Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
57s -
max time network
58s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09/03/2024, 17:47
Static task
static1
Behavioral task
behavioral1
Sample
Your pc is hacked.vbs
Resource
win7-20240221-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
Your pc is hacked.vbs
Resource
win10v2004-20240226-en
7 signatures
150 seconds
Errors
Reason
Machine shutdown
General
-
Target
Your pc is hacked.vbs
-
Size
1008B
-
MD5
d74f30d6a899cff826de6a19c2feb8c0
-
SHA1
d244a288e493cb988908fa3276953538142a2f0f
-
SHA256
6dc1c3968fa19baee27e98c43c0c8870ccedb4f388acdcbbfb047cb2343b07dc
-
SHA512
7382943f468667c95c10f373ba05b87c5208d3175b6f83ea2d290ab50d24a944ad315725e28a42a736fde94ba8ef043541cebce0df61bf7e23bfd2664b6fbad3
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 1 IoCs
pid Process 2712 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2712 taskkill.exe Token: SeShutdownPrivilege 2948 shutdown.exe Token: SeRemoteShutdownPrivilege 2948 shutdown.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1444 wrote to memory of 2804 1444 WScript.exe 29 PID 1444 wrote to memory of 2804 1444 WScript.exe 29 PID 1444 wrote to memory of 2804 1444 WScript.exe 29 PID 1444 wrote to memory of 2712 1444 WScript.exe 30 PID 1444 wrote to memory of 2712 1444 WScript.exe 30 PID 1444 wrote to memory of 2712 1444 WScript.exe 30 PID 1444 wrote to memory of 2948 1444 WScript.exe 33 PID 1444 wrote to memory of 2948 1444 WScript.exe 33 PID 1444 wrote to memory of 2948 1444 WScript.exe 33
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Your pc is hacked.vbs"1⤵
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Windows\System32\notepad.exe"C:\Windows\System32\notepad.exe"2⤵PID:2804
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /F /im notepad.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2712
-
-
C:\Windows\System32\shutdown.exe"C:\Windows\System32\shutdown.exe" -s -t 30 -f -m \\2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2948
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}1⤵PID:2968
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:240
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:1384