Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    122s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    12/11/2023, 17:11

General

  • Target

    NEAS.a332d9a03fc5f058bbe43920c63a82343f4968584fd3de95247b422658bd2518.ps1

  • Size

    3KB

  • MD5

    c1a9097d7c7ee35e32edada3f14654c5

  • SHA1

    51f9d6b23289ef25710ebe5954c7116437f2c779

  • SHA256

    a332d9a03fc5f058bbe43920c63a82343f4968584fd3de95247b422658bd2518

  • SHA512

    efb936d3b69454756799f1322959eaf8a6d6b74f3d73db12effc884566867c8022b87000a07a9e9d66ea1be7260ae5453ee49ba5c94173924e8f233a088dca90

Malware Config

Extracted

Family

metasploit

Version

metasploit_stager

C2

18.177.60.68:11625

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Blocklisted process makes network request 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\NEAS.a332d9a03fc5f058bbe43920c63a82343f4968584fd3de95247b422658bd2518.ps1
    1⤵
    • Blocklisted process makes network request
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2876
    • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe
      "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\nfczsd7y.cmdline"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2036
      • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES696E.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC696D.tmp"
        3⤵
          PID:2768

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\RES696E.tmp

      Filesize

      1KB

      MD5

      5bf86dd8c6e92f668fcb646fa6d34fbe

      SHA1

      6da585a340da762947808af38c57a0ff772d101c

      SHA256

      5f99a42046fa510bf65ab004a4ca1b538d7425cd03c33a14bdffd6da69812e08

      SHA512

      91cd15f9dee56739610f74b774077b55b4852e01c81cc5aae161dbac81f50cc74f334b2ee53248f9fef0665b3c867ffec092e529318a5dea6566388342778a3e

    • C:\Users\Admin\AppData\Local\Temp\nfczsd7y.dll

      Filesize

      3KB

      MD5

      3d7589e8373417cf841a5970836964db

      SHA1

      088c340e54240b5ea80baaebbdba5a137bb5fcb3

      SHA256

      434d1bc2da4480a33153779c126b362859f3f94ebec839fc3400b1486d8c69c2

      SHA512

      3a6720e8219b503f105ce6f2a1babe56b1eb7db1468b7365920a08f8b1da0a3b103654130da00927ee448aa7ff0fe6b4b81a8ed9ca906b3a066091e0fc48320e

    • C:\Users\Admin\AppData\Local\Temp\nfczsd7y.pdb

      Filesize

      7KB

      MD5

      b1f616cd69763b16d2a0b4d41005b667

      SHA1

      35dcce9949aaac262b5cf3080c716476a2084dee

      SHA256

      54ae90864a97a05d77ad93882cf9ef121b8a4260dd9343b047f576b26750d8f7

      SHA512

      657a11996826640fff1ace5a19e54535fb23cc0b18a38bc8edc9d378c900ed5522cc96fa110b140616d3ff726f74a011b718a7c3e0b9b7e85d80e6f71688b0fe

    • \??\c:\Users\Admin\AppData\Local\Temp\CSC696D.tmp

      Filesize

      652B

      MD5

      7ec855e4b3f8c1e470b03521dd4b5c29

      SHA1

      71998d6e6a738bc6481b14f7281219ca5bea943d

      SHA256

      72d1582868779fa7465916d201f26151a7a7196b373fd5d42ce08de507638f21

      SHA512

      68e6e4c34746002c5666187f4f04d2f946896ad0e4e37e9220025d43417ece992cd3bacafc40a42dfe81813731a42321d4039c8e585aa30a5ef6fbdffa64a8f3

    • \??\c:\Users\Admin\AppData\Local\Temp\nfczsd7y.0.cs

      Filesize

      465B

      MD5

      029a251db8736d1c039890283ddafd0d

      SHA1

      b2d1944ef240baa681565c6327011b30e0f980fd

      SHA256

      d1b97cac79d2b968a2d80df52ab40e480540f81040a825c5aba1192c72db2b0c

      SHA512

      71347e5eb5e4ed3dab872072d84f8eeb575c27632ffb53826f905fd19db9ec082e49d55d7901b98e2ac6ae3de61189d6352bae790e5f1bd9e6db28bc22f31b8f

    • \??\c:\Users\Admin\AppData\Local\Temp\nfczsd7y.cmdline

      Filesize

      309B

      MD5

      07cb4dbbec1cc3b2d243828700783279

      SHA1

      8dd6230ca74b95a56c121bd85b72ef35aa2af677

      SHA256

      4034b95dbc214d7ae296432bebc3a231a4738d5b313d71907fb4af8ee75a21fb

      SHA512

      fd7e4ca1421b0b032d1d0e679285403645b47035e4eba34bbeef91dd042ed98695c2fdbb8a2456f90f25d17111ee6685d6c8ca680ffd1751482c1fd1e03318d0

    • memory/2036-17-0x00000000023A0000-0x0000000002420000-memory.dmp

      Filesize

      512KB

    • memory/2876-10-0x0000000002C60000-0x0000000002CE0000-memory.dmp

      Filesize

      512KB

    • memory/2876-11-0x0000000002C60000-0x0000000002CE0000-memory.dmp

      Filesize

      512KB

    • memory/2876-5-0x000007FEF5DA0000-0x000007FEF673D000-memory.dmp

      Filesize

      9.6MB

    • memory/2876-9-0x0000000002C60000-0x0000000002CE0000-memory.dmp

      Filesize

      512KB

    • memory/2876-8-0x000007FEF5DA0000-0x000007FEF673D000-memory.dmp

      Filesize

      9.6MB

    • memory/2876-6-0x0000000002C60000-0x0000000002CE0000-memory.dmp

      Filesize

      512KB

    • memory/2876-7-0x00000000023A0000-0x00000000023A8000-memory.dmp

      Filesize

      32KB

    • memory/2876-26-0x0000000002860000-0x0000000002868000-memory.dmp

      Filesize

      32KB

    • memory/2876-4-0x000000001B4B0000-0x000000001B792000-memory.dmp

      Filesize

      2.9MB

    • memory/2876-29-0x00000000029C0000-0x00000000029C1000-memory.dmp

      Filesize

      4KB

    • memory/2876-31-0x000007FEF5DA0000-0x000007FEF673D000-memory.dmp

      Filesize

      9.6MB