Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 03:24
Static task
static1
Behavioral task
behavioral1
Sample
0cdf14fd98567284a5cbe2fa14e93ca4.js
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0cdf14fd98567284a5cbe2fa14e93ca4.js
Resource
win10v2004-20231215-en
General
-
Target
0cdf14fd98567284a5cbe2fa14e93ca4.js
-
Size
16KB
-
MD5
0cdf14fd98567284a5cbe2fa14e93ca4
-
SHA1
7e87bbd434b28dab98a471628ec357681db9d608
-
SHA256
05e7a07a0cac3c776354d01d2858289465705e857fbd447c14a1b45467a5f1fa
-
SHA512
3c2bd27a6356deb4b90bd148e81e6b83a35ebf86845f18c07565222de69fa9acf88756eb7f6d0fa2c4caf63315e5e8d7d0864e72860586a257211d38e53ece16
-
SSDEEP
384:zMepYgyGv5TQtC3t8/PTu0OFh5QL4IFIaDnqW20+EcvxZFL26:/PPBQtCs/Om1FMW+hL26
Malware Config
Signatures
-
Blocklisted process makes network request 7 IoCs
flow pid Process 5 2012 wscript.exe 11 2012 wscript.exe 14 2012 wscript.exe 17 2012 wscript.exe 20 2012 wscript.exe 24 2012 wscript.exe 27 2012 wscript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vuswRnMIkL.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vuswRnMIkL.js wscript.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\B02N3ZE1UL = "\"C:\\Users\\Admin\\AppData\\Roaming\\vuswRnMIkL.js\"" wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2012 wrote to memory of 2028 2012 wscript.exe 28 PID 2012 wrote to memory of 2028 2012 wscript.exe 28 PID 2012 wrote to memory of 2028 2012 wscript.exe 28
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\0cdf14fd98567284a5cbe2fa14e93ca4.js1⤵
- Blocklisted process makes network request
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\vuswRnMIkL.js"2⤵
- Drops startup file
- Adds Run key to start application
PID:2028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD593bdcce33078733a7621abd9bf7d19db
SHA1018119c336f005efcb34b801561d0360be5e3033
SHA2565a0942dfe91f30dbd57bf4a76da32aed736007aeb14c4de09d0e40a173ed2b67
SHA5124e470ea26eedf093968221280d5d0e3b1c6dae9b07266abd35a0ba1220da821548b9390175dfcd528cee5426834ccd72ab34918eb4d69158cba57bc14fc6f01b