Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
97s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/09/2024, 14:55
Static task
static1
Behavioral task
behavioral1
Sample
2bbb0824cc827b5f8123d2b019a2fc64cf5adea2e78f98e9e88f179231af3978.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2bbb0824cc827b5f8123d2b019a2fc64cf5adea2e78f98e9e88f179231af3978.exe
Resource
win10v2004-20240802-en
General
-
Target
2bbb0824cc827b5f8123d2b019a2fc64cf5adea2e78f98e9e88f179231af3978.exe
-
Size
1.1MB
-
MD5
6d8189af494c28ac1e2e6a8ac334ef54
-
SHA1
816b68e8b8d128a3a4a2e5dd7caf594b46c147dd
-
SHA256
2bbb0824cc827b5f8123d2b019a2fc64cf5adea2e78f98e9e88f179231af3978
-
SHA512
6ada67f00be6483e1f961af5ae7613fbd809768f9a3e9d355c9636d8b42b99650e9c19818b4641275e70c3b5c7bde1e74ca1eef44da051ce227b258fc1ff37e4
-
SSDEEP
24576:aH0dl8myX9Bg42QoXFkrzkmplSgRDYo0lG4Z8r7Qfbkiu5Q3:acallSllG4ZM7QzMA
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation 2bbb0824cc827b5f8123d2b019a2fc64cf5adea2e78f98e9e88f179231af3978.exe Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation WScript.exe -
Deletes itself 1 IoCs
pid Process 3400 svchcst.exe -
Executes dropped EXE 2 IoCs
pid Process 3400 svchcst.exe 2760 svchcst.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2bbb0824cc827b5f8123d2b019a2fc64cf5adea2e78f98e9e88f179231af3978.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\Local Settings 2bbb0824cc827b5f8123d2b019a2fc64cf5adea2e78f98e9e88f179231af3978.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 540 2bbb0824cc827b5f8123d2b019a2fc64cf5adea2e78f98e9e88f179231af3978.exe 540 2bbb0824cc827b5f8123d2b019a2fc64cf5adea2e78f98e9e88f179231af3978.exe 540 2bbb0824cc827b5f8123d2b019a2fc64cf5adea2e78f98e9e88f179231af3978.exe 540 2bbb0824cc827b5f8123d2b019a2fc64cf5adea2e78f98e9e88f179231af3978.exe 3400 svchcst.exe 3400 svchcst.exe 3400 svchcst.exe 3400 svchcst.exe 3400 svchcst.exe 3400 svchcst.exe 3400 svchcst.exe 3400 svchcst.exe 3400 svchcst.exe 3400 svchcst.exe 3400 svchcst.exe 3400 svchcst.exe 3400 svchcst.exe 3400 svchcst.exe 3400 svchcst.exe 3400 svchcst.exe 3400 svchcst.exe 3400 svchcst.exe 3400 svchcst.exe 3400 svchcst.exe 3400 svchcst.exe 3400 svchcst.exe 3400 svchcst.exe 3400 svchcst.exe 3400 svchcst.exe 3400 svchcst.exe 3400 svchcst.exe 3400 svchcst.exe 3400 svchcst.exe 3400 svchcst.exe 3400 svchcst.exe 3400 svchcst.exe 3400 svchcst.exe 3400 svchcst.exe 3400 svchcst.exe 3400 svchcst.exe 3400 svchcst.exe 3400 svchcst.exe 3400 svchcst.exe 3400 svchcst.exe 3400 svchcst.exe 3400 svchcst.exe 3400 svchcst.exe 3400 svchcst.exe 3400 svchcst.exe 3400 svchcst.exe 3400 svchcst.exe 3400 svchcst.exe 3400 svchcst.exe 3400 svchcst.exe 3400 svchcst.exe 3400 svchcst.exe 3400 svchcst.exe 3400 svchcst.exe 3400 svchcst.exe 3400 svchcst.exe 3400 svchcst.exe 3400 svchcst.exe 3400 svchcst.exe 3400 svchcst.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 540 2bbb0824cc827b5f8123d2b019a2fc64cf5adea2e78f98e9e88f179231af3978.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 540 2bbb0824cc827b5f8123d2b019a2fc64cf5adea2e78f98e9e88f179231af3978.exe 540 2bbb0824cc827b5f8123d2b019a2fc64cf5adea2e78f98e9e88f179231af3978.exe 3400 svchcst.exe 3400 svchcst.exe 2760 svchcst.exe 2760 svchcst.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 540 wrote to memory of 1828 540 2bbb0824cc827b5f8123d2b019a2fc64cf5adea2e78f98e9e88f179231af3978.exe 87 PID 540 wrote to memory of 1828 540 2bbb0824cc827b5f8123d2b019a2fc64cf5adea2e78f98e9e88f179231af3978.exe 87 PID 540 wrote to memory of 1828 540 2bbb0824cc827b5f8123d2b019a2fc64cf5adea2e78f98e9e88f179231af3978.exe 87 PID 540 wrote to memory of 5064 540 2bbb0824cc827b5f8123d2b019a2fc64cf5adea2e78f98e9e88f179231af3978.exe 88 PID 540 wrote to memory of 5064 540 2bbb0824cc827b5f8123d2b019a2fc64cf5adea2e78f98e9e88f179231af3978.exe 88 PID 540 wrote to memory of 5064 540 2bbb0824cc827b5f8123d2b019a2fc64cf5adea2e78f98e9e88f179231af3978.exe 88 PID 1828 wrote to memory of 3400 1828 WScript.exe 96 PID 1828 wrote to memory of 3400 1828 WScript.exe 96 PID 1828 wrote to memory of 3400 1828 WScript.exe 96 PID 5064 wrote to memory of 2760 5064 WScript.exe 97 PID 5064 wrote to memory of 2760 5064 WScript.exe 97 PID 5064 wrote to memory of 2760 5064 WScript.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\2bbb0824cc827b5f8123d2b019a2fc64cf5adea2e78f98e9e88f179231af3978.exe"C:\Users\Admin\AppData\Local\Temp\2bbb0824cc827b5f8123d2b019a2fc64cf5adea2e78f98e9e88f179231af3978.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3400
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2760
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
753B
MD5f94f2cffb6388fbc2dbfb8001a68c366
SHA150efad2dc34d642d9bd1184413e2bc303abd7fab
SHA2569957a7df6c1c60632dd31256534b01fded33859a4dacbdda6bb6aedba39c9581
SHA512692daf38172a6ed3ba4ab7e059da4cbf094e2b6d5575401761a1a822aeeda8443c7f705d9874fc838b919a5df6ae797542819aa5bd8bd49e00c7601737878936
-
Filesize
1.1MB
MD544d42adf55b3ed0482850e580e5b5394
SHA1756371bb1d79a873c742d15b58d8efe3d9d404fb
SHA2565ecc4a8e7e22afccc2fc1fdc1640ec339096d3951aa15c5002bf664d3baa78a5
SHA512347fed3fb05740d1b528a1fd36997cf104af1d98af80d4d17654c65b4de9b5dc996beb8d7a3f66e0e0caa0a52afcc2df35b63f248f64d91ebf626a2a99d62c42