Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
116s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 08:31
Static task
static1
Behavioral task
behavioral1
Sample
137a79bb32e10321f3803bb74e98fd93.js
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
137a79bb32e10321f3803bb74e98fd93.js
Resource
win10v2004-20231215-en
General
-
Target
137a79bb32e10321f3803bb74e98fd93.js
-
Size
332KB
-
MD5
137a79bb32e10321f3803bb74e98fd93
-
SHA1
6d6f6567f58794b362f7c6837b8a082e0a9aea4d
-
SHA256
a9b5cf89510cfcc9b8ab7e311395540e1810f69f47ebf735134a04b376960ad0
-
SHA512
6594af60eba8b6645bdc77f0f1fb69ba4f71b8514e749641e08098f0249d3527bd9c62db00abf88b821179f8d9cf829dd556cfc64afdba1b8a7890d406c669b7
-
SSDEEP
6144:hjGBFq/NQhCpVrIIF2jGBFq/NQhCpVrIIF6:K/8N/88
Malware Config
Signatures
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SKdxOqJGgU.js WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SKdxOqJGgU.js WScript.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\0HKX5ALWLG = "\"C:\\Users\\Admin\\AppData\\Roaming\\SKdxOqJGgU.js\"" WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 828 wrote to memory of 2204 828 wscript.exe 28 PID 828 wrote to memory of 2204 828 wscript.exe 28 PID 828 wrote to memory of 2204 828 wscript.exe 28 PID 828 wrote to memory of 2724 828 wscript.exe 29 PID 828 wrote to memory of 2724 828 wscript.exe 29 PID 828 wrote to memory of 2724 828 wscript.exe 29
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\137a79bb32e10321f3803bb74e98fd93.js1⤵
- Suspicious use of WriteProcessMemory
PID:828 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\SKdxOqJGgU.js"2⤵
- Drops startup file
- Adds Run key to start application
PID:2204
-
-
C:\Program Files\Java\jre7\bin\javaw.exe"C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\kbokpztuj.txt"2⤵PID:2724
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD59a9a53136c9758629583522bfcca289f
SHA105a411594f466a9fffce9146dbd278b608ae1e46
SHA256e26dd03600eb13d42dc4248db99c7f5905c0f60dc85a16a7e0d382e5d52ac053
SHA512a73c60dce5351aa05d3b3e76afc66d50a78ed59ad5c1a46a65046a716d3057166cb88abea5fdedfce4a96e659d5b0540844fa834f826d933cddf6737beb5c7f2
-
Filesize
70KB
MD5cebb30928cec328617195c58c9ba8d88
SHA18b69f45ac6b92072bbb2c23e22804734aa8d2ecd
SHA2560fa24bbaf6e530ddc6822a7dfcbd2510249b5751abee9732990b80ea570f9840
SHA5125b4c013048c3b79e44e23c27c9f3e98eb9af6bd468585bc0fc67be8b04fc883fdc88361b267b6d5dbbf62fc4c028eef9fd52aaf2fcb8994eb3ef660c2aacd10d