Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
25/12/2024, 06:47
Static task
static1
Behavioral task
behavioral1
Sample
BLindex.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
BLindex.exe
Resource
win10v2004-20241007-en
General
-
Target
BLindex.exe
-
Size
1.1MB
-
MD5
d070bf6585deded9e331ae77de76fcc4
-
SHA1
74c5e44d48b86414cbe8e604bb24fe03a5ced634
-
SHA256
a2b55ffb492faeced1033c534e4f462d3c0ac9f914f991361ba67067538a05d1
-
SHA512
b5e146eb60acbb68c2385370784f9fa5e8ba8e221ef5fffbe16ebb58108314ef7c0941d51e35608f108666e3093286c636e59931eb0286a6075a57ee52b3c0e8
-
SSDEEP
24576:Yma+QZG0nbLYR1yTb6h0BacWadNihTIvGn7Rk3w6hWNudTzIfAH:jcZnbLYXyTb6oacjosOu8O0G
Malware Config
Signatures
-
WSHRAT payload 1 IoCs
resource yara_rule behavioral1/files/0x0004000000004ed7-22.dat family_wshrat -
Wshrat family
-
Blocklisted process makes network request 4 IoCs
flow pid Process 3 2788 wscript.exe 4 2788 wscript.exe 7 2800 wscript.exe 8 2800 wscript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\fLOqD.vbs wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\fLOqD.vbs wscript.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\fLOqD = "wscript.exe //B \"C:\\Users\\Admin\\fLOqD.vbs\"" wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\fLOqD = "wscript.exe //B \"C:\\Users\\Admin\\fLOqD.vbs\"" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\fLOqD = "wscript.exe //B \"C:\\Users\\Admin\\fLOqD.vbs\"" wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\fLOqD = "wscript.exe //B \"C:\\Users\\Admin\\fLOqD.vbs\"" wscript.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 8 pastebin.com 2 pastebin.com 4 pastebin.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1528 set thread context of 2472 1528 BLindex.exe 31 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BLindex.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BLindex.exe -
Script User-Agent 4 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 8 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 3 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 4 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 7 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1528 wrote to memory of 2472 1528 BLindex.exe 31 PID 1528 wrote to memory of 2472 1528 BLindex.exe 31 PID 1528 wrote to memory of 2472 1528 BLindex.exe 31 PID 1528 wrote to memory of 2472 1528 BLindex.exe 31 PID 1528 wrote to memory of 2472 1528 BLindex.exe 31 PID 1528 wrote to memory of 2472 1528 BLindex.exe 31 PID 1528 wrote to memory of 2472 1528 BLindex.exe 31 PID 1528 wrote to memory of 2472 1528 BLindex.exe 31 PID 1528 wrote to memory of 2472 1528 BLindex.exe 31 PID 2472 wrote to memory of 2788 2472 BLindex.exe 32 PID 2472 wrote to memory of 2788 2472 BLindex.exe 32 PID 2472 wrote to memory of 2788 2472 BLindex.exe 32 PID 2472 wrote to memory of 2788 2472 BLindex.exe 32 PID 2788 wrote to memory of 2800 2788 wscript.exe 34 PID 2788 wrote to memory of 2800 2788 wscript.exe 34 PID 2788 wrote to memory of 2800 2788 wscript.exe 34 PID 2788 wrote to memory of 2800 2788 wscript.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\BLindex.exe"C:\Users\Admin\AppData\Local\Temp\BLindex.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Users\Admin\AppData\Local\Temp\BLindex.exe"{path}"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Windows\SysWOW64\wscript.exe"C:\Windows\System32\wscript.exe" C:\Users\Admin\AppData\Roaming\fLOqD.vbs3⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\SysWOW64\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\fLOqD.vbs"4⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2800
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
180KB
MD5ce5fbaa17fce4e39f31933337914f6e0
SHA17a81083f65a156ebc2895eb89e693853e1e73e15
SHA25613b1302f2e0c9fbfebba0ff3f133d2403a03eed5d66f60121dc26549180c4f50
SHA51261da1f1a932dafa4fbff53eef61c076ef0fdb0120853f724a02f2322804c69e00c001b5afba003bc5fbc2ab1269b646d488c1baaf840075206d48c6cf53d6ffe