Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
95s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
17/03/2023, 21:15
Behavioral task
behavioral1
Sample
test.bat
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
test.bat
Resource
win10v2004-20230220-en
General
-
Target
test.bat
-
Size
63B
-
MD5
5edcff91edc49be050b96a68f68f95bd
-
SHA1
b97dde35f636c022b4698172fafa2137d5c9d79f
-
SHA256
621814b35e92dabd039eeddb511a1325c98bf1330c0fb588f6bff314bfd83e43
-
SHA512
001906c256cfa9204180dd1332c3289c8bb03f76e4a28407f36dde89c35fb0f791340d6de8b14698271c05832a64d6ebc1c15bef2c382b7dd9b00c1b67b69316
Malware Config
Signatures
-
Sets DLL path for service in the registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\AppMgmt\Parameters\ServiceDll = "C:\\Users\\Admin\\AppData\\Local\\Temp\\sample.dll" reg.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs net.exe
-
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 64 wrote to memory of 460 64 cmd.exe 84 PID 64 wrote to memory of 460 64 cmd.exe 84 PID 460 wrote to memory of 1396 460 rundll32.exe 85 PID 460 wrote to memory of 1396 460 rundll32.exe 85 PID 460 wrote to memory of 1396 460 rundll32.exe 85 PID 1396 wrote to memory of 1704 1396 rundll32.exe 86 PID 1396 wrote to memory of 1704 1396 rundll32.exe 86 PID 1396 wrote to memory of 1704 1396 rundll32.exe 86 PID 1396 wrote to memory of 2332 1396 rundll32.exe 87 PID 1396 wrote to memory of 2332 1396 rundll32.exe 87 PID 1396 wrote to memory of 2332 1396 rundll32.exe 87 PID 2332 wrote to memory of 1368 2332 net.exe 90 PID 2332 wrote to memory of 1368 2332 net.exe 90 PID 2332 wrote to memory of 1368 2332 net.exe 90 PID 1704 wrote to memory of 1688 1704 cmd.exe 91 PID 1704 wrote to memory of 1688 1704 cmd.exe 91 PID 1704 wrote to memory of 1688 1704 cmd.exe 91 PID 1704 wrote to memory of 3676 1704 cmd.exe 92 PID 1704 wrote to memory of 3676 1704 cmd.exe 92 PID 1704 wrote to memory of 3676 1704 cmd.exe 92 PID 1704 wrote to memory of 4332 1704 cmd.exe 93 PID 1704 wrote to memory of 4332 1704 cmd.exe 93 PID 1704 wrote to memory of 4332 1704 cmd.exe 93
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\test.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:64 -
C:\Windows\system32\rundll32.exerundll32.exe -e C:\Users\Admin\AppData\Local\Temp\sample.dll,#22⤵
- Suspicious use of WriteProcessMemory
PID:460 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe -e C:\Users\Admin\AppData\Local\Temp\sample.dll,#23⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp.bat" "4⤵
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\SysWOW64\reg.exeReG aDd hKEy_LOcAl_MaChiNE\SYsTEm\CuRRenTCoNTRolSeT\SeRViCeS\AppMgmt\pARamEteRs /v ServiceDll /t REG_EXPAND_SZ /d "C:\Users\Admin\AppData\Local\Temp\sample.dll" /f5⤵
- Sets DLL path for service in the registry
PID:1688
-
-
C:\Windows\SysWOW64\reg.exeReG aDd hKEy_LOcAl_MaChiNE\SYsTEm\CuRRenTCoNTRolSeT\SeRViCeS\AppMgmt /v Start /t REG_DWORD /d 2 /f5⤵PID:3676
-
-
C:\Windows\SysWOW64\reg.exeReG dELete hKEy_LOcAl_MaChiNE\SYsTEm\CuRRenTCoNTRolSeT\SeRViCeS\AppMgmt\pARamEteRs /v ServiceDllUnloadOnStop /f5⤵PID:4332
-
-
-
C:\Windows\SysWOW64\net.exenet start AppMgmt4⤵
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start AppMgmt5⤵PID:1368
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
386B
MD5379a3418df6035e9f53b2da2e5307486
SHA1f58733daf0d750a9c7735604510dbc5dcd01a3f2
SHA256ecb73342ded3fd09ea0159c28a1d086143d9fd5d28e80b5644e3cfac360b0470
SHA5128c2bdc2f1bb8bdeca92e0ee68d8a09252ee05afbdce8843203d2110fb47d2ac9a374bf068190c35b2a838b119886611c99f9e29164333e6dd73deedea7e9f549