Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    210s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    27/07/2024, 12:25

General

  • Target

    DRAFT DOCUMENTS.js

  • Size

    479KB

  • MD5

    b5f0861bf48f0fb76e6c504eba4a0128

  • SHA1

    7cf3a28b5255bbda0cff658a6f2a08b132d75e80

  • SHA256

    f3075816f60feaf04e278ad2ed3ab2aff1345b77c0978f1ebbd1bf3dd3b9677a

  • SHA512

    dfc3d832a2bb39546f80e8b96c2337317f5a33d6dac3a948fe805683c7416711088dbbe9b4361ff98f2becd492ffa65b2af0cb86772a414dbacaf821a9b21ff4

  • SSDEEP

    12288:ljuNGDcp8kQrSKUjlhkEgV/54KG9dvbcYImaKu82ZYHs5dMM8AQ11WGrp0sa:KGDcpIEjW

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Drops file in System32 directory 13 IoCs
  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 26 IoCs
  • Suspicious use of AdjustPrivilegeToken 17 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe "C:\Users\Admin\AppData\Local\Temp\DRAFT DOCUMENTS.js"
    1⤵
    • Blocklisted process makes network request
    PID:2552
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {B347CD4E-551A-4304-A607-A40D208E4BFC} S-1-5-21-2212144002-1172735686-1556890956-1000:MVFYZPLM\Admin:Interactive:[1]
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2844
    • C:\Windows\System32\WScript.exe
      C:\Windows\System32\WScript.exe "C:\Users\Admin\UfFiqQIFyjJeqsw.vbs"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2760
      • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
        3⤵
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2656
        • C:\Windows\system32\wermgr.exe
          "C:\Windows\system32\wermgr.exe" "-outproc" "2656" "1452"
          4⤵
            PID:1368
        • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
          3⤵
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2216
          • C:\Windows\system32\wermgr.exe
            "C:\Windows\system32\wermgr.exe" "-outproc" "2216" "1448"
            4⤵
              PID:2196
          • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
            3⤵
            • Drops file in System32 directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1692
            • C:\Windows\system32\wermgr.exe
              "C:\Windows\system32\wermgr.exe" "-outproc" "1692" "1448"
              4⤵
                PID:2328
            • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
              3⤵
              • Drops file in System32 directory
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2984
              • C:\Windows\system32\wermgr.exe
                "C:\Windows\system32\wermgr.exe" "-outproc" "2984" "1444"
                4⤵
                  PID:1484
              • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
                3⤵
                • Drops file in System32 directory
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:2068
                • C:\Windows\system32\wermgr.exe
                  "C:\Windows\system32\wermgr.exe" "-outproc" "2068" "1444"
                  4⤵
                    PID:2400
                • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
                  3⤵
                  • Drops file in System32 directory
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:3024
                  • C:\Windows\system32\wermgr.exe
                    "C:\Windows\system32\wermgr.exe" "-outproc" "3024" "1448"
                    4⤵
                      PID:932
                  • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                    "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
                    3⤵
                    • Drops file in System32 directory
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:1848
                    • C:\Windows\system32\wermgr.exe
                      "C:\Windows\system32\wermgr.exe" "-outproc" "1848" "1448"
                      4⤵
                        PID:2392
                    • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                      "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
                      3⤵
                      • Drops file in System32 directory
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:1504
                      • C:\Windows\system32\wermgr.exe
                        "C:\Windows\system32\wermgr.exe" "-outproc" "1504" "1444"
                        4⤵
                          PID:1688
                      • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                        "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
                        3⤵
                        • Drops file in System32 directory
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:2768
                        • C:\Windows\system32\wermgr.exe
                          "C:\Windows\system32\wermgr.exe" "-outproc" "2768" "1448"
                          4⤵
                            PID:2692
                        • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                          "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
                          3⤵
                          • Drops file in System32 directory
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of WriteProcessMemory
                          PID:1708
                          • C:\Windows\system32\wermgr.exe
                            "C:\Windows\system32\wermgr.exe" "-outproc" "1708" "1444"
                            4⤵
                              PID:2164
                          • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                            "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
                            3⤵
                            • Drops file in System32 directory
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2804
                            • C:\Windows\system32\wermgr.exe
                              "C:\Windows\system32\wermgr.exe" "-outproc" "2804" "1448"
                              4⤵
                                PID:2304
                            • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                              "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
                              3⤵
                              • Drops file in System32 directory
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              PID:2008
                              • C:\Windows\system32\wermgr.exe
                                "C:\Windows\system32\wermgr.exe" "-outproc" "2008" "1448"
                                4⤵
                                  PID:1588
                              • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
                                3⤵
                                • Drops file in System32 directory
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of AdjustPrivilegeToken
                                PID:1344
                                • C:\Windows\system32\wermgr.exe
                                  "C:\Windows\system32\wermgr.exe" "-outproc" "1344" "1444"
                                  4⤵
                                    PID:2144
                                • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                  "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
                                  3⤵
                                    PID:1092
                              • C:\Windows\system32\AUDIODG.EXE
                                C:\Windows\system32\AUDIODG.EXE 0x49c
                                1⤵
                                • Suspicious use of AdjustPrivilegeToken
                                PID:268

                              Network

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259551311.txt

                                Filesize

                                1KB

                                MD5

                                1771e59613677809d646f8ff97220773

                                SHA1

                                45cd86be2f396b6ac4c6adf642c4a385d975ee9d

                                SHA256

                                4e4ec79a0ab3502cbecc5b4b1e341c248d0b6052b4c3863daf4c1d6253aef1de

                                SHA512

                                ab0bf52cec76827bb13824fb0e0045c8cd4d3f88b4b6a8b0af0c26b196e00e17842bdf79c842c476608eca4ef32915ff36a0289319b9fba4de61065235ca2ea5

                              • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259571226.txt

                                Filesize

                                1KB

                                MD5

                                a4f792f6b7959957987ab37ce3c2459f

                                SHA1

                                f4c387d3f7f5920855618afee4dfa18cf997e523

                                SHA256

                                3e357d95f2bb68fe0284d4df639847b918508810a5b2ce9739a4500286e5de9e

                                SHA512

                                99458a8478afe1608f0ed23a70f9b3c3a8bb5221b424bb6208c0af146d7a9d11ae18f786dd82eec1ba14c5e2827ffbf93ea0634e81d31c92b7dd465a3d43e301

                              • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259585889.txt

                                Filesize

                                1KB

                                MD5

                                90f7af73f9ba9d1e68c3b76447b0af23

                                SHA1

                                21041885bd39fd0589dada88c7a24c79b0128099

                                SHA256

                                ddb72701d462fbbb32d09e2e2962aae35fc8dabb26b663f484e95f144417328a

                                SHA512

                                5cec7a9cc0f833b519219a0b25e4a6e931f501bd6b1306f33010639a438beced59ec1a7615e5f3c2af5f9ec2cb43958bdbebd02f574fc8c01fb64658cb0f5101

                              • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259597915.txt

                                Filesize

                                1KB

                                MD5

                                0c5abd076061413d9210786c396212c8

                                SHA1

                                916f1f301323c4ff03a60a677a44424de97ff9ac

                                SHA256

                                7d5629c06bc1e6e32f33953a178ed77a3b7aefc2ee0c60b99f1dc7df94fa1b4a

                                SHA512

                                81861cac12ada981770e0e164381d9bbb1214c564a66607c4b6e5ede75cc25995d5a3e5c39ab4c722c048e76d340df24e01e0d4926200d0f14838a7b4f93d580

                              • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259612955.txt

                                Filesize

                                1KB

                                MD5

                                241a49f67676e34c5c05dec85099d10e

                                SHA1

                                c3c890630dd295e0b902247862d5faa4a42fb158

                                SHA256

                                5b4b8b395c2e4e77dac4018fa94e1e70e62873f2211a8708260e4ad43604349d

                                SHA512

                                e5ba878e0b3574157e0015010f9dba34307394d1a8d7cfbbb4df9448dce19b2eab52415ae2132e883ef7aba8837a33de508c90b578557f6ade526861e062ee21

                              • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259632754.txt

                                Filesize

                                1KB

                                MD5

                                978bfe426706141bb43109ee4cc7f045

                                SHA1

                                b023406174c30aa00ad7ba67708bcc876710b36e

                                SHA256

                                1adda6396f129a568fc82d619c8fa47974a984d2b8156e384b12af3ed040905b

                                SHA512

                                63c0a93a784ef80894774c11cb14a75467698a140beb34069b05212a1524a4d83a85fb0af1ef84d9388b7a0afb53704839b405aebca8fa342e15b7c9937537b8

                              • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259647028.txt

                                Filesize

                                1KB

                                MD5

                                bd3b855502108254ef0a34c64ba6adb4

                                SHA1

                                c46cdc5280de5dd657fb6584bdbddcf7b83e5b5f

                                SHA256

                                6948e788e8956c6cef2634c14a36fd760faacc788d58f869927e192eafd1052d

                                SHA512

                                58a2987cc5613e28a340b2ba9fa41b7435015ad2eaf657e566588d2a5fa3af5a9eb05112b0fea1603e56d0d64d03edd38d01b72249ef524220dec98ae2cbc270

                              • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259660101.txt

                                Filesize

                                1KB

                                MD5

                                3253d79497e34e9525ebbe2228c3124a

                                SHA1

                                83780163871606aa7d590a9fe5048b3cb51ef555

                                SHA256

                                ca0362b045c6fd4ab969f1ba8bd8851b117247a67a16076c469950624396fbb0

                                SHA512

                                08c8411d9a699d0381770f4c20034fc763332185718da1eb11366488b66f10e7027d4d779f92bd0050164535e4dc2c3d293c2bb1f4342b264b1f9422df35b968

                              • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259675111.txt

                                Filesize

                                1KB

                                MD5

                                fbce2bab4f47b7bf8f2cdb423270d88d

                                SHA1

                                6bca5674fef7ffe072a48010ea2bee0eccec0177

                                SHA256

                                b29f0dbfede78b05f386f8974bbc67e8463b05f3a5e6ba65efbcd367b060a628

                                SHA512

                                2e90e7f7e997205a2dd26d425266ee8b1b56c20a0f06bd1ee0db0b97ed3bcf76dca960bb11855458eedaf4cb0ec090a1234e421bccf51dd98707070d4c8c0363

                              • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259691054.txt

                                Filesize

                                1KB

                                MD5

                                3750c49f46dec7b63c3a57860a61a277

                                SHA1

                                91ed57f1f6a86129d211f5cdda78ecff6f649654

                                SHA256

                                d3403db9606bceaaafa60c6c0ad8bcb15813f02e82d9f0edffa1505e790b68c6

                                SHA512

                                6ac35fa97d13f8d91a0b49f79bab5bd9fccaae1f205471357117f17a54de709e1ea6f7f70da9896ec6cc0aaa21684d7a264ce030380967ca6a748ee3ae9c251c

                              • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259709646.txt

                                Filesize

                                1KB

                                MD5

                                57cb14ad3734862ff0468aaa68dadd1b

                                SHA1

                                bb5d34583e931033b9b7e550959ed4704e96e02d

                                SHA256

                                23c2aefc6e249aafeb01e9d1b07d5ca0bd94d8467b96372dc313891792dafdad

                                SHA512

                                3a73f8cd24dbf51ff544f870440086e11be0c77956f7e4a26dba0c62ec0adfd76fc4f7bce020002d58a72ba60d883325f4ca0506ad6563edbcb5e52dc5061bf3

                              • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259722299.txt

                                Filesize

                                1KB

                                MD5

                                3403b330d1cda614acf6f9df97b203c4

                                SHA1

                                53871e02332691abba27752446f0a43be9eab100

                                SHA256

                                a852f90a96e3607475ae9e1d261a401620ee40d43a41c6e5e3d208680391cc84

                                SHA512

                                6347147eb8a696502e4a483ff0b5dde75198857fa16e758602b7d20db4cc1637a64b8bf300fd80c585e779e8ff38a5b6ea58d555f8b4fa3e86a9c7887e87da9f

                              • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259738999.txt

                                Filesize

                                1KB

                                MD5

                                ceb0513b7b2d7b80d82ea51f308eee54

                                SHA1

                                b4e9a0f30ed42920f0894448215952b59c22bcb6

                                SHA256

                                97becb2d5ea656766a54517aeafe6873a9958dcf4538ca721aa5e87ddeedc308

                                SHA512

                                f7eaa2edfc7ba04bb38c864aafa5a7eb48ba0eab4ec74a75d77725832a4f3388195d762f36f640827933f3a16db186c3849cc0461a09a087adfcc1c160e01755

                              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                Filesize

                                7KB

                                MD5

                                ecbee3b66b6523aa34d9b99efebcd94a

                                SHA1

                                94bf12b75c76b550845a6776be8104435a3f914a

                                SHA256

                                e43f6bf9dd143df0e8788d955e2ae86cb6d978b2fd4988e6ed3a7d4288e9a0d2

                                SHA512

                                b46fe5a63b81d918ddfb41dda22b528e440d5f794a4c61816d4dfb7926b932c0aad721bb662714789b7b23a1305b135bc7f0bdf80f81a587ca0c8212eb93c4ea

                              • C:\Users\Admin\UfFiqQIFyjJeqsw.vbs

                                Filesize

                                1KB

                                MD5

                                497215d7a2476941168d769ae3f69bdc

                                SHA1

                                965596f250bfb962d6f084fb2f4bb4d349ee73b2

                                SHA256

                                6d3a8a1889f3752e50f48670c0cc32f1462b9ccc8c438c0571a63a0ef44d5d6c

                                SHA512

                                58b1bd95ea3b30bc04390ed2d4f051887f509df5d1ee0747a49b156e8851a7521a2be8a3f46498a7a96be7e4e678cd0a9ce18b3caea888119ea64e3a6785e5d2

                              • memory/1504-63-0x000000001B3A0000-0x000000001B682000-memory.dmp

                                Filesize

                                2.9MB

                              • memory/1848-55-0x000000001B400000-0x000000001B6E2000-memory.dmp

                                Filesize

                                2.9MB

                              • memory/2216-18-0x0000000002010000-0x0000000002018000-memory.dmp

                                Filesize

                                32KB

                              • memory/2216-17-0x000000001B380000-0x000000001B662000-memory.dmp

                                Filesize

                                2.9MB

                              • memory/2656-9-0x0000000002270000-0x0000000002278000-memory.dmp

                                Filesize

                                32KB

                              • memory/2656-8-0x000000001B3D0000-0x000000001B6B2000-memory.dmp

                                Filesize

                                2.9MB