Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    15s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    01/09/2024, 13:12

General

  • Target

    code.vbs

  • Size

    566B

  • MD5

    73d9fdda098386095a38def08f0391cf

  • SHA1

    4cc22841ea50caaeb8de420cb5da4a0af44a817c

  • SHA256

    939c8987dca4aacad41066c29eb0bee95ed447c5f9597953fd1de0027c660ee4

  • SHA512

    f6e1eee98e643f113693a43477ae47357289afa1b3d0ab9312c18e642c2bb5712af741da2bc4ac7d782a1cecb1ed76993713dedf1d204af73ecb91a7e2c66ee0

Score
8/10

Malware Config

Signatures

  • Possible privilege escalation attempt 16 IoCs
  • Modifies file permissions 1 TTPs 16 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\code.vbs"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1140
    • C:\Windows\System32\takeown.exe
      "C:\Windows\System32\takeown.exe" /f C:\Users\Admin\deployment.properties
      2⤵
      • Possible privilege escalation attempt
      • Modifies file permissions
      PID:2300
    • C:\Windows\System32\icacls.exe
      "C:\Windows\System32\icacls.exe" C:\Users\Admin\deployment.properties /grant Everyone:(F)
      2⤵
      • Possible privilege escalation attempt
      • Modifies file permissions
      PID:2440
    • C:\Windows\System32\takeown.exe
      "C:\Windows\System32\takeown.exe" /f C:\Users\Admin\NTUSER.DAT
      2⤵
      • Possible privilege escalation attempt
      • Modifies file permissions
      PID:2880
    • C:\Windows\System32\icacls.exe
      "C:\Windows\System32\icacls.exe" C:\Users\Admin\NTUSER.DAT /grant Everyone:(F)
      2⤵
      • Possible privilege escalation attempt
      • Modifies file permissions
      PID:2344
    • C:\Windows\System32\takeown.exe
      "C:\Windows\System32\takeown.exe" /f C:\Users\Admin\ntuser.dat.LOG1
      2⤵
      • Possible privilege escalation attempt
      • Modifies file permissions
      PID:2916
    • C:\Windows\System32\icacls.exe
      "C:\Windows\System32\icacls.exe" C:\Users\Admin\ntuser.dat.LOG1 /grant Everyone:(F)
      2⤵
      • Possible privilege escalation attempt
      • Modifies file permissions
      PID:2680
    • C:\Windows\System32\takeown.exe
      "C:\Windows\System32\takeown.exe" /f C:\Users\Admin\ntuser.dat.LOG2
      2⤵
      • Possible privilege escalation attempt
      • Modifies file permissions
      PID:2668
    • C:\Windows\System32\icacls.exe
      "C:\Windows\System32\icacls.exe" C:\Users\Admin\ntuser.dat.LOG2 /grant Everyone:(F)
      2⤵
      • Possible privilege escalation attempt
      • Modifies file permissions
      PID:2808
    • C:\Windows\System32\takeown.exe
      "C:\Windows\System32\takeown.exe" /f C:\Users\Admin\NTUSER.DAT{016888bd-6c6f-11de-8d1d-001e0bcde3ec}.TM.blf
      2⤵
      • Possible privilege escalation attempt
      • Modifies file permissions
      PID:2640
    • C:\Windows\System32\icacls.exe
      "C:\Windows\System32\icacls.exe" C:\Users\Admin\NTUSER.DAT{016888bd-6c6f-11de-8d1d-001e0bcde3ec}.TM.blf /grant Everyone:(F)
      2⤵
      • Possible privilege escalation attempt
      • Modifies file permissions
      PID:2716
    • C:\Windows\System32\takeown.exe
      "C:\Windows\System32\takeown.exe" /f C:\Users\Admin\NTUSER.DAT{016888bd-6c6f-11de-8d1d-001e0bcde3ec}.TMContainer00000000000000000001.regtrans-ms
      2⤵
      • Possible privilege escalation attempt
      • Modifies file permissions
      PID:2256
    • C:\Windows\System32\icacls.exe
      "C:\Windows\System32\icacls.exe" C:\Users\Admin\NTUSER.DAT{016888bd-6c6f-11de-8d1d-001e0bcde3ec}.TMContainer00000000000000000001.regtrans-ms /grant Everyone:(F)
      2⤵
      • Possible privilege escalation attempt
      • Modifies file permissions
      PID:2288
    • C:\Windows\System32\takeown.exe
      "C:\Windows\System32\takeown.exe" /f C:\Users\Admin\NTUSER.DAT{016888bd-6c6f-11de-8d1d-001e0bcde3ec}.TMContainer00000000000000000002.regtrans-ms
      2⤵
      • Possible privilege escalation attempt
      • Modifies file permissions
      PID:2172
    • C:\Windows\System32\icacls.exe
      "C:\Windows\System32\icacls.exe" C:\Users\Admin\NTUSER.DAT{016888bd-6c6f-11de-8d1d-001e0bcde3ec}.TMContainer00000000000000000002.regtrans-ms /grant Everyone:(F)
      2⤵
      • Possible privilege escalation attempt
      • Modifies file permissions
      PID:1240
    • C:\Windows\System32\takeown.exe
      "C:\Windows\System32\takeown.exe" /f C:\Users\Admin\ntuser.ini
      2⤵
      • Possible privilege escalation attempt
      • Modifies file permissions
      PID:1836
    • C:\Windows\System32\icacls.exe
      "C:\Windows\System32\icacls.exe" C:\Users\Admin\ntuser.ini /grant Everyone:(F)
      2⤵
      • Possible privilege escalation attempt
      • Modifies file permissions
      PID:632

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads