Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
03/03/2025, 18:30
250303-w5sk1avpt2 1003/03/2025, 18:28
250303-w4lq3avwc1 1021/02/2025, 04:13
250221-etdt2asrcr 10Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
03/03/2025, 18:28
Static task
static1
Behavioral task
behavioral1
Sample
d14c42b8258c8a642a6d4b19791b5f0d046fa2811ca06beb34c088812bbeb454.js
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
d14c42b8258c8a642a6d4b19791b5f0d046fa2811ca06beb34c088812bbeb454.js
Resource
win10v2004-20250217-en
General
-
Target
d14c42b8258c8a642a6d4b19791b5f0d046fa2811ca06beb34c088812bbeb454.js
-
Size
844KB
-
MD5
90e6da66dd2f4a6e5758a96d238db42a
-
SHA1
febc0ca2102b8d97dc6ba7d4399dde1e7a9c18b1
-
SHA256
d14c42b8258c8a642a6d4b19791b5f0d046fa2811ca06beb34c088812bbeb454
-
SHA512
c22e9920752f017334ce17bae3ddbd48eb47901add7416a1671160646908fa47830de204baca95d3279da5c73c052bb0ed7bc6fb1a3a63cf2e67ae5bf54e971b
-
SSDEEP
24576:7WCgo+ogQc5WfNnZmD/nFKJqfJMeHD1jEOWpyQTJEFNE3NEr:7WCgo+ogQc5WfNnZmD/nAJqfnbWpyQTK
Malware Config
Signatures
-
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2648 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2648 powershell.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2600 wrote to memory of 2568 2600 taskeng.exe 31 PID 2600 wrote to memory of 2568 2600 taskeng.exe 31 PID 2600 wrote to memory of 2568 2600 taskeng.exe 31 PID 2568 wrote to memory of 2924 2568 wscript.EXE 32 PID 2568 wrote to memory of 2924 2568 wscript.EXE 32 PID 2568 wrote to memory of 2924 2568 wscript.EXE 32 PID 2924 wrote to memory of 2648 2924 cscript.exe 35 PID 2924 wrote to memory of 2648 2924 cscript.exe 35 PID 2924 wrote to memory of 2648 2924 cscript.exe 35 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\d14c42b8258c8a642a6d4b19791b5f0d046fa2811ca06beb34c088812bbeb454.js1⤵PID:2656
-
C:\Windows\system32\taskeng.exetaskeng.exe {51727C37-E9C4-4D2C-AA1C-08A591DD7AAB} S-1-5-21-2703099537-420551529-3771253338-1000:XECUDNCD\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\system32\wscript.EXEC:\Windows\system32\wscript.EXE FUNCTI~1.JS2⤵
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\System32\cscript.exe"C:\Windows\System32\cscript.exe" "FUNCTI~1.JS"3⤵
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2648
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40.4MB
MD5fa3c553ef1c531354c9e976d2d12c391
SHA1371f86704bdf083f05565459a51b349131d3da95
SHA256ac8a8e3e6565aa4697dd9070c339aa70c1a3d7647eea12b20b5cf793b30281f3
SHA512070605e770e0e7db595cdc876bcb89bb142cf749310934f9f2de22ea19d196f9024e2ce3357ad070667a0ec7823ba9aaf1da187f83f242a2bea65c4699679f00