Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

18/12/2024, 14:27

241218-rsv35stjdr 10

18/12/2024, 13:54

241218-q71rha1mfw 10

18/12/2024, 13:48

241218-q4epvs1ldw 10

18/12/2024, 02:32

241218-c1s67azqhq 10

Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    18/12/2024, 02:32

General

  • Target

    53f8a46c948c968fe753a5f723bdf99d3b3d141dc3dec3d8e36480975c7ce879.js

  • Size

    281KB

  • MD5

    95238ad5a91d721c6e8fdf4c36187798

  • SHA1

    7b468a279606b62b0abe1a3e14aa16f0c9e6b93d

  • SHA256

    53f8a46c948c968fe753a5f723bdf99d3b3d141dc3dec3d8e36480975c7ce879

  • SHA512

    26139d8e3a97a9971f1163af0754c3f990b82f4af04f0fc6862dc1b2ae6186a6948a001c7c8ab2b6e981b409715e30b8c2bdf007e8d02e539c37f95438486441

  • SSDEEP

    6144:i53Ih6ntcHCDMwfT2jP4OfSqy+QBFm9E7JFy8PlI4I1f8sATRZtr:ivs4OfSDFmcNe1f8sATtr

Malware Config

Signatures

  • GootLoader

    JavaScript loader known for delivering other families such as Gootkit and Cobaltstrike.

  • Gootloader family
  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\53f8a46c948c968fe753a5f723bdf99d3b3d141dc3dec3d8e36480975c7ce879.js
    1⤵
      PID:2016
    • C:\Windows\system32\taskeng.exe
      taskeng.exe {3BAC57E4-E92E-4748-80FC-9ADBD3212DF4} S-1-5-21-3533259084-2542256011-65585152-1000:XPAJOTIY\Admin:Interactive:[1]
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:2776
      • C:\Windows\system32\wscript.EXE
        C:\Windows\system32\wscript.EXE AUTOMO~1.JS
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:3012
        • C:\Windows\System32\conhost.exe
          "C:\Windows\System32\conhost.exe" cscript "AUTOMO~1.JS"
          3⤵
            PID:2596

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\Adobe\AUTOMO~1.JS

        Filesize

        4.4MB

        MD5

        6166491ad0afd48ddf8a220c09647acf

        SHA1

        eab4db5de13cd5a0dc2ae132fc99417c0d04df8c

        SHA256

        3fafb3a2d8317e616647c7a8515109b517fd7a194694d7992f0cc451175687e0

        SHA512

        25952807d8044f3dbd2f597139ff38873666cb8529dc5eb98b35a10b2ac8df2d6f07eddf4d29575a4ae6037b4164cb1792615f7fc289eb2f6f863ef313908285