Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
180s -
max time network
60s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
02/06/2023, 13:35
Static task
static1
Behavioral task
behavioral1
Sample
document_A614_Jun_2.zip
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
document_A614_Jun_2.zip
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
document_A614_Jun_2.js
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
document_A614_Jun_2.js
Resource
win10v2004-20230220-en
General
-
Target
document_A614_Jun_2.zip
-
Size
1KB
-
MD5
2fe59c7115b258f111be4777ab0fbd6e
-
SHA1
0e6c39f865401ff5a62505aa37128c87897111a9
-
SHA256
e0e130031ddaebb509d8d90a35250a521e074a1d2be5b7d6ff5aad66422a3898
-
SHA512
1e1943f77c3d0408ac4b242cdcc002720bd7cc208c2e71c4bd87b14ece03b1e62a11aa4a21a8641de9b967b8f661bdf17e9861428e4ef0473b88eaef81734bc2
Malware Config
Signatures
-
Opens file in notepad (likely ransom note) 2 IoCs
pid Process 268 Notepad.exe 1760 Notepad.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 660 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 660 AUDIODG.EXE Token: 33 660 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 660 AUDIODG.EXE
Processes
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\document_A614_Jun_2.zip1⤵PID:1536
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:860
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4bc1⤵
- Suspicious use of AdjustPrivilegeToken
PID:660
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Temp1_document_A614_Jun_2.zip\document_A614_Jun_2.js"1⤵PID:1316
-
C:\Windows\System32\Notepad.exe"C:\Windows\System32\Notepad.exe" C:\Users\Admin\Desktop\document_A614_Jun_2.js1⤵
- Opens file in notepad (likely ransom note)
PID:268
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\document_A614_Jun_2.js"1⤵PID:432
-
C:\Windows\System32\Notepad.exe"C:\Windows\System32\Notepad.exe" C:\Users\Admin\Desktop\document_A614_Jun_2.js1⤵
- Opens file in notepad (likely ransom note)
PID:1760