Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
126s -
max time network
28s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
09/03/2023, 19:50
Static task
static1
Behavioral task
behavioral1
Sample
when is a d&f for contract type required 30781.js
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
when is a d&f for contract type required 30781.js
Resource
win10v2004-20230220-en
General
-
Target
when is a d&f for contract type required 30781.js
-
Size
564KB
-
MD5
e578abaa9a94fd9665f84c2b8360fda1
-
SHA1
32675b30e0f5a18bc8b6e120b2211ac53cc35e75
-
SHA256
1469dc7b039809dde24a5894170185e73a5969a55a84872f185aac6265f2b9d2
-
SHA512
163b51e45082a8b258f7f99a51ca50fed139916411c5b83d8c7abe5d17ac4694b4c490eb6bb9fa1b538edc7eb704ab238d6b583b92606acf1739407581af1e60
-
SSDEEP
12288:d69oRzp+By2ex3ERhTiWUOrD2lKyrCvSkdJyi0j9nsDvV101d1eo4kwx9LVGyniH:B/yy2e6V2ai3KAL5rPzy9maM3
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 364 POwerShelL.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 364 POwerShelL.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 852 wrote to memory of 1688 852 taskeng.exe 29 PID 852 wrote to memory of 1688 852 taskeng.exe 29 PID 852 wrote to memory of 1688 852 taskeng.exe 29 PID 1688 wrote to memory of 572 1688 wscript.EXE 30 PID 1688 wrote to memory of 572 1688 wscript.EXE 30 PID 1688 wrote to memory of 572 1688 wscript.EXE 30 PID 572 wrote to memory of 364 572 cscript.exe 32 PID 572 wrote to memory of 364 572 cscript.exe 32 PID 572 wrote to memory of 364 572 cscript.exe 32 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\wscript.exewscript.exe "C:\Users\Admin\AppData\Local\Temp\when is a d&f for contract type required 30781.js"1⤵PID:1556
-
C:\Windows\system32\taskeng.exetaskeng.exe {0CEC13E7-11F4-42FA-9B99-98634D466EE1} S-1-5-21-3430344531-3702557399-3004411149-1000:WFSTZEPN\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Windows\system32\wscript.EXEC:\Windows\system32\wscript.EXE FINANC~1.JS2⤵
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Windows\System32\cscript.exe"C:\Windows\System32\cscript.exe" "FINANC~1.JS"3⤵
- Suspicious use of WriteProcessMemory
PID:572 -
C:\Windows\System32\WindowsPowerShell\v1.0\POwerShelL.exePOwerShelL4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:364
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
47.7MB
MD535ecbbb1c4c4280e74625d55b1d39c59
SHA1990a3b50a20ab2f246fde1b1cd8ec36cf709139f
SHA2565cd80596de95375c6d69087a7eb8bdf5d900689399878e8f12a0e7407242215d
SHA512736d99dcd11a3cc9e19294b256173946ab2b18c89a9b1b5bca58b4f7f3dc159fbc2b761939fcb5566ddb1b97351d85a1b25204e80511f97ef3f773617e059827