Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
6Static
static
1SDIOTransl...ol.exe
windows7-x64
1SDIOTransl...ol.exe
windows10-2004-x64
1SDIO_R753.exe
windows7-x64
3SDIO_R753.exe
windows10-2004-x64
4SDIO_auto.bat
windows7-x64
1SDIO_auto.bat
windows10-2004-x64
4SDIO_x64_R753.exe
windows7-x64
1SDIO_x64_R753.exe
windows10-2004-x64
4del_old_dr...ks.bat
windows7-x64
5del_old_dr...ks.bat
windows10-2004-x64
5docs/SDIO ...al.pdf
windows7-x64
1docs/SDIO ...al.pdf
windows10-2004-x64
1scripts/au...te.bat
windows7-x64
1scripts/au...te.bat
windows10-2004-x64
1scripts/pr...ed.bat
windows7-x64
1scripts/pr...ed.bat
windows10-2004-x64
1scripts/remote.bat
windows7-x64
6scripts/remote.bat
windows10-2004-x64
6scripts/sc...ks.bat
windows7-x64
1scripts/sc...ks.bat
windows10-2004-x64
1Analysis
-
max time kernel
1800s -
max time network
1589s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
29/05/2023, 21:43
Static task
static1
Behavioral task
behavioral1
Sample
SDIOTranslationTool.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
SDIOTranslationTool.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
SDIO_R753.exe
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
SDIO_R753.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
SDIO_auto.bat
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
SDIO_auto.bat
Resource
win10v2004-20230221-en
Behavioral task
behavioral7
Sample
SDIO_x64_R753.exe
Resource
win7-20230220-en
Behavioral task
behavioral8
Sample
SDIO_x64_R753.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral9
Sample
del_old_driverpacks.bat
Resource
win7-20230220-en
Behavioral task
behavioral10
Sample
del_old_driverpacks.bat
Resource
win10v2004-20230220-en
Behavioral task
behavioral11
Sample
docs/SDIO Reference Manual.pdf
Resource
win7-20230220-en
Behavioral task
behavioral12
Sample
docs/SDIO Reference Manual.pdf
Resource
win10v2004-20230220-en
Behavioral task
behavioral13
Sample
scripts/autoupdate.bat
Resource
win7-20230220-en
Behavioral task
behavioral14
Sample
scripts/autoupdate.bat
Resource
win10v2004-20230221-en
Behavioral task
behavioral15
Sample
scripts/prep_unpacked.bat
Resource
win7-20230220-en
Behavioral task
behavioral16
Sample
scripts/prep_unpacked.bat
Resource
win10v2004-20230220-en
Behavioral task
behavioral17
Sample
scripts/remote.bat
Resource
win7-20230220-en
Behavioral task
behavioral18
Sample
scripts/remote.bat
Resource
win10v2004-20230220-en
Behavioral task
behavioral19
Sample
scripts/scan_driver_packs.bat
Resource
win7-20230220-en
Behavioral task
behavioral20
Sample
scripts/scan_driver_packs.bat
Resource
win10v2004-20230220-en
General
-
Target
del_old_driverpacks.bat
-
Size
1KB
-
MD5
059a48f88d38595b3d4fe63d78b509f0
-
SHA1
5acf13baa930f384227f5d59371491787ebf97c7
-
SHA256
6d74ad1de33394216a6fd1ffb58e87d90a399bdafa8d2ac223e2377ec5947859
-
SHA512
397eca1cf2f830316cd39296b5b9015938f777b8e26f00c8ee0ff95639dcbf097e55586c35dbeb5b559d7e17ff90203d396f13a1524bc24b153186005f9f4b5b
Malware Config
Signatures
-
Drops autorun.inf file 1 TTPs 1 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\autorun.inf attrib.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 5092 wrote to memory of 5060 5092 cmd.exe 82 PID 5092 wrote to memory of 5060 5092 cmd.exe 82 PID 5092 wrote to memory of 4948 5092 cmd.exe 83 PID 5092 wrote to memory of 4948 5092 cmd.exe 83 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 5060 attrib.exe
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\del_old_driverpacks.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Windows\system32\attrib.exeattrib *.* -R2⤵
- Drops autorun.inf file
- Views/modifies file attributes
PID:5060
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c dir /b *.7z2⤵PID:4948
-