Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
94s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12/09/2024, 21:21
Static task
static1
Behavioral task
behavioral1
Sample
22e06758adb89be0a930abd4904bfeda512ac904c3393c166f50ad02ec6030ad.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
22e06758adb89be0a930abd4904bfeda512ac904c3393c166f50ad02ec6030ad.exe
Resource
win10v2004-20240802-en
General
-
Target
22e06758adb89be0a930abd4904bfeda512ac904c3393c166f50ad02ec6030ad.exe
-
Size
1.1MB
-
MD5
d6df933498bdf745aa38c9ff162d9cfe
-
SHA1
022a5575aba3bfd5f68a7af65cd9b454e7d0d1e2
-
SHA256
22e06758adb89be0a930abd4904bfeda512ac904c3393c166f50ad02ec6030ad
-
SHA512
35006b19da5d80a6d9238a4562b6098a2969e6d41afb1340743ea09aca90d42e2cebedca6f6f977f4002416d3cb77cc3489b070d6a1582e4e39a70a9f20916c0
-
SSDEEP
24576:CH0dl8myX9Bg42QoXFkrzkmmlSgRDko0lG4Z8r7Qfbkiu5Qd:CcaClSFlG4ZM7QzMW
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation 22e06758adb89be0a930abd4904bfeda512ac904c3393c166f50ad02ec6030ad.exe -
Deletes itself 1 IoCs
pid Process 3528 svchcst.exe -
Executes dropped EXE 2 IoCs
pid Process 3528 svchcst.exe 3840 svchcst.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 22e06758adb89be0a930abd4904bfeda512ac904c3393c166f50ad02ec6030ad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings 22e06758adb89be0a930abd4904bfeda512ac904c3393c166f50ad02ec6030ad.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 824 22e06758adb89be0a930abd4904bfeda512ac904c3393c166f50ad02ec6030ad.exe 824 22e06758adb89be0a930abd4904bfeda512ac904c3393c166f50ad02ec6030ad.exe 824 22e06758adb89be0a930abd4904bfeda512ac904c3393c166f50ad02ec6030ad.exe 824 22e06758adb89be0a930abd4904bfeda512ac904c3393c166f50ad02ec6030ad.exe 3528 svchcst.exe 3528 svchcst.exe 3528 svchcst.exe 3528 svchcst.exe 3528 svchcst.exe 3528 svchcst.exe 3528 svchcst.exe 3528 svchcst.exe 3528 svchcst.exe 3528 svchcst.exe 3528 svchcst.exe 3528 svchcst.exe 3528 svchcst.exe 3528 svchcst.exe 3528 svchcst.exe 3528 svchcst.exe 3528 svchcst.exe 3528 svchcst.exe 3528 svchcst.exe 3528 svchcst.exe 3528 svchcst.exe 3528 svchcst.exe 3528 svchcst.exe 3528 svchcst.exe 3528 svchcst.exe 3528 svchcst.exe 3528 svchcst.exe 3528 svchcst.exe 3528 svchcst.exe 3528 svchcst.exe 3528 svchcst.exe 3528 svchcst.exe 3528 svchcst.exe 3528 svchcst.exe 3528 svchcst.exe 3528 svchcst.exe 3528 svchcst.exe 3528 svchcst.exe 3528 svchcst.exe 3528 svchcst.exe 3528 svchcst.exe 3528 svchcst.exe 3528 svchcst.exe 3528 svchcst.exe 3528 svchcst.exe 3528 svchcst.exe 3528 svchcst.exe 3528 svchcst.exe 3528 svchcst.exe 3528 svchcst.exe 3528 svchcst.exe 3528 svchcst.exe 3528 svchcst.exe 3528 svchcst.exe 3528 svchcst.exe 3528 svchcst.exe 3528 svchcst.exe 3528 svchcst.exe 3528 svchcst.exe 3528 svchcst.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 824 22e06758adb89be0a930abd4904bfeda512ac904c3393c166f50ad02ec6030ad.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 824 22e06758adb89be0a930abd4904bfeda512ac904c3393c166f50ad02ec6030ad.exe 824 22e06758adb89be0a930abd4904bfeda512ac904c3393c166f50ad02ec6030ad.exe 3528 svchcst.exe 3528 svchcst.exe 3840 svchcst.exe 3840 svchcst.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 824 wrote to memory of 3868 824 22e06758adb89be0a930abd4904bfeda512ac904c3393c166f50ad02ec6030ad.exe 85 PID 824 wrote to memory of 3868 824 22e06758adb89be0a930abd4904bfeda512ac904c3393c166f50ad02ec6030ad.exe 85 PID 824 wrote to memory of 3868 824 22e06758adb89be0a930abd4904bfeda512ac904c3393c166f50ad02ec6030ad.exe 85 PID 824 wrote to memory of 2400 824 22e06758adb89be0a930abd4904bfeda512ac904c3393c166f50ad02ec6030ad.exe 86 PID 824 wrote to memory of 2400 824 22e06758adb89be0a930abd4904bfeda512ac904c3393c166f50ad02ec6030ad.exe 86 PID 824 wrote to memory of 2400 824 22e06758adb89be0a930abd4904bfeda512ac904c3393c166f50ad02ec6030ad.exe 86 PID 3868 wrote to memory of 3528 3868 WScript.exe 93 PID 3868 wrote to memory of 3528 3868 WScript.exe 93 PID 3868 wrote to memory of 3528 3868 WScript.exe 93 PID 2400 wrote to memory of 3840 2400 WScript.exe 92 PID 2400 wrote to memory of 3840 2400 WScript.exe 92 PID 2400 wrote to memory of 3840 2400 WScript.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\22e06758adb89be0a930abd4904bfeda512ac904c3393c166f50ad02ec6030ad.exe"C:\Users\Admin\AppData\Local\Temp\22e06758adb89be0a930abd4904bfeda512ac904c3393c166f50ad02ec6030ad.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:824 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3868 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3528
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3840
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
753B
MD562fea61453425de89e54bcdec12b61d0
SHA13f140251f37d8940cd959d8b89b83f967279f19b
SHA25625a21b4565b26f6e3070a06bac03d863af76536d23f541ac85a5cbb044d95b32
SHA51225aed018bcf60217fd0a95b3a66357622048cb69b598a547d68ad7bfe1aa1f93405c607ec0fc750fc7a60580a41efdd8d87b8e2604c3fd93f9b55bfa2a2de388
-
Filesize
1.1MB
MD5ce94c16aa9456799ef016e21b3800b9d
SHA126ef9b7a53a3118b0798b223e350cdf22029146c
SHA256a6d6ccfeba0e0504af697a768d22434d359aac9a6047ed03bb872f2ab5a1bb8a
SHA512a2b10039ccf96dbb6280e4199cfc96f61f738bbbe958690149b2704c2edd7f9ac02e18fef0a6f992a5004dbc407b2de7ee0b42f12f86c3f227ec90344d26a24c