Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    24/05/2024, 17:36

General

  • Target

    trigger.vbs

  • Size

    75B

  • MD5

    520a3ec50de35a52fe49b645b4af9a9e

  • SHA1

    dc244939b8eedae3791b025a1780b9464ede5713

  • SHA256

    cdea919cf913a1cb8aa9ef0dc263ddffaabafab4139b154af0cfa801c00fbfe8

  • SHA512

    f15bd0410081fd396fb6ac2062f9507f155ebb4babcb604ab5acfd38e32dfeabb57fae4a3718b3c614b8f0dcc3bbb62af7fd1375e121050d36ce515ee400db60

Score
10/10

Malware Config

Signatures

  • Modifies firewall policy service 2 TTPs 36 IoCs
  • Modifies security service 2 TTPs 18 IoCs
  • Registers new Print Monitor 2 TTPs 12 IoCs
  • Maps connected drives based on registry 3 TTPs 3 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\trigger.vbs"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1936
    • C:\Windows\System32\reg.exe
      "C:\Windows\System32\reg.exe" delete HKEY_LOCAL_MACHINE\SYSTEM /f
      2⤵
      • Modifies firewall policy service
      • Modifies security service
      • Registers new Print Monitor
      • Maps connected drives based on registry
      PID:3040
  • C:\Windows\explorer.exe
    "C:\Windows\explorer.exe"
    1⤵
      PID:2680

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2680-0-0x0000000000230000-0x0000000000231000-memory.dmp

      Filesize

      4KB