bd17e03bea7820f8d28b.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\Local Settings e27dac42621d2d54d2924491dd23f93152e042df9f66bd17e03bea7820f8d28b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1684 e27dac42621d2d54d2924491dd23f93152e042df9f66bd17e03bea7820f8d28b.exe 1684 e27dac42621d2d54d2924491dd23f93152e042df9f66bd17e03bea7820f8d28b.exe 1684 e27dac42621d2d54d2924491dd23f93152e042df9f66bd17e03bea7820f8d28b.exe 1684 e27dac42621d2d54d2924491dd23f93152e042df9f66bd17e03bea7820f8d28b.exe 4784 svchcst.exe 4784 svchcst.exe 4784 svchcst.exe 4784 svchcst.exe 4784 svchcst.exe 4784 svchcst.exe 4784 svchcst.exe 4784 svchcst.exe 4784 svchcst.exe 4784 svchcst.exe 4784 svchcst.exe 4784 svchcst.exe 4784 svchcst.exe 4784 svchcst.exe 4784 svchcst.exe 4784 svchcst.exe 4784 svchcst.exe 4784 svchcst.exe 4784 svchcst.exe 4784 svchcst.exe 4784 svchcst.exe 4784 svchcst.exe 4784 svchcst.exe 4784 svchcst.exe 4784 svchcst.exe 4784 svchcst.exe 4784 svchcst.exe 4784 svchcst.exe 4784 svchcst.exe 4784 svchcst.exe 4784 svchcst.exe 4784 svchcst.exe 4784 svchcst.exe 4784 svchcst.exe 4784 svchcst.exe 4784 svchcst.exe 4784 svchcst.exe 4784 svchcst.exe 4784 svchcst.exe 4784 svchcst.exe 4784 svchcst.exe 4784 svchcst.exe 4784 svchcst.exe 4784 svchcst.exe 4784 svchcst.exe 4784 svchcst.exe 4784 svchcst.exe 4784 svchcst.exe 4784 svchcst.exe 4784 svchcst.exe 4784 svchcst.exe 4784 svchcst.exe 4784 svchcst.exe 4784 svchcst.exe 4784 svchcst.exe 4784 svchcst.exe 4784 svchcst.exe 4784 svchcst.exe 4784 svchcst.exe 4784 svchcst.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1684 e27dac42621d2d54d2924491dd23f93152e042df9f66bd17e03bea7820f8d28b.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1684 e27dac42621d2d54d2924491dd23f93152e042df9f66bd17e03bea7820f8d28b.exe 1684 e27dac42621d2d54d2924491dd23f93152e042df9f66bd17e03bea7820f8d28b.exe 4784 svchcst.exe 3064 svchcst.exe 4784 svchcst.exe 3064 svchcst.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1684 wrote to memory of 4352 1684 e27dac42621d2d54d2924491dd23f93152e042df9f66bd17e03bea7820f8d28b.exe 85 PID 1684 wrote to memory of 4352 1684 e27dac42621d2d54d2924491dd23f93152e042df9f66bd17e03bea7820f8d28b.exe 85 PID 1684 wrote to memory of 4352 1684 e27dac42621d2d54d2924491dd23f93152e042df9f66bd17e03bea7820f8d28b.exe 85 PID 1684 wrote to memory of 3576 1684 e27dac42621d2d54d2924491dd23f93152e042df9f66bd17e03bea7820f8d28b.exe 86 PID 1684 wrote to memory of 3576 1684 e27dac42621d2d54d2924491dd23f93152e042df9f66bd17e03bea7820f8d28b.exe 86 PID 1684 wrote to memory of 3576 1684 e27dac42621d2d54d2924491dd23f93152e042df9f66bd17e03bea7820f8d28b.exe 86 PID 4352 wrote to memory of 3064 4352 WScript.exe 94 PID 4352 wrote to memory of 3064 4352 WScript.exe 94 PID 4352 wrote to memory of 3064 4352 WScript.exe 94 PID 3576 wrote to memory of 4784 3576 WScript.exe 95 PID 3576 wrote to memory of 4784 3576 WScript.exe 95 PID 3576 wrote to memory of 4784 3576 WScript.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\e27dac42621d2d54d2924491dd23f93152e042df9f66bd17e03bea7820f8d28b.exe"C:\Users\Admin\AppData\Local\Temp\e27dac42621d2d54d2924491dd23f93152e042df9f66bd17e03bea7820f8d28b.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4352 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3064
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3576 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4784
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
753B
MD54de8808b265f28a10c0730201a9fc60a
SHA101cc97676387be73d60c2ec81d5f04020e2c7da5
SHA256c8b7287f6c65be8ce70cbb2ca5a047dd8553e12377135d2e588ca9866ccb1f41
SHA512e81e15d754a774d203daab288093562c04bee0fa425e8617944e705bd65b6a32ddc3da21a4bb32b424e38af9770124d8d26504eb5c6f5db8aaf2a7a342756a68
-
Filesize
1.1MB
MD56d7b44c632d42ea636759814d39daf30
SHA1026bf516a0ed62ae2ad30509ed6e00bdf608fd5f
SHA256f5fef07c8327b92a3f1fd1cb6bd2e760c882aaff343ea06cb42c0539441f2f40
SHA5121f384a4dba4144d14682948ac89dc458f49a95ad8908ae705d1266c0c4f45e90c5b059f257108b030f5a0faa712e6cf1346249b2999cb0142308357808e8a8ab