Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
105s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01/09/2024, 05:25
Static task
static1
Behavioral task
behavioral1
Sample
3da775350d0ae2e7e03c8844ee70fa5d4c689bc9188266b266e9eae17a91f492.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3da775350d0ae2e7e03c8844ee70fa5d4c689bc9188266b266e9eae17a91f492.exe
Resource
win10v2004-20240802-en
General
-
Target
3da775350d0ae2e7e03c8844ee70fa5d4c689bc9188266b266e9eae17a91f492.exe
-
Size
1.1MB
-
MD5
596101e66d930e018f63b440c56c1726
-
SHA1
0e3726435db251e7f74b89559afbfa2f060180f1
-
SHA256
3da775350d0ae2e7e03c8844ee70fa5d4c689bc9188266b266e9eae17a91f492
-
SHA512
83e6f4fe57bd578226b848c8d187549b9f44ff0bc032a2cb366fee38a85c400f7116b8da4de1d78c10ef5c792af2d79ef1dcc1268a1a7958493e6146f0189e4c
-
SSDEEP
24576:aH0dl8myX9Bg42QoXFkrzkmplSgRDYo0lG4Z8r7Qfbkiu5QJ:acallSllG4ZM7QzMq
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation 3da775350d0ae2e7e03c8844ee70fa5d4c689bc9188266b266e9eae17a91f492.exe Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation WScript.exe -
Deletes itself 1 IoCs
pid Process 2352 svchcst.exe -
Executes dropped EXE 2 IoCs
pid Process 2352 svchcst.exe 1592 svchcst.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3da775350d0ae2e7e03c8844ee70fa5d4c689bc9188266b266e9eae17a91f492.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings 3da775350d0ae2e7e03c8844ee70fa5d4c689bc9188266b266e9eae17a91f492.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1004 3da775350d0ae2e7e03c8844ee70fa5d4c689bc9188266b266e9eae17a91f492.exe 1004 3da775350d0ae2e7e03c8844ee70fa5d4c689bc9188266b266e9eae17a91f492.exe 1004 3da775350d0ae2e7e03c8844ee70fa5d4c689bc9188266b266e9eae17a91f492.exe 1004 3da775350d0ae2e7e03c8844ee70fa5d4c689bc9188266b266e9eae17a91f492.exe 2352 svchcst.exe 2352 svchcst.exe 2352 svchcst.exe 2352 svchcst.exe 2352 svchcst.exe 2352 svchcst.exe 2352 svchcst.exe 2352 svchcst.exe 2352 svchcst.exe 2352 svchcst.exe 2352 svchcst.exe 2352 svchcst.exe 2352 svchcst.exe 2352 svchcst.exe 2352 svchcst.exe 2352 svchcst.exe 2352 svchcst.exe 2352 svchcst.exe 2352 svchcst.exe 2352 svchcst.exe 2352 svchcst.exe 2352 svchcst.exe 2352 svchcst.exe 2352 svchcst.exe 2352 svchcst.exe 2352 svchcst.exe 2352 svchcst.exe 2352 svchcst.exe 2352 svchcst.exe 2352 svchcst.exe 2352 svchcst.exe 2352 svchcst.exe 2352 svchcst.exe 2352 svchcst.exe 2352 svchcst.exe 2352 svchcst.exe 2352 svchcst.exe 2352 svchcst.exe 2352 svchcst.exe 2352 svchcst.exe 2352 svchcst.exe 2352 svchcst.exe 2352 svchcst.exe 2352 svchcst.exe 2352 svchcst.exe 2352 svchcst.exe 2352 svchcst.exe 2352 svchcst.exe 2352 svchcst.exe 2352 svchcst.exe 2352 svchcst.exe 2352 svchcst.exe 2352 svchcst.exe 2352 svchcst.exe 2352 svchcst.exe 2352 svchcst.exe 2352 svchcst.exe 2352 svchcst.exe 2352 svchcst.exe 2352 svchcst.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1004 3da775350d0ae2e7e03c8844ee70fa5d4c689bc9188266b266e9eae17a91f492.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1004 3da775350d0ae2e7e03c8844ee70fa5d4c689bc9188266b266e9eae17a91f492.exe 1004 3da775350d0ae2e7e03c8844ee70fa5d4c689bc9188266b266e9eae17a91f492.exe 2352 svchcst.exe 2352 svchcst.exe 1592 svchcst.exe 1592 svchcst.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1004 wrote to memory of 2572 1004 3da775350d0ae2e7e03c8844ee70fa5d4c689bc9188266b266e9eae17a91f492.exe 87 PID 1004 wrote to memory of 3380 1004 3da775350d0ae2e7e03c8844ee70fa5d4c689bc9188266b266e9eae17a91f492.exe 86 PID 1004 wrote to memory of 3380 1004 3da775350d0ae2e7e03c8844ee70fa5d4c689bc9188266b266e9eae17a91f492.exe 86 PID 1004 wrote to memory of 3380 1004 3da775350d0ae2e7e03c8844ee70fa5d4c689bc9188266b266e9eae17a91f492.exe 86 PID 1004 wrote to memory of 2572 1004 3da775350d0ae2e7e03c8844ee70fa5d4c689bc9188266b266e9eae17a91f492.exe 87 PID 1004 wrote to memory of 2572 1004 3da775350d0ae2e7e03c8844ee70fa5d4c689bc9188266b266e9eae17a91f492.exe 87 PID 3380 wrote to memory of 1592 3380 WScript.exe 96 PID 3380 wrote to memory of 1592 3380 WScript.exe 96 PID 3380 wrote to memory of 1592 3380 WScript.exe 96 PID 2572 wrote to memory of 2352 2572 WScript.exe 97 PID 2572 wrote to memory of 2352 2572 WScript.exe 97 PID 2572 wrote to memory of 2352 2572 WScript.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\3da775350d0ae2e7e03c8844ee70fa5d4c689bc9188266b266e9eae17a91f492.exe"C:\Users\Admin\AppData\Local\Temp\3da775350d0ae2e7e03c8844ee70fa5d4c689bc9188266b266e9eae17a91f492.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1004 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3380 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1592
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2352
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
753B
MD51438c9ee1078c3432f11deda5c20484b
SHA1a530dc257573ead4650dc8a20f0179acb2a22a72
SHA25655c5e6fac661414080319eff6779fa8ab297a9ca0d08c05774f402d605058833
SHA512ec4fea8cfcb032daf6615323d927a42a9a4d691afed614172b5a0a9dba4c6acc7c39e618923e818cf0db9ea72726a8741d616c226fc145b14e18957e8cda69c8
-
Filesize
1.1MB
MD5c26af7ed28543ad499a976f39787a15f
SHA14cd31dfc11ccc8b86837145c052d78458b1c9432
SHA2560a2aad3efedbe17fbeaf05c7c3ee1b6dab86bb3a175f4a6a36cede36fda319c8
SHA512fa7f65717c122b397ab8d05f20ad1f979a2cd0864400b6eafed7b24eea6c194af1247b007e98c088d439a4f37dab60522f7a41da2556b045d2fa51fe5c6cb8b2