Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
03/03/2025, 18:30
250303-w5sk1avpt2 1003/03/2025, 18:28
250303-w4lq3avwc1 1021/02/2025, 04:13
250221-etdt2asrcr 10Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
21/02/2025, 04:13
Static task
static1
Behavioral task
behavioral1
Sample
d14c42b8258c8a642a6d4b19791b5f0d046fa2811ca06beb34c088812bbeb454.js
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
d14c42b8258c8a642a6d4b19791b5f0d046fa2811ca06beb34c088812bbeb454.js
Resource
win10v2004-20250217-en
General
-
Target
d14c42b8258c8a642a6d4b19791b5f0d046fa2811ca06beb34c088812bbeb454.js
-
Size
844KB
-
MD5
90e6da66dd2f4a6e5758a96d238db42a
-
SHA1
febc0ca2102b8d97dc6ba7d4399dde1e7a9c18b1
-
SHA256
d14c42b8258c8a642a6d4b19791b5f0d046fa2811ca06beb34c088812bbeb454
-
SHA512
c22e9920752f017334ce17bae3ddbd48eb47901add7416a1671160646908fa47830de204baca95d3279da5c73c052bb0ed7bc6fb1a3a63cf2e67ae5bf54e971b
-
SSDEEP
24576:7WCgo+ogQc5WfNnZmD/nFKJqfJMeHD1jEOWpyQTJEFNE3NEr:7WCgo+ogQc5WfNnZmD/nAJqfnbWpyQTK
Malware Config
Signatures
-
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2908 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2908 powershell.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2212 wrote to memory of 332 2212 taskeng.exe 32 PID 2212 wrote to memory of 332 2212 taskeng.exe 32 PID 2212 wrote to memory of 332 2212 taskeng.exe 32 PID 332 wrote to memory of 2220 332 wscript.EXE 33 PID 332 wrote to memory of 2220 332 wscript.EXE 33 PID 332 wrote to memory of 2220 332 wscript.EXE 33 PID 2220 wrote to memory of 2908 2220 cscript.exe 35 PID 2220 wrote to memory of 2908 2220 cscript.exe 35 PID 2220 wrote to memory of 2908 2220 cscript.exe 35 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\d14c42b8258c8a642a6d4b19791b5f0d046fa2811ca06beb34c088812bbeb454.js1⤵PID:2852
-
C:\Windows\system32\taskeng.exetaskeng.exe {C70FF30F-B7D7-463F-B004-B09EDE03D3BC} S-1-5-21-1163522206-1469769407-485553996-1000:PJCSDMRP\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\system32\wscript.EXEC:\Windows\system32\wscript.EXE FUNCTI~1.JS2⤵
- Suspicious use of WriteProcessMemory
PID:332 -
C:\Windows\System32\cscript.exe"C:\Windows\System32\cscript.exe" "FUNCTI~1.JS"3⤵
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2908
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40.4MB
MD59b27f3a9a4e7b736029bbbc0bc21e109
SHA101fcee79e6310bc8b52e126f51c9d45ff0db8ebb
SHA256bce9f0de352ab32dc983e8a546e4a7727c32e96b75e0a6451f19a1ee49cf0c12
SHA5127e1a4b5d54198a07cff7663efbb74e590b3a9692960d941a137d52678a370dea57130ce596223691725558c35cb8f43a4f7b9914eadc62e0d73ddbb16793d106