Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    41s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2022, 07:32

General

  • Target

    HRSword-main/win10初始化.bat

  • Size

    1KB

  • MD5

    5b53acdf4ec5d7362e3c5f355cfde55f

  • SHA1

    8f4af3169478d310f4329b6198833685f08625cf

  • SHA256

    55d308565b647c2633c34b57eee58294579ee029949023a454171bb5e65668ba

  • SHA512

    c1cb9bcfa382774f071c7cd3aaecbc84ea7725c324f66f748ad9ca26e5f7cef02c7311edd043a897a4a66cd7874e725fd7975e1e1e9b475e2efc28648c3a2211

Score
8/10

Malware Config

Signatures

  • Creates new service(s) 1 TTPs
  • Drops file in Drivers directory 4 IoCs
  • Sets service image path in registry 2 TTPs 2 IoCs
  • Launches sc.exe 4 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Suspicious behavior: LoadsDriver 2 IoCs
  • Suspicious use of WriteProcessMemory 57 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\HRSword-main\win10初始化.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1416
    • C:\Windows\system32\reg.exe
      REG QUERY "HKU\S-1-5-19"
      2⤵
        PID:1740
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /S /D /c" echo y"
        2⤵
          PID:1708
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /S /D /c" copy Drivers\usysdiag.exe "C:\Users\Admin\AppData\Local\Temp\HRSword-main\\" 1>NUL 2>NUL"
          2⤵
            PID:1032
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo y"
            2⤵
              PID:744
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" copy Drivers\sysdiag_win10.sys "C:\Windows\System32\drivers\" 1>NUL 2>NUL"
              2⤵
              • Drops file in Drivers directory
              PID:1212
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" echo y"
              2⤵
                PID:1868
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" copy Drivers\hrwfpdrv_win10.sys "C:\Windows\System32\drivers\" 1>NUL 2>NUL"
                2⤵
                • Drops file in Drivers directory
                PID:1876
              • C:\Windows\system32\sc.exe
                sc create hrwfpdrv binpath= "C:\Windows\System32\drivers\hrwfpdrv.sys" type= kernel start= demand error= normal
                2⤵
                • Launches sc.exe
                PID:800
              • C:\Windows\system32\sc.exe
                sc create sysdiag binpath= "C:\Windows\System32\drivers\sysdiag.sys" type= kernel start= demand error= normal depend= FltMgr group= "PNP_TDI"
                2⤵
                • Launches sc.exe
                PID:388
              • C:\Windows\system32\reg.exe
                reg add "HKLM\SYSTEM\CurrentControlSet\Services\sysdiag" /f /v "ImagePath" /t REG_EXPAND_SZ /d "system32\DRIVERS\sysdiag_win10.sys"
                2⤵
                • Sets service image path in registry
                PID:2032
              • C:\Windows\system32\reg.exe
                reg add "HKLM\SYSTEM\CurrentControlSet\Services\hrwfpdr" /f /v "ImagePath" /t REG_EXPAND_SZ /d "system32\DRIVERS\hrwfpdrv_win10.sys"
                2⤵
                • Sets service image path in registry
                PID:812
              • C:\Windows\system32\reg.exe
                reg add "HKLM\SYSTEM\CurrentControlSet\Services\sysdiag" /f /v "Start" /t reg_dword /d "1"
                2⤵
                  PID:344
                • C:\Windows\system32\reg.exe
                  reg add "HKLM\SYSTEM\CurrentControlSet\Services\hrwfpdr" /f /v "Start" /t reg_dword /d "1"
                  2⤵
                    PID:984
                  • C:\Windows\system32\reg.exe
                    reg add "HKLM\SYSTEM\CurrentControlSet\Services\sysdiag" /f /v "Group" /d "PNP_TDI"
                    2⤵
                      PID:1188
                    • C:\Windows\system32\reg.exe
                      reg add "HKLM\SYSTEM\CurrentControlSet\Services\sysdiag\Instances" /f /v "DefaultInstance" /d "sysdiag"
                      2⤵
                        PID:1016
                      • C:\Windows\system32\reg.exe
                        reg add "HKLM\SYSTEM\CurrentControlSet\Services\sysdiag\Instances\sysdiag" /f /v "Altitude" /d "324600"
                        2⤵
                          PID:680
                        • C:\Windows\system32\reg.exe
                          reg add "HKLM\SYSTEM\CurrentControlSet\Services\sysdiag\Instances\sysdiag" /f /v "Flags" /t reg_dword /d "0"
                          2⤵
                            PID:928
                          • C:\Windows\system32\sc.exe
                            sc start sysdiag
                            2⤵
                            • Launches sc.exe
                            PID:1064
                          • C:\Windows\system32\sc.exe
                            sc start hrwfpdrv
                            2⤵
                            • Launches sc.exe
                            PID:432

                        Network

                        MITRE ATT&CK Enterprise v6

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads