Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
125s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
20/02/2025, 20:48
Static task
static1
Behavioral task
behavioral1
Sample
ORIGINAL - Investigation - cancellation of contract letter format 98749.js
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
ORIGINAL - Investigation - cancellation of contract letter format 98749.js
Resource
win10v2004-20250217-en
General
-
Target
ORIGINAL - Investigation - cancellation of contract letter format 98749.js
-
Size
844KB
-
MD5
90e6da66dd2f4a6e5758a96d238db42a
-
SHA1
febc0ca2102b8d97dc6ba7d4399dde1e7a9c18b1
-
SHA256
d14c42b8258c8a642a6d4b19791b5f0d046fa2811ca06beb34c088812bbeb454
-
SHA512
c22e9920752f017334ce17bae3ddbd48eb47901add7416a1671160646908fa47830de204baca95d3279da5c73c052bb0ed7bc6fb1a3a63cf2e67ae5bf54e971b
-
SSDEEP
24576:7WCgo+ogQc5WfNnZmD/nFKJqfJMeHD1jEOWpyQTJEFNE3NEr:7WCgo+ogQc5WfNnZmD/nAJqfnbWpyQTK
Malware Config
Signatures
-
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1144 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1144 powershell.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2028 wrote to memory of 2252 2028 taskeng.exe 30 PID 2028 wrote to memory of 2252 2028 taskeng.exe 30 PID 2028 wrote to memory of 2252 2028 taskeng.exe 30 PID 2252 wrote to memory of 580 2252 wscript.EXE 31 PID 2252 wrote to memory of 580 2252 wscript.EXE 31 PID 2252 wrote to memory of 580 2252 wscript.EXE 31 PID 580 wrote to memory of 1144 580 cscript.exe 33 PID 580 wrote to memory of 1144 580 cscript.exe 33 PID 580 wrote to memory of 1144 580 cscript.exe 33 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\wscript.exewscript.exe "C:\Users\Admin\AppData\Local\Temp\ORIGINAL - Investigation - cancellation of contract letter format 98749.js"1⤵PID:2792
-
C:\Windows\system32\taskeng.exetaskeng.exe {AF09DB38-D4BC-4BBA-86B6-A81E72105344} S-1-5-21-3692679935-4019334568-335155002-1000:BCXRJFKE\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\system32\wscript.EXEC:\Windows\system32\wscript.EXE FUNCTI~1.JS2⤵
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Windows\System32\cscript.exe"C:\Windows\System32\cscript.exe" "FUNCTI~1.JS"3⤵
- Suspicious use of WriteProcessMemory
PID:580 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1144
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40.4MB
MD54fb0ce6cf174e8535c42932778796437
SHA1955b3a3469b6acde1366dc46f2ff68692b4894fe
SHA25687ac9f128a1310a1c5b146f9ef0990499ce90d30e6d3e981acd6c7988668cd4c
SHA512222e43edcf00d81ae3c90838f272fa0066fe52b622bee9184a749620631f95dd2a489f4357eba62f7a2fec618bc55c277f53eba9d8e0394b1cceaf537b68953a