Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
770s -
max time network
1604s -
platform
windows10-1703_x64 -
resource
win10-20240214-en -
resource tags
arch:x64arch:x86image:win10-20240214-enlocale:en-usos:windows10-1703-x64system -
submitted
20/02/2024, 00:01
Static task
static1
Behavioral task
behavioral1
Sample
decode_Fakeupdate.ps1
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
decode_Fakeupdate.ps1
Resource
win10-20240214-en
Behavioral task
behavioral3
Sample
decode_Fakeupdate.ps1
Resource
win10v2004-20231215-en
Behavioral task
behavioral4
Sample
decode_Fakeupdate.ps1
Resource
win11-20240214-en
General
-
Target
decode_Fakeupdate.ps1
-
Size
4KB
-
MD5
de20d86ec1a1e85bfbc5745a03a38e51
-
SHA1
3558b1d1c1049f8852a79162e98ad201f1ba5426
-
SHA256
ccc71819287c931ddf6625bfede42bc3cce4ffc61795cc955822fc981564fbc5
-
SHA512
243ddbc84f0ca0f319f68028e39331f196c6085756a12820f78f996a47700ecf8066b681d265ecdbcead4439ec67e307e739acd2a07a759cb001b4170d501b9b
-
SSDEEP
96:lrlrvxj+/ZFAAIxnkIh3qa9RDyj5tsMemPYTall:l5IjMku6e1yjXsMemPYOll
Malware Config
Signatures
-
Blocklisted process makes network request 8 IoCs
flow pid Process 6 1688 CScript.exe 8 1688 CScript.exe 10 1688 CScript.exe 12 1688 CScript.exe 17 1688 CScript.exe 19 3968 WScript.exe 30 8 CScript.exe 31 2252 WScript.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 3448 powershell.exe 3448 powershell.exe 3448 powershell.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 3448 powershell.exe Token: SeRestorePrivilege 4116 7zG.exe Token: 35 4116 7zG.exe Token: SeSecurityPrivilege 4116 7zG.exe Token: SeSecurityPrivilege 4116 7zG.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4116 7zG.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\decode_Fakeupdate.ps11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3448
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3292
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\OutputFile\" -spe -an -ai#7zMap26001:78:7zEvent259481⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4116
-
C:\Windows\System32\CScript.exe"C:\Windows\System32\CScript.exe" "C:\Users\Admin\Desktop\OutputFile\Version.89.3512.58.js"1⤵
- Blocklisted process makes network request
PID:1688
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\OutputFile\Version.89.3512.58.js"1⤵
- Blocklisted process makes network request
PID:3968
-
C:\Windows\System32\CScript.exe"C:\Windows\System32\CScript.exe" "C:\Users\Admin\Desktop\OutputFile\Version.89.3512.58.js"1⤵
- Blocklisted process makes network request
PID:8
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\OutputFile\Version.89.3512.58.js"1⤵
- Blocklisted process makes network request
PID:2252
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
317B
MD5dd982383a2370b4ffbee127c259c9bf6
SHA132a17db6fff1558e9c58e0a0b4f9ae716739f60f
SHA256e09c36d4677c9986b0766345054bd522b0b7352b5b1bf60762ef925b925d0668
SHA512696a59808de4d380f4c89eb512472200315cc7c1d4d3e5abd7a71639f2eed273dfe8a1943556f367e1debbb3f504ce235ddf58056e3947596ba67c040c78c6b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_89854CA6A0F0936A4D2ECA78845CEA25
Filesize1KB
MD5a99377a27910f2447a1d4c78a1d55540
SHA12d82c4bd9ef86fae0cede0bde4d85a52304c5cb2
SHA256cd3094c0df506297237c88653680d7a4e83e613696e78c30b99e428fde3c4b48
SHA512406df06cbe6c28a5908bd66ab0f0d71b7e06ef8347410850f97188cfc5575c471ea388a12c5d93dbace884f8328df7ad828940b6c442e691e72d73fa8bc853a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\D0E1C4B6144E7ECAB3F020E4A19EFC29_03D1B482EE3032A122274428715A4E19
Filesize977B
MD550cb447f2a8f99cb126cb51392696c7f
SHA180c4b991dd02b94f2d96eb07da7f197d5e3196a9
SHA2560d00728a79f840f071f85740efff9a27ec0c7d1f489511b5b7c4c861767aa059
SHA512d99eb91f441ba2fddbb6bd0f7a19d51452a5d45fd24315ddfb1f744d2866b3d4d481e2aef38f1eff31f5434979439c4415780b7e6b0d9f15b4a56f9cb2d3d97c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\518DFDD116D9AD0210609502E2F95908
Filesize508B
MD52828ce49805c8e195265d8bdd2863878
SHA1cfc165a86ed81ff4e3d1f93f6f70309db68591d6
SHA256bbfd648aa15a8f45a900df4673b5de72e25a54320b2e58c009a963af1a0f210d
SHA51202229d6b6008693d5fa295d26eed19ab775343dd675d75c378e16283e8566388d4509405f73d0114e1d60c04f516b272e5bb37f277652e9cfde9e4a574648e15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_89854CA6A0F0936A4D2ECA78845CEA25
Filesize482B
MD5f2702f2233fde1b9c359d98ff3103903
SHA1ce9e17ec07e53e3f429dc82713d4871e95a35a7f
SHA2562a87190cb6ba68d941ee7b82952f37ec867d2e7183d3dce6e6adcf48aec3335d
SHA512ef40b2ff947e7951f52149a03934e14a0a5cc623e1b7422df238054d1185e88c9e8969e17de4b57b545d9fec529b42841829750e03d999092a88d383fb06e187
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\D0E1C4B6144E7ECAB3F020E4A19EFC29_03D1B482EE3032A122274428715A4E19
Filesize484B
MD50ca39f5d64b5691fa0b1febca057c599
SHA1a60c3139dee6ca60c21ee31d843ad8cb9c0567e8
SHA256ea8b350dcae44e2fbbfc68bc959942d662abfcb52063979a1b15a51bf678740e
SHA51236f46ed7d239e2559243f9287171de766fe1f79925ddf3dd9d16014a43c61cb9e743a0d1ec9d69b4e62109493499e045ba6b123393e8b697fd44afe5058b6525
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
2KB
MD599b9486516ec3ddab05bcfaa6324b34b
SHA1ae320bea3bfdc991dbcd08a7f66bf50c7a93d55e
SHA2563b8d115ec85816a2c145ae8a4867bdc4b0eb5dc5c685c948ae1e24bb26bf30eb
SHA512600be81c0fd78c4993e09c5bd292c1fa24738cf2b01b78c4c0f7594446176387b8d36d980bb16156a7f866aa64b2779ef02812a90887d3a9ec7b96a75f64ed50
-
Filesize
5KB
MD56a554ad7f1c931ce492818411bb3a80a
SHA153434b9ee9fb4ba0978daba61bb12342fc519c80
SHA2562e5b08a46a45f6f311e09b6b944593ab499fb581ab6c53528e777f1080ca3085
SHA512fc03ffdf63813df3c3696d8ca2d3b124834eeb9bc40608048b802ebd9d6213a365f656e94ee1d2836f71e64432554192ea1479399a0d37b88023be978c66cfe0