Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/10/2024, 05:38

General

  • Target

    159d79913a104e4001a3adbd44b6543334b5086901489bc8e5ef2e1a701e86ac.exe

  • Size

    1.1MB

  • MD5

    69fa8272e2436ab041fb04506810575a

  • SHA1

    195725189a05258b89dc8c833411bf31165c3474

  • SHA256

    159d79913a104e4001a3adbd44b6543334b5086901489bc8e5ef2e1a701e86ac

  • SHA512

    b094a863ee173083881e8ef791df3b7992a74165e83695ccff89c5f8fcc8902e46d721fa133bb6030167e53b987d5ce5d1a5d05c340f796e190a58820f349fbc

  • SSDEEP

    24576:aH0dl8myX9Bg42QoXFkrzkmplSgRDYo0lG4Z8r7Qfbkiu5QA:acallSllG4ZM7QzMX

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\159d79913a104e4001a3adbd44b6543334b5086901489bc8e5ef2e1a701e86ac.exe
    "C:\Users\Admin\AppData\Local\Temp\159d79913a104e4001a3adbd44b6543334b5086901489bc8e5ef2e1a701e86ac.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2224
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1384
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2760

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

    Filesize

    753B

    MD5

    75ea783f399fc5e8586f32dcdbe6e24c

    SHA1

    37cfbe7a61f957cc6ac74649dd0beb81ea3d5af3

    SHA256

    172883300e00e2423e37ff91e8884f7c135a448c078607d5051d31a86a22f2bc

    SHA512

    14443de6d0e885d0336778a9e656f5980476e84431c427e3c4797f33d5d3572f571537b422cdd6eeb601e7217de8e25fb9b07659655a778190f48b93ca68a61a

  • memory/2224-0-0x0000000000400000-0x000000000055F000-memory.dmp

    Filesize

    1.4MB

  • memory/2224-12-0x0000000000400000-0x000000000055F000-memory.dmp

    Filesize

    1.4MB