Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20230824-en -
resource tags
arch:x64arch:x86image:win10v2004-20230824-enlocale:en-usos:windows10-2004-x64system -
submitted
29/08/2023, 18:56
Static task
static1
Behavioral task
behavioral1
Sample
Purchase_Order.pdf.js
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
Purchase_Order.pdf.js
Resource
win10v2004-20230824-en
General
-
Target
Purchase_Order.pdf.js
-
Size
7KB
-
MD5
649da5e2745b8efb3237f3ebd18da508
-
SHA1
42fb7cd4ebcee9aa64dc98e8cac4338085d256bb
-
SHA256
605a9532143c3d10b2b9676bdb7b39679feab8eae9985acc799ae9d568dca2b7
-
SHA512
96fa718f0bfd892a329054f5e25c5ae2d57e84b7552df17f914abeff9ae7b3add644248e61f95fa47350c7488eee5168a4cf159d1e330ebcbdf9fcd76fd343fc
-
SSDEEP
48:w6Wxz3jBjIYTjPVuBqxdYBudYDLQudYD/KKmxTaPBQnqxApKxGjyDhX4q1NhPBOJ:VO/te9Wz7n2yjd0aqbQZ0qU
Malware Config
Signatures
-
Blocklisted process makes network request 9 IoCs
flow pid Process 24 3252 wscript.exe 26 3252 wscript.exe 29 3252 wscript.exe 33 3884 WScript.exe 47 3884 WScript.exe 52 3884 WScript.exe 57 3884 WScript.exe 58 3884 WScript.exe 62 3884 WScript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MGNRKD.vbs WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MGNRKD.vbs WScript.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-642304425-1816607141-2958861556-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MGNRKD = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\MGNRKD.vbs\"" WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MGNRKD = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\MGNRKD.vbs\"" WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-642304425-1816607141-2958861556-1000_Classes\Local Settings wscript.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3252 wrote to memory of 3884 3252 wscript.exe 87 PID 3252 wrote to memory of 3884 3252 wscript.exe 87
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\Purchase_Order.pdf.js1⤵
- Blocklisted process makes network request
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3252 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\MGNRKD.vbs"2⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
PID:3884
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
205KB
MD5bcac0ec28373a4b0db4cd2a488a6595f
SHA121fa2e3e0c589f44e14ffe60e5cb1b6c8401e655
SHA256241e2aee1c1715ad0c91b5c9ba258ac2f31a1be168c5a1683712da2d36a540b6
SHA5124802fada66768941c19485e07d6298f914f8819529c2e9eb0615ffee9ab48b0277ed9e15c4010b6052c29c950a659711c60a73d0af797f6657dd899cb6d2357b
-
Filesize
205KB
MD5bcac0ec28373a4b0db4cd2a488a6595f
SHA121fa2e3e0c589f44e14ffe60e5cb1b6c8401e655
SHA256241e2aee1c1715ad0c91b5c9ba258ac2f31a1be168c5a1683712da2d36a540b6
SHA5124802fada66768941c19485e07d6298f914f8819529c2e9eb0615ffee9ab48b0277ed9e15c4010b6052c29c950a659711c60a73d0af797f6657dd899cb6d2357b