Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
96s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2024, 05:00
Static task
static1
Behavioral task
behavioral1
Sample
50ba244f113f398afc39ed760e2c3822fdc82147259e9846df5abab89cf8307f.js
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
50ba244f113f398afc39ed760e2c3822fdc82147259e9846df5abab89cf8307f.js
Resource
win10v2004-20241007-en
General
-
Target
50ba244f113f398afc39ed760e2c3822fdc82147259e9846df5abab89cf8307f.js
-
Size
52KB
-
MD5
b9f2fc5e874114e45330cad7b524476c
-
SHA1
f158badcc637d7d92efb7ef63a6f8783a886ac6b
-
SHA256
50ba244f113f398afc39ed760e2c3822fdc82147259e9846df5abab89cf8307f
-
SHA512
dbbd63c7bd8b4a6723fd170e74e4c6532a6a89cca37c4580566585bb645711e7da05bfa37eb5ff7aac1683943b833bc4210a04959789e3e284d5d9dcf6e556a8
-
SSDEEP
768:EGWR269T41RPhQ3uvuGNhUP9KU2c0WuPIFXRomYO:Jh6d4wcTMgyBomYO
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\a.txt
1GgLeHpXUqeapoK3wvev1HyrCPEjvYKfyG
http://ohchinhing.com.sg/counter/?a=1GgLeHpXUqeapoK3wvev1HyrCPEjvYKfyG
http://bloki.internetdsl.pl/counter/?a=1GgLeHpXUqeapoK3wvev1HyrCPEjvYKfyG
http://crobal-water.com/counter/?a=1GgLeHpXUqeapoK3wvev1HyrCPEjvYKfyG
http://stroydek.ru/counter/?a=1GgLeHpXUqeapoK3wvev1HyrCPEjvYKfyG
http://www.cuihuangge.com/counter/?a=1GgLeHpXUqeapoK3wvev1HyrCPEjvYKfyG
Signatures
-
Blocklisted process makes network request 7 IoCs
flow pid Process 4 5012 wscript.exe 6 5012 wscript.exe 8 5012 wscript.exe 13 5012 wscript.exe 17 5012 wscript.exe 21 5012 wscript.exe 28 5012 wscript.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation wscript.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Crypted = "C:\\Users\\Admin\\AppData\\Local\\Temp\\a.txt" reg.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 7 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Crypted reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Crypted\shell reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Crypted\shell\open reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Crypted\shell\open\command\ = "notepad.exe \"C:\\Users\\Admin\\AppData\\Local\\Temp\\a.txt\"" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.crypted reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.crypted\ = "Crypted" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Crypted\shell\open\command reg.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 440 notepad.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 5012 wrote to memory of 4340 5012 wscript.exe 99 PID 5012 wrote to memory of 4340 5012 wscript.exe 99 PID 5012 wrote to memory of 4544 5012 wscript.exe 101 PID 5012 wrote to memory of 4544 5012 wscript.exe 101 PID 5012 wrote to memory of 4844 5012 wscript.exe 103 PID 5012 wrote to memory of 4844 5012 wscript.exe 103 PID 5012 wrote to memory of 1800 5012 wscript.exe 105 PID 5012 wrote to memory of 1800 5012 wscript.exe 105 PID 5012 wrote to memory of 1804 5012 wscript.exe 107 PID 5012 wrote to memory of 1804 5012 wscript.exe 107 PID 5012 wrote to memory of 1456 5012 wscript.exe 109 PID 5012 wrote to memory of 1456 5012 wscript.exe 109 PID 4340 wrote to memory of 3216 4340 cmd.exe 111 PID 4340 wrote to memory of 3216 4340 cmd.exe 111 PID 4844 wrote to memory of 1960 4844 cmd.exe 112 PID 4844 wrote to memory of 1960 4844 cmd.exe 112 PID 4544 wrote to memory of 3912 4544 cmd.exe 113 PID 4544 wrote to memory of 3912 4544 cmd.exe 113 PID 5012 wrote to memory of 708 5012 wscript.exe 114 PID 5012 wrote to memory of 708 5012 wscript.exe 114 PID 5012 wrote to memory of 2600 5012 wscript.exe 116 PID 5012 wrote to memory of 2600 5012 wscript.exe 116 PID 5012 wrote to memory of 1756 5012 wscript.exe 118 PID 5012 wrote to memory of 1756 5012 wscript.exe 118 PID 5012 wrote to memory of 4400 5012 wscript.exe 120 PID 5012 wrote to memory of 4400 5012 wscript.exe 120 PID 708 wrote to memory of 440 708 cmd.exe 122 PID 708 wrote to memory of 440 708 cmd.exe 122
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\50ba244f113f398afc39ed760e2c3822fdc82147259e9846df5abab89cf8307f.js1⤵
- Blocklisted process makes network request
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Crypted" /t REG_SZ /F /D "C:\Users\Admin\AppData\Local\Temp\a.txt"2⤵
- Suspicious use of WriteProcessMemory
PID:4340 -
C:\Windows\system32\reg.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Crypted" /t REG_SZ /F /D "C:\Users\Admin\AppData\Local\Temp\a.txt"3⤵
- Adds Run key to start application
PID:3216
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c REG ADD "HKCR\.crypted" /ve /t REG_SZ /F /D "Crypted"2⤵
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Windows\system32\reg.exeREG ADD "HKCR\.crypted" /ve /t REG_SZ /F /D "Crypted"3⤵
- Modifies registry class
PID:3912
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c REG ADD "HKCR\Crypted\shell\open\command" /ve /t REG_SZ /F /D "notepad.exe \"C:\Users\Admin\AppData\Local\Temp\a.txt\""2⤵
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Windows\system32\reg.exeREG ADD "HKCR\Crypted\shell\open\command" /ve /t REG_SZ /F /D "notepad.exe \"C:\Users\Admin\AppData\Local\Temp\a.txt\""3⤵
- Modifies registry class
PID:1960
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c copy /y "C:\Users\Admin\AppData\Local\Temp\a.txt" "C:\Users\Admin\AppData\Roaming\Desktop\DECRYPT.txt"2⤵PID:1800
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c copy /y "C:\Users\Admin\AppData\Local\Temp\a.txt" "C:\Users\Admin\Desktop\DECRYPT.txt"2⤵PID:1804
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\a.exe "C:\Users\Admin\AppData\Local\Temp\a.php"2⤵PID:1456
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c notepad.exe "C:\Users\Admin\AppData\Local\Temp\a.txt"2⤵
- Suspicious use of WriteProcessMemory
PID:708 -
C:\Windows\system32\notepad.exenotepad.exe "C:\Users\Admin\AppData\Local\Temp\a.txt"3⤵
- Opens file in notepad (likely ransom note)
PID:440
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL "C:\Users\Admin\AppData\Local\Temp\a.php"2⤵PID:2600
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL "C:\Users\Admin\AppData\Local\Temp\a.exe"2⤵PID:1756
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL "C:\Users\Admin\AppData\Local\Temp\php4ts.dll"2⤵PID:4400
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35KB
MD54a980d966affaa603078f39f4eb8efa7
SHA140503a88d86e7a5e94f3c9321022bdf9d84c0d99
SHA2567195fc82c2e220dc9939a96e9ae45a5299b784064e20c5296d97793524f503dd
SHA512eafb5aba7c91520f7f22547a7ff105ae7c91de695eeb1d884c5f638206a9a57a113920c5dc66e17f6e56c1358d9b5ad576b5d92b46d442df263daca4fa9a56cc
-
Filesize
1KB
MD5f1d60b27e3d798e12efa60ec659a15b7
SHA1ff39d09936b77c8af8bef06ea3bf814eb36a8374
SHA2561a56f50c5bafe87b4ea6e3eec49f55984ca67359d4d83a71892e20e729f9ec77
SHA512e65b0f1a330ee467bcbac72b8b81d4992961f0cb6891b20ae40f669eb1e19f83e33be00e96f084ee8e9b9effc5844131c3ed412cf9ea0369508361b061056811
-
Filesize
1KB
MD56fbd7c29cf69162a0c5213664c2f19c4
SHA1ea8ecaf79bcc408ff176f72e1bded69cda494099
SHA2565bb365f51aa447fc3a3bf92a92c7db8b1d3c655daa138eb466401bfacfa4bf7e
SHA512ee26b9d9265b5cd83598ecc513934397bb10703d224c780a019fa95caeb8835a49a9b7cbc5b26052fda9a181cf734add1643998624dcd566ab8de95a301515ca