Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
24s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20230831-es -
resource tags
arch:x64arch:x86image:win7-20230831-eslocale:es-esos:windows7-x64systemwindows -
submitted
20/09/2023, 22:38 UTC
Static task
static1
Behavioral task
behavioral1
Sample
8.ps1
Resource
win7-20230831-es
6 signatures
600 seconds
Behavioral task
behavioral2
Sample
8.ps1
Resource
win10v2004-20230915-es
8 signatures
600 seconds
Errors
Reason
Machine shutdown
General
-
Target
8.ps1
-
Size
19KB
-
MD5
1a5c933e83fc3395e8e5f737df0be1de
-
SHA1
c1b72ce34210b50699c729a403683e31a87970af
-
SHA256
50fdd1a3a1fdccbe8a57ffdeed3f550398187f8de66e79d36e48dc0eb49fd2e7
-
SHA512
698d9c0657ac978362be8c0c1aba23e72e1469073354f1e3a8b8e40fc79affc0383f4bfa4161e377d4304b314a8b03721efb9414413c13489addb7580718785c
-
SSDEEP
384:QcyvJvDCNrr2YyHEHaeizHlf2GkxUtJNzw5ARMthKqsvvvhUvhkvkNp8mpdIc+ZW:QcyvJvDCNrr2Yyk6eizFf2GkxUtJNYtH
Score
8/10
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 2 2436 powershell.exe -
Drops startup file 5 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_sgxbtu8_AA.lnk powershell.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_sgxbtu8_y.lnk powershell.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_sgxbtu8_.lnk powershell.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_sgxbtu8_EX.lnk powershell.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_sgxbtu8_AT.lnk powershell.exe -
Modifies registry class 6 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000_CLASSES\ms-settings\Shell\Open powershell.exe Set value (str) \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000_CLASSES\ms-settings\Shell\Open\command\DelegateExecute powershell.exe Set value (str) \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000_CLASSES\ms-settings\Shell\Open\command\ = "C:\\_sgxbtu8_\\_sgxbtu8_i7.exe" powershell.exe Key created \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000_CLASSES\ms-settings\Shell\Open\command powershell.exe Key created \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000_CLASSES\ms-settings powershell.exe Key created \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000_CLASSES\ms-settings\Shell powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2436 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2436 powershell.exe Token: SeShutdownPrivilege 2892 shutdown.exe Token: SeRemoteShutdownPrivilege 2892 shutdown.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2436 wrote to memory of 2892 2436 powershell.exe 29 PID 2436 wrote to memory of 2892 2436 powershell.exe 29 PID 2436 wrote to memory of 2892 2436 powershell.exe 29
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\8.ps11⤵
- Blocklisted process makes network request
- Drops startup file
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Windows\system32\shutdown.exe"C:\Windows\system32\shutdown.exe" /r /t 102⤵
- Suspicious use of AdjustPrivilegeToken
PID:2892
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:2628
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:2312
Network
-
Remote address:20.92.164.32:80RequestGET /20/a/m/m.zip HTTP/1.1
Host: 20.92.164.32
Connection: Keep-Alive
ResponseHTTP/1.1 200 OK
Server: Apache/2.4.52 (Ubuntu)
Last-Modified: Wed, 20 Sep 2023 15:24:10 GMT
ETag: "eb9b00-605cbf78d5a80"
Accept-Ranges: bytes
Content-Length: 15440640
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Content-Type: application/zip
-
382.8kB 15.9MB 6972 11378
HTTP Request
GET http://20.92.164.32/20/a/m/m.zipHTTP Response
200
No results found