Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    144s
  • max time network
    111s
  • platform
    windows7_x64
  • resource
    win7-20230621-en
  • resource tags

    arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system
  • submitted
    04/07/2023, 13:16

General

  • Target

    ORDERjs.js

  • Size

    912KB

  • MD5

    70e483ab51c94cd2318fb5cb0de989fd

  • SHA1

    8bb7ff7229a9eb8230dcbdc8507e60b3403313c0

  • SHA256

    a0041aa69a92b8a85e020dcf6424960e466c4e2f315a556bed9e06d870dddf47

  • SHA512

    350dac5a389fbdf85c770a1d4858b2152eceb8903558f0a5b37a95bb172a987eea2c932dd9bf06bd62f813e4b334daff3d83838a9e127f1135e2c077b0cb972a

  • SSDEEP

    1536:j21Ax5SP/rgoMp633kUFPyHqVfxkCx1UE8o1TQ5CAiaRgd6W0NQHMpgac+0rOMzc:Uh+vek3mUQKN

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\ORDERjs.js
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1096
    • C:\Program Files\Java\jre7\bin\javaw.exe
      "C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\ljtgbodmx.txt"
      2⤵
        PID:1188

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\ljtgbodmx.txt

      Filesize

      92KB

      MD5

      be4e48191df83f3c7bfd54379ba4d4f3

      SHA1

      36a12c5dc7d0f28f31036ed44221521bdcb04de8

      SHA256

      6d8f633293aea1a6c3082e4db203b88f60c09415604631fee719e4bba70e597d

      SHA512

      dd7d9619a0cbff8d99e735ebf0497c28d7720113f431740c5993e139d4deed243f66fc67d80c585bcf1bbeb9cee85c10a0661f8a6e316472589417d611857425

    • memory/1188-65-0x0000000001B40000-0x0000000001B41000-memory.dmp

      Filesize

      4KB

    • memory/1188-73-0x0000000001B40000-0x0000000001B41000-memory.dmp

      Filesize

      4KB

    • memory/1188-77-0x0000000001B40000-0x0000000001B41000-memory.dmp

      Filesize

      4KB

    • memory/1188-80-0x0000000001B40000-0x0000000001B41000-memory.dmp

      Filesize

      4KB

    • memory/1188-83-0x0000000001B40000-0x0000000001B41000-memory.dmp

      Filesize

      4KB

    • memory/1188-85-0x0000000001B40000-0x0000000001B41000-memory.dmp

      Filesize

      4KB

    • memory/1188-86-0x0000000001B40000-0x0000000001B41000-memory.dmp

      Filesize

      4KB

    • memory/1188-87-0x0000000001B40000-0x0000000001B41000-memory.dmp

      Filesize

      4KB

    • memory/1188-91-0x0000000001B40000-0x0000000001B41000-memory.dmp

      Filesize

      4KB

    • memory/1188-96-0x0000000001B40000-0x0000000001B41000-memory.dmp

      Filesize

      4KB

    • memory/1188-97-0x0000000001B40000-0x0000000001B41000-memory.dmp

      Filesize

      4KB

    • memory/1188-107-0x0000000001B40000-0x0000000001B41000-memory.dmp

      Filesize

      4KB

    • memory/1188-108-0x0000000001B40000-0x0000000001B41000-memory.dmp

      Filesize

      4KB