Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    95s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/03/2023, 21:15

General

  • Target

    test.bat

  • Size

    63B

  • MD5

    5edcff91edc49be050b96a68f68f95bd

  • SHA1

    b97dde35f636c022b4698172fafa2137d5c9d79f

  • SHA256

    621814b35e92dabd039eeddb511a1325c98bf1330c0fb588f6bff314bfd83e43

  • SHA512

    001906c256cfa9204180dd1332c3289c8bb03f76e4a28407f36dde89c35fb0f791340d6de8b14698271c05832a64d6ebc1c15bef2c382b7dd9b00c1b67b69316

Score
8/10

Malware Config

Signatures

  • Sets DLL path for service in the registry 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs net.exe
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\test.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:64
    • C:\Windows\system32\rundll32.exe
      rundll32.exe -e C:\Users\Admin\AppData\Local\Temp\sample.dll,#2
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:460
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe -e C:\Users\Admin\AppData\Local\Temp\sample.dll,#2
        3⤵
        • Checks computer location settings
        • Suspicious use of WriteProcessMemory
        PID:1396
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp.bat" "
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1704
          • C:\Windows\SysWOW64\reg.exe
            ReG aDd hKEy_LOcAl_MaChiNE\SYsTEm\CuRRenTCoNTRolSeT\SeRViCeS\AppMgmt\pARamEteRs /v ServiceDll /t REG_EXPAND_SZ /d "C:\Users\Admin\AppData\Local\Temp\sample.dll" /f
            5⤵
            • Sets DLL path for service in the registry
            PID:1688
          • C:\Windows\SysWOW64\reg.exe
            ReG aDd hKEy_LOcAl_MaChiNE\SYsTEm\CuRRenTCoNTRolSeT\SeRViCeS\AppMgmt /v Start /t REG_DWORD /d 2 /f
            5⤵
              PID:3676
            • C:\Windows\SysWOW64\reg.exe
              ReG dELete hKEy_LOcAl_MaChiNE\SYsTEm\CuRRenTCoNTRolSeT\SeRViCeS\AppMgmt\pARamEteRs /v ServiceDllUnloadOnStop /f
              5⤵
                PID:4332
            • C:\Windows\SysWOW64\net.exe
              net start AppMgmt
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:2332
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 start AppMgmt
                5⤵
                  PID:1368

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\tmp.bat

          Filesize

          386B

          MD5

          379a3418df6035e9f53b2da2e5307486

          SHA1

          f58733daf0d750a9c7735604510dbc5dcd01a3f2

          SHA256

          ecb73342ded3fd09ea0159c28a1d086143d9fd5d28e80b5644e3cfac360b0470

          SHA512

          8c2bdc2f1bb8bdeca92e0ee68d8a09252ee05afbdce8843203d2110fb47d2ac9a374bf068190c35b2a838b119886611c99f9e29164333e6dd73deedea7e9f549