Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
30s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
11/05/2023, 15:58
Behavioral task
behavioral1
Sample
Libparse.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Libparse.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
msvxc.bat
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
msvxc.bat
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
psexec.exe
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
psexec.exe
Resource
win10v2004-20230220-en
General
-
Target
msvxc.bat
-
Size
1KB
-
MD5
c6359a6b2cf7858087f482a17b624238
-
SHA1
bbe518ba66ed1454c617c01506d8a27b7b3d507a
-
SHA256
df2631e89eedd06b94f9309598a23f4b833645c1ed1617c0ab97ff0ff9423f86
-
SHA512
1de3e018054dff10012e948b4a707fdd20dbabe63cb10d0a97ae6fbba6856316c90d53cef4e70c62fc28371021407d46ee2aa136b1e0933f131a7f2fd489f9e6
Malware Config
Signatures
-
resource yara_rule behavioral3/memory/1204-54-0x0000000000400000-0x0000000000437000-memory.dmp upx behavioral3/memory/1204-55-0x0000000000400000-0x0000000000437000-memory.dmp upx behavioral3/memory/1196-56-0x0000000000400000-0x0000000000437000-memory.dmp upx behavioral3/memory/272-57-0x0000000000400000-0x0000000000437000-memory.dmp upx -
Runs net.exe
-
Suspicious behavior: CmdExeWriteProcessMemorySpam 3 IoCs
pid Process 1204 psexec.exe 1196 psexec.exe 272 psexec.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2000 wrote to memory of 1944 2000 cmd.exe 28 PID 2000 wrote to memory of 1944 2000 cmd.exe 28 PID 2000 wrote to memory of 1944 2000 cmd.exe 28 PID 2000 wrote to memory of 1912 2000 cmd.exe 29 PID 2000 wrote to memory of 1912 2000 cmd.exe 29 PID 2000 wrote to memory of 1912 2000 cmd.exe 29 PID 2000 wrote to memory of 932 2000 cmd.exe 31 PID 2000 wrote to memory of 932 2000 cmd.exe 31 PID 2000 wrote to memory of 932 2000 cmd.exe 31 PID 2000 wrote to memory of 1756 2000 cmd.exe 30 PID 2000 wrote to memory of 1756 2000 cmd.exe 30 PID 2000 wrote to memory of 1756 2000 cmd.exe 30 PID 2000 wrote to memory of 1712 2000 cmd.exe 32 PID 2000 wrote to memory of 1712 2000 cmd.exe 32 PID 2000 wrote to memory of 1712 2000 cmd.exe 32 PID 2000 wrote to memory of 1880 2000 cmd.exe 33 PID 2000 wrote to memory of 1880 2000 cmd.exe 33 PID 2000 wrote to memory of 1880 2000 cmd.exe 33 PID 2000 wrote to memory of 588 2000 cmd.exe 34 PID 2000 wrote to memory of 588 2000 cmd.exe 34 PID 2000 wrote to memory of 588 2000 cmd.exe 34 PID 2000 wrote to memory of 524 2000 cmd.exe 35 PID 2000 wrote to memory of 524 2000 cmd.exe 35 PID 2000 wrote to memory of 524 2000 cmd.exe 35 PID 2000 wrote to memory of 1952 2000 cmd.exe 36 PID 2000 wrote to memory of 1952 2000 cmd.exe 36 PID 2000 wrote to memory of 1952 2000 cmd.exe 36 PID 2000 wrote to memory of 548 2000 cmd.exe 37 PID 2000 wrote to memory of 548 2000 cmd.exe 37 PID 2000 wrote to memory of 548 2000 cmd.exe 37 PID 2000 wrote to memory of 1764 2000 cmd.exe 38 PID 2000 wrote to memory of 1764 2000 cmd.exe 38 PID 2000 wrote to memory of 1764 2000 cmd.exe 38 PID 2000 wrote to memory of 1740 2000 cmd.exe 39 PID 2000 wrote to memory of 1740 2000 cmd.exe 39 PID 2000 wrote to memory of 1740 2000 cmd.exe 39 PID 2000 wrote to memory of 1780 2000 cmd.exe 40 PID 2000 wrote to memory of 1780 2000 cmd.exe 40 PID 2000 wrote to memory of 1780 2000 cmd.exe 40 PID 2000 wrote to memory of 1708 2000 cmd.exe 41 PID 2000 wrote to memory of 1708 2000 cmd.exe 41 PID 2000 wrote to memory of 1708 2000 cmd.exe 41 PID 2000 wrote to memory of 332 2000 cmd.exe 42 PID 2000 wrote to memory of 332 2000 cmd.exe 42 PID 2000 wrote to memory of 332 2000 cmd.exe 42 PID 2000 wrote to memory of 472 2000 cmd.exe 43 PID 2000 wrote to memory of 472 2000 cmd.exe 43 PID 2000 wrote to memory of 472 2000 cmd.exe 43 PID 2000 wrote to memory of 1732 2000 cmd.exe 44 PID 2000 wrote to memory of 1732 2000 cmd.exe 44 PID 2000 wrote to memory of 1732 2000 cmd.exe 44 PID 2000 wrote to memory of 1744 2000 cmd.exe 45 PID 2000 wrote to memory of 1744 2000 cmd.exe 45 PID 2000 wrote to memory of 1744 2000 cmd.exe 45 PID 2000 wrote to memory of 580 2000 cmd.exe 46 PID 2000 wrote to memory of 580 2000 cmd.exe 46 PID 2000 wrote to memory of 580 2000 cmd.exe 46 PID 2000 wrote to memory of 1776 2000 cmd.exe 47 PID 2000 wrote to memory of 1776 2000 cmd.exe 47 PID 2000 wrote to memory of 1776 2000 cmd.exe 47 PID 2000 wrote to memory of 1132 2000 cmd.exe 48 PID 2000 wrote to memory of 1132 2000 cmd.exe 48 PID 2000 wrote to memory of 1132 2000 cmd.exe 48 PID 2000 wrote to memory of 1164 2000 cmd.exe 49
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\msvxc.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\system32\net.exenet use \\\ipc$ "" /user:Administrator2⤵PID:1944
-
-
C:\Windows\system32\net.exenet use \\\ipc$ "" /user:administrator2⤵PID:1912
-
-
C:\Windows\system32\net.exenet use \\\ipc$ "" /user:Admin2⤵PID:1756
-
-
C:\Windows\system32\net.exenet use \\\ipc$ "" /user:admin2⤵PID:932
-
-
C:\Windows\system32\net.exenet use \\\ipc$ "" /user:guest2⤵PID:1712
-
-
C:\Windows\system32\net.exenet use \\\ipc$ "" /user:Guest2⤵PID:1880
-
-
C:\Windows\system32\net.exenet use \\\ipc$ "" /user:temp2⤵PID:588
-
-
C:\Windows\system32\net.exenet use \\\ipc$ "" /user:Temp2⤵PID:524
-
-
C:\Windows\system32\net.exenet use \\\ipc$ "" /user:root2⤵PID:1952
-
-
C:\Windows\system32\net.exenet use \\\ipc$ "" /user:ROOT2⤵PID:548
-
-
C:\Windows\system32\net.exenet use \\\ipc$ "12345" /user:Administrator2⤵PID:1764
-
-
C:\Windows\system32\net.exenet use \\\ipc$ "zzzzz" /user:Administrator2⤵PID:1740
-
-
C:\Windows\system32\net.exenet use \\\ipc$ "xxxxx" /user:Administrator2⤵PID:1780
-
-
C:\Windows\system32\net.exenet use \\\ipc$ "Admin" /user:Administrator2⤵PID:1708
-
-
C:\Windows\system32\net.exenet use \\\ipc$ "guest" /user:guest2⤵PID:332
-
-
C:\Windows\system32\net.exenet use \\\ipc$ "2002" /user:Administrator2⤵PID:472
-
-
C:\Windows\system32\net.exenet use \\\ipc$ "abc123" /user:Administrator2⤵PID:1732
-
-
C:\Windows\system32\net.exenet use \\\ipc$ "temp" /user:Administrator2⤵PID:1744
-
-
C:\Windows\system32\net.exenet use \\\ipc$ "Administrator" /user:Administrator2⤵PID:580
-
-
C:\Windows\system32\net.exenet use \\\ipc$ "login" /user:Administrator2⤵PID:1776
-
-
C:\Windows\system32\net.exenet use \\\ipc$ "root" /user:root2⤵PID:1132
-
-
C:\Windows\system32\net.exenet use \\\ipc$ "temp" /user:Temp2⤵PID:1164
-
-
C:\Windows\system32\net.exenet use \\\ipc$ "root" /user:Administrator2⤵PID:1352
-
-
C:\Windows\system32\net.exenet use \\\ipc$ "adm" /user:Administrator2⤵PID:564
-
-
C:\Windows\system32\net.exenet use \\\ipc$ "2003" /user:Administrator2⤵PID:1032
-
-
C:\Windows\system32\net.exenet use \\\ipc$ "default" /user:Administrator2⤵PID:544
-
-
C:\Windows\system32\net.exenet use \\\ipc$ "student" /user:student2⤵PID:1640
-
-
C:\Windows\system32\net.exenet use \\\ipc$ "admin" /user:Admin2⤵PID:1168
-
-
C:\Windows\system32\net.exenet use \\\ipc$ "admin" /user:admin2⤵PID:1684
-
-
C:\Users\Admin\AppData\Local\Temp\psexec.exepsexec \\ attrib.exe -r STDE9.exe2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1204
-
-
C:\Users\Admin\AppData\Local\Temp\psexec.exepsexec \\ -f -c -d STDE9.exe -o2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1196
-
-
C:\Users\Admin\AppData\Local\Temp\psexec.exepsexec \\ -d STDE9.exe -o2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:272
-