Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    110s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/01/2023, 19:48

General

  • Target

    run.bat

  • Size

    28B

  • MD5

    4a79fe5d9105ae3a9d6a24941b11c78f

  • SHA1

    9ecd4402124806303d981974950c7eb7c531e78f

  • SHA256

    40595e4203fe1f84ee705ebf1b9220bd2815567fce7f1644e8748ff35681ecfd

  • SHA512

    6aef34040fa19971d67d1e7b042319ec072075022fb5aaa4419d76b9ad79992178a5bde564a3b6b7c522b018d0f2c6eb06ce35fe4f006c253246bf025708aed8

Score
10/10

Malware Config

Signatures

  • TA505

    Cybercrime group active since 2015, responsible for families like Dridex and Locky.

  • Blocklisted process makes network request 2 IoCs
  • Downloads MZ/PE file
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\run.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1724
    • C:\Windows\system32\rundll32.exe
      rundll32.exe 1c220cdc.dat,#2
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3624
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe 1c220cdc.dat,#2
        3⤵
        • Blocklisted process makes network request
        • Suspicious behavior: EnumeratesProcesses
        PID:2552

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2552-134-0x0000000003330000-0x000000000334E000-memory.dmp

    Filesize

    120KB