Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    6s
  • max time network
    0s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    19/07/2024, 11:15

General

  • Target

    script.vbs

  • Size

    1KB

  • MD5

    2dbbaf0e05557f73d94f363a03d69a46

  • SHA1

    c5e5656f3c886d459db584ebcfba51a4b80e90ca

  • SHA256

    1fc4c8e8e29b7a384f7201ab32a004d367168d7df40dbf75b3f89b64a7b26723

  • SHA512

    beb56c77a4d9e7f43ae2fa21bd90ed0cc88d5b21eddcf973958c4831369c9a67f58b198374ec0c8ec08949b9fceba2874551f146412887c3b574f8a4dad0100b

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\script.vbs"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2700
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c del/s/q C:\Users\Admin\Desktop\ApproveDisconnect.au
      2⤵
        PID:2308
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /c del/s/q C:\Users\Admin\Desktop\ClearUnpublish.emf
        2⤵
          PID:2616
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /c del/s/q C:\Users\Admin\Desktop\ConfirmSuspend.midi
          2⤵
            PID:2832
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /c del/s/q C:\Users\Admin\Desktop\ConvertToWatch.mp4v
            2⤵
              PID:3012
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe" /c del/s/q C:\Users\Admin\Desktop\CopyConvertTo.xht
              2⤵
                PID:2516
              • C:\Windows\System32\cmd.exe
                "C:\Windows\System32\cmd.exe" /c del/s/q C:\Users\Admin\Desktop\CopyUnregister.xlsx
                2⤵
                  PID:2628
                • C:\Windows\System32\cmd.exe
                  "C:\Windows\System32\cmd.exe" /c del/s/q C:\Users\Admin\Desktop\desktop.ini
                  2⤵
                    PID:2008
                  • C:\Windows\System32\cmd.exe
                    "C:\Windows\System32\cmd.exe" /c del/s/q C:\Users\Admin\Desktop\DismountReset.AAC
                    2⤵
                      PID:1716
                    • C:\Windows\System32\cmd.exe
                      "C:\Windows\System32\cmd.exe" /c del/s/q C:\Users\Admin\Desktop\EditInstall.tif
                      2⤵
                        PID:2760
                      • C:\Windows\System32\cmd.exe
                        "C:\Windows\System32\cmd.exe" /c del/s/q C:\Users\Admin\Desktop\EnablePublish.ppsx
                        2⤵
                          PID:2568
                        • C:\Windows\System32\cmd.exe
                          "C:\Windows\System32\cmd.exe" /c del/s/q C:\Users\Admin\Desktop\FindPop.vsx
                          2⤵
                            PID:1272
                          • C:\Windows\System32\cmd.exe
                            "C:\Windows\System32\cmd.exe" /c del/s/q C:\Users\Admin\Desktop\InitializeApprove.svgz
                            2⤵
                              PID:2084
                            • C:\Windows\System32\cmd.exe
                              "C:\Windows\System32\cmd.exe" /c del/s/q C:\Users\Admin\Desktop\MoveUpdate.docx
                              2⤵
                                PID:2716
                              • C:\Windows\System32\cmd.exe
                                "C:\Windows\System32\cmd.exe" /c del/s/q C:\Users\Admin\Desktop\NewWait.xsl
                                2⤵
                                  PID:2292
                                • C:\Windows\System32\cmd.exe
                                  "C:\Windows\System32\cmd.exe" /c del/s/q C:\Users\Admin\Desktop\PopWait.xlsx
                                  2⤵
                                    PID:1440
                                  • C:\Windows\System32\cmd.exe
                                    "C:\Windows\System32\cmd.exe" /c del/s/q C:\Users\Admin\Desktop\PublishMerge.html
                                    2⤵
                                      PID:1956
                                    • C:\Windows\System32\cmd.exe
                                      "C:\Windows\System32\cmd.exe" /c del/s/q C:\Users\Admin\Desktop\RedoUnblock.mht
                                      2⤵
                                        PID:2492
                                      • C:\Windows\System32\cmd.exe
                                        "C:\Windows\System32\cmd.exe" /c del/s/q C:\Users\Admin\Desktop\RemoveGrant.dotm
                                        2⤵
                                          PID:3008
                                        • C:\Windows\System32\cmd.exe
                                          "C:\Windows\System32\cmd.exe" /c del/s/q C:\Users\Admin\Desktop\RepairInitialize.xml
                                          2⤵
                                            PID:2224
                                          • C:\Windows\System32\cmd.exe
                                            "C:\Windows\System32\cmd.exe" /c del/s/q C:\Users\Admin\Desktop\RequestBackup.mpv2
                                            2⤵
                                              PID:1220
                                            • C:\Windows\System32\cmd.exe
                                              "C:\Windows\System32\cmd.exe" /c del/s/q C:\Users\Admin\Desktop\SearchConnect.jpe
                                              2⤵
                                                PID:2736
                                              • C:\Windows\System32\cmd.exe
                                                "C:\Windows\System32\cmd.exe" /c del/s/q C:\Users\Admin\Desktop\SearchUse.xlsx
                                                2⤵
                                                  PID:2612
                                                • C:\Windows\System32\cmd.exe
                                                  "C:\Windows\System32\cmd.exe" /c del/s/q C:\Users\Admin\Desktop\SubmitPop.odt
                                                  2⤵
                                                    PID:2600
                                                  • C:\Windows\System32\cmd.exe
                                                    "C:\Windows\System32\cmd.exe" /c del/s/q C:\Users\Admin\Desktop\SwitchWrite.ppt
                                                    2⤵
                                                      PID:2928
                                                    • C:\Windows\System32\cmd.exe
                                                      "C:\Windows\System32\cmd.exe" /c del/s/q C:\Users\Admin\Desktop\TestConvertTo.xlsx
                                                      2⤵
                                                        PID:2212
                                                      • C:\Windows\System32\cmd.exe
                                                        "C:\Windows\System32\cmd.exe" /c del/s/q C:\Users\Admin\Desktop\TraceRepair.tiff
                                                        2⤵
                                                          PID:2104
                                                        • C:\Windows\System32\cmd.exe
                                                          "C:\Windows\System32\cmd.exe" /c del/s/q C:\Users\Admin\Desktop\UnprotectConnect.dll
                                                          2⤵
                                                            PID:1640
                                                          • C:\Windows\System32\cmd.exe
                                                            "C:\Windows\System32\cmd.exe" /c del/s/q C:\Users\Admin\Desktop\UnregisterSwitch.docx
                                                            2⤵
                                                              PID:588
                                                            • C:\Windows\System32\cmd.exe
                                                              "C:\Windows\System32\cmd.exe" /c del/s/q C:\Users\Admin\Desktop\UseInstall.mpg
                                                              2⤵
                                                                PID:536
                                                              • C:\Windows\System32\cmd.exe
                                                                "C:\Windows\System32\cmd.exe" /c del/s/q C:\Users\Admin\Desktop\WaitFormat.3gpp
                                                                2⤵
                                                                  PID:2304
                                                              • C:\Windows\System32\WScript.exe
                                                                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roamings.vbs"
                                                                1⤵
                                                                  PID:1972
                                                                  • C:\Windows\System32\WScript.exe
                                                                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\tase.vbs"
                                                                    2⤵
                                                                      PID:1512
                                                                    • C:\Windows\System32\WScript.exe
                                                                      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\tase.vbs"
                                                                      2⤵
                                                                        PID:980
                                                                      • C:\Windows\System32\WScript.exe
                                                                        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\tase.vbs"
                                                                        2⤵
                                                                          PID:2468
                                                                        • C:\Windows\System32\WScript.exe
                                                                          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\tase.vbs"
                                                                          2⤵
                                                                            PID:1636
                                                                          • C:\Windows\System32\WScript.exe
                                                                            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\tase.vbs"
                                                                            2⤵
                                                                              PID:1892
                                                                            • C:\Windows\System32\WScript.exe
                                                                              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\tase.vbs"
                                                                              2⤵
                                                                                PID:1404
                                                                              • C:\Windows\System32\WScript.exe
                                                                                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\tase.vbs"
                                                                                2⤵
                                                                                  PID:1920
                                                                                • C:\Windows\System32\WScript.exe
                                                                                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\tase.vbs"
                                                                                  2⤵
                                                                                    PID:1872
                                                                                  • C:\Windows\System32\WScript.exe
                                                                                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\tase.vbs"
                                                                                    2⤵
                                                                                      PID:1676
                                                                                    • C:\Windows\System32\WScript.exe
                                                                                      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\tase.vbs"
                                                                                      2⤵
                                                                                        PID:376
                                                                                      • C:\Windows\System32\WScript.exe
                                                                                        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\tase.vbs"
                                                                                        2⤵
                                                                                          PID:3044
                                                                                        • C:\Windows\System32\WScript.exe
                                                                                          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\tase.vbs"
                                                                                          2⤵
                                                                                            PID:632
                                                                                          • C:\Windows\System32\WScript.exe
                                                                                            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\tase.vbs"
                                                                                            2⤵
                                                                                              PID:1316
                                                                                            • C:\Windows\System32\WScript.exe
                                                                                              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\tase.vbs"
                                                                                              2⤵
                                                                                                PID:1528
                                                                                              • C:\Windows\System32\WScript.exe
                                                                                                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\tase.vbs"
                                                                                                2⤵
                                                                                                  PID:1168
                                                                                                • C:\Windows\System32\WScript.exe
                                                                                                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\tase.vbs"
                                                                                                  2⤵
                                                                                                    PID:2028
                                                                                                  • C:\Windows\System32\WScript.exe
                                                                                                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\tase.vbs"
                                                                                                    2⤵
                                                                                                      PID:1320
                                                                                                    • C:\Windows\System32\WScript.exe
                                                                                                      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\tase.vbs"
                                                                                                      2⤵
                                                                                                        PID:1712
                                                                                                      • C:\Windows\System32\WScript.exe
                                                                                                        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\tase.vbs"
                                                                                                        2⤵
                                                                                                          PID:1072
                                                                                                        • C:\Windows\System32\WScript.exe
                                                                                                          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\tase.vbs"
                                                                                                          2⤵
                                                                                                            PID:1260
                                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" wininit
                                                                                                            2⤵
                                                                                                              PID:2828
                                                                                                              • C:\Windows\system32\wininit.exe
                                                                                                                "C:\Windows\system32\wininit.exe"
                                                                                                                3⤵
                                                                                                                  PID:2332

                                                                                                            Network

                                                                                                            MITRE ATT&CK Enterprise v15

                                                                                                            Replay Monitor

                                                                                                            Loading Replay Monitor...

                                                                                                            Downloads

                                                                                                            • C:\Users\Admin\AppData\Roaming\tase.vbs

                                                                                                              Filesize

                                                                                                              39B

                                                                                                              MD5

                                                                                                              683dfe35aa1dff3011f8c9ab4cbce03c

                                                                                                              SHA1

                                                                                                              0096ea14c6ae595a7b24ad7ca3a666ecedafcad8

                                                                                                              SHA256

                                                                                                              31f19c00142e1d7fa6c153fb72b77a21a1c65899355362b961ba739e0ff5ba41

                                                                                                              SHA512

                                                                                                              ec7773c60ea8881246f241b6ef76e8ce478a4afb578763275066cf046242c725b3ad33ce2adbdba81635087b219b9598c2c325b0d6c3818cec25dc8abf764cb1

                                                                                                            • C:\Users\Admin\AppData\Roamings.vbs

                                                                                                              Filesize

                                                                                                              676B

                                                                                                              MD5

                                                                                                              b571cf609f720ad0a79eda45635bb974

                                                                                                              SHA1

                                                                                                              dc78241531a0f52fbbeac3ffa8ed57e34e79820e

                                                                                                              SHA256

                                                                                                              fbfddaf321578f179fc4259362de5f69ced2cdfdc36541fd27dd298ad33f2768

                                                                                                              SHA512

                                                                                                              e0627a43e90779aca60fba4b4875f9792cd3f0a8a81fa371779306f480d647a949c4a2c0202d85740dc7be432d620a2d2e773a1ebbc378cb56ef0265ab77dfa2

                                                                                                            • C:\Users\Admin\Desktop\DIE6.lnk

                                                                                                              Filesize

                                                                                                              1KB

                                                                                                              MD5

                                                                                                              f9f37c44654abb2d0468a67576fcc65f

                                                                                                              SHA1

                                                                                                              c85be96a90718758bd652655357daf0f9acbdac0

                                                                                                              SHA256

                                                                                                              ac44e62beea555ab32b48046d158b42800ff735aee03c92f906f8256357db92f

                                                                                                              SHA512

                                                                                                              88218be04f7cf624890fa3f2e2441051ad49fc97420d7103ccfcfa4de8ae57b73645d2fc5b82b68fd2a62cc7c4a337765a3ef27e61fe400bd684d5b836b995a8

                                                                                                            • memory/2828-428-0x000000001B6B0000-0x000000001B992000-memory.dmp

                                                                                                              Filesize

                                                                                                              2.9MB

                                                                                                            • memory/2828-429-0x0000000001E10000-0x0000000001E18000-memory.dmp

                                                                                                              Filesize

                                                                                                              32KB