Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
18/12/2024, 14:27
241218-rsv35stjdr 1018/12/2024, 13:54
241218-q71rha1mfw 1018/12/2024, 13:48
241218-q4epvs1ldw 1018/12/2024, 02:32
241218-c1s67azqhq 10Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18/12/2024, 14:27
Static task
static1
Behavioral task
behavioral1
Sample
53f8a46c948c968fe753a5f723bdf99d3b3d141dc3dec3d8e36480975c7ce879.js
Resource
win7-20240903-en
General
-
Target
53f8a46c948c968fe753a5f723bdf99d3b3d141dc3dec3d8e36480975c7ce879.js
-
Size
281KB
-
MD5
95238ad5a91d721c6e8fdf4c36187798
-
SHA1
7b468a279606b62b0abe1a3e14aa16f0c9e6b93d
-
SHA256
53f8a46c948c968fe753a5f723bdf99d3b3d141dc3dec3d8e36480975c7ce879
-
SHA512
26139d8e3a97a9971f1163af0754c3f990b82f4af04f0fc6862dc1b2ae6186a6948a001c7c8ab2b6e981b409715e30b8c2bdf007e8d02e539c37f95438486441
-
SSDEEP
6144:i53Ih6ntcHCDMwfT2jP4OfSqy+QBFm9E7JFy8PlI4I1f8sATRZtr:ivs4OfSDFmcNe1f8sATtr
Malware Config
Signatures
-
GootLoader
JavaScript loader known for delivering other families such as Gootkit and Cobaltstrike.
-
Gootloader family
-
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3000 wrote to memory of 2260 3000 taskeng.exe 32 PID 3000 wrote to memory of 2260 3000 taskeng.exe 32 PID 3000 wrote to memory of 2260 3000 taskeng.exe 32 PID 2260 wrote to memory of 2136 2260 wscript.EXE 33 PID 2260 wrote to memory of 2136 2260 wscript.EXE 33 PID 2260 wrote to memory of 2136 2260 wscript.EXE 33 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\53f8a46c948c968fe753a5f723bdf99d3b3d141dc3dec3d8e36480975c7ce879.js1⤵PID:1984
-
C:\Windows\system32\taskeng.exetaskeng.exe {3A331748-AB2F-45B1-8369-24D5B24AAB62} S-1-5-21-3063565911-2056067323-3330884624-1000:KHBTHJFA\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\system32\wscript.EXEC:\Windows\system32\wscript.EXE AUTOMO~1.JS2⤵
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Windows\System32\conhost.exe"C:\Windows\System32\conhost.exe" cscript "AUTOMO~1.JS"3⤵PID:2136
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.4MB
MD56166491ad0afd48ddf8a220c09647acf
SHA1eab4db5de13cd5a0dc2ae132fc99417c0d04df8c
SHA2563fafb3a2d8317e616647c7a8515109b517fd7a194694d7992f0cc451175687e0
SHA51225952807d8044f3dbd2f597139ff38873666cb8529dc5eb98b35a10b2ac8df2d6f07eddf4d29575a4ae6037b4164cb1792615f7fc289eb2f6f863ef313908285