Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
11408036046...5R.vbs
windows7-x64
71408036046...5R.vbs
windows10-2004-x64
7~/-/~~/36e...84.dll
windows7-x64
1~/-/~~/36e...84.dll
windows10-2004-x64
1~/-/~~/36e...65.dll
windows7-x64
3~/-/~~/36e...65.dll
windows10-2004-x64
3~/-/~~/36e...31.dll
windows7-x64
3~/-/~~/36e...31.dll
windows10-2004-x64
3~/-/~~/36e...22.dll
windows7-x64
1~/-/~~/36e...22.dll
windows10-2004-x64
1~/-/~~/36e...33.dll
windows7-x64
1~/-/~~/36e...33.dll
windows10-2004-x64
1Analysis
-
max time kernel
142s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
25/03/2025, 11:23
Static task
static1
Behavioral task
behavioral1
Sample
1408036046_2025-03-24-69425519059_5415R.vbs
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1408036046_2025-03-24-69425519059_5415R.vbs
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
~/-/~~/36eLyCyV9/S4Abg7z/2RC4VyN9HU/f825H8nt2h/09636937151884.dll
Resource
win7-20250207-en
Behavioral task
behavioral4
Sample
~/-/~~/36eLyCyV9/S4Abg7z/2RC4VyN9HU/f825H8nt2h/09636937151884.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
~/-/~~/36eLyCyV9/S4Abg7z/2RC4VyN9HU/f825H8nt2h/096745465.dll
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
~/-/~~/36eLyCyV9/S4Abg7z/2RC4VyN9HU/f825H8nt2h/096745465.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
~/-/~~/36eLyCyV9/S4Abg7z/2RC4VyN9HU/f825H8nt2h/121695431.dll
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
~/-/~~/36eLyCyV9/S4Abg7z/2RC4VyN9HU/f825H8nt2h/121695431.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
~/-/~~/36eLyCyV9/S4Abg7z/2RC4VyN9HU/f825H8nt2h/1845531353016275103132630488502822.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
~/-/~~/36eLyCyV9/S4Abg7z/2RC4VyN9HU/f825H8nt2h/1845531353016275103132630488502822.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
~/-/~~/36eLyCyV9/S4Abg7z/2RC4VyN9HU/f825H8nt2h/303221978004590033053779333.dll
Resource
win7-20250207-en
Behavioral task
behavioral12
Sample
~/-/~~/36eLyCyV9/S4Abg7z/2RC4VyN9HU/f825H8nt2h/303221978004590033053779333.dll
Resource
win10v2004-20250314-en
General
-
Target
1408036046_2025-03-24-69425519059_5415R.vbs
-
Size
3.8MB
-
MD5
3dcba98fd36ce6f61df7bd91b2668304
-
SHA1
fd8e65ef8cf6e31577484bb68a1c3ac982bb9332
-
SHA256
8a4c7895114c65d9174ae744aeff93024214d9bbc76cafd3e9f21ffbce8efdf4
-
SHA512
c228b56cf36965d80d50da174be04b7de84e7c84e00a5d208658b307420e51be13475396912ea1d319a3fd40df8abede2efdf0d4aedf202b7ad75565a6bc6a1c
-
SSDEEP
49152:Q1QY2iFJjh0Aw01drLTN79ei3nWWWyHIqTPjRqge6J3SVOASE93:B
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Control Panel\International\Geo\Nation WScript.exe -
Executes dropped EXE 1 IoCs
pid Process 4604 oAKcjQBEyVEy.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oAKcjQBEyVEy.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4604 oAKcjQBEyVEy.exe 4604 oAKcjQBEyVEy.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4312 wrote to memory of 4604 4312 WScript.exe 87 PID 4312 wrote to memory of 4604 4312 WScript.exe 87 PID 4312 wrote to memory of 4604 4312 WScript.exe 87
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\1408036046_2025-03-24-69425519059_5415R.vbs"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4312 -
C:\Users\Public\oAKcjQBEyVEy.exe"C:\Users\Public\oAKcjQBEyVEy.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4604
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.4MB
MD5c251e2e9c2dba46764178ab1ba1e7a7d
SHA12f5f6ba4b831f344ca71573de4a03c6fb2d61abb
SHA256b2219dafcd42d0587618afe8518d965fb81f07e64328159c9923743be176003d
SHA51225e41eeb4af0c5f46a46dccda4570b0cf7f24f2b1cd70d795ade60ac9c0709e33aaf1b23244bf84dbe1471ceb07cb8de8b447551008fc68120adde62dfd95db0