Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    1558s
  • max time network
    1558s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    22/05/2024, 15:36

General

  • Target

    file01.js

  • Size

    9KB

  • MD5

    8e8d2c69942bfca618e4ab5f96f3165c

  • SHA1

    764c3bde6c021af7a7fd2bf85e3cbc0d942997ee

  • SHA256

    9fac136e14c41cb7d921001bdccfa54c2e3258436417383e495c5e9c9bc1b7e6

  • SHA512

    8103e5e8b45e5c41d948fc3369f160bd604f65b27568db5afe4d2a2b4ffa7ab902fb7ff0516b3d875ee03b17384022c07fc940c04f2cac5b9f98ead1ba87391d

  • SSDEEP

    192:Pz6nlgOO01ZRqU4Q8mN6vermFZb+u9JaXw/EwMettECxLozGCK:mm+rYvbQa2itECxL2o

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 6 IoCs
  • Deletes itself 1 IoCs
  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\file01.js
    1⤵
    • Blocklisted process makes network request
    • Deletes itself
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:2008
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\rad03422.tmp
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2772
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\rad03422.tmp
        3⤵
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2036
        • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
          "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\rad03422.tmp"
          4⤵
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          PID:884

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b099dcb833fa93668af2893386ede0d8

    SHA1

    62c3ec6d37cb805b8141c7f8b1df1686b76ed43c

    SHA256

    ff4835aecfe18a299ccf38f32c9f759aa2635208df95f75e90ed8cba1193dea2

    SHA512

    60d0d1f24ba49477c4f6efff553702d4b0d66f524c413080e84e2336170f74d7131b01d4d7f1623b567d5efa2101197166533f5a37ed37e9308462f139dc958e

  • C:\Users\Admin\AppData\Local\Temp\Cab1ED8.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar1FD9.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • C:\Users\Admin\AppData\Local\Temp\rad03422.tmp

    Filesize

    117KB

    MD5

    3e4abd506fcecba406e201a01189e0de

    SHA1

    3b23dd809405dccb09dc942b1761f3880b0c0e86

    SHA256

    58c55a79af6679e9fe5678ae816efb348a63f681ceaa729864f223b905762f06

    SHA512

    77ef13835e13d31fa5782b62751781a6553e016068f9edd8bcc82aeeb784b22747df030a27d00c33393ac325de1a3682838cc06fee8ed672739924895a253028

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    ff70caf5ec8f5b92fa8513a322a3e8f2

    SHA1

    4077a84853747921a511b10fe155c1932ea47765

    SHA256

    5a39b7e1a7b7529868e10a168c49645fd3200fff9943967f36204a05b542bf37

    SHA512

    4ff1c333587d242954e25f94532f564f7bcc6dc2ef38e9a940c21e0c4673271685b188aba9f3e1a79a1aead33344b0ee7c0056361226de145629a3c54e3c78bf