Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
6Static
static
1SDIOTransl...ol.exe
windows7-x64
1SDIOTransl...ol.exe
windows10-2004-x64
1SDIO_R753.exe
windows7-x64
3SDIO_R753.exe
windows10-2004-x64
4SDIO_auto.bat
windows7-x64
1SDIO_auto.bat
windows10-2004-x64
4SDIO_x64_R753.exe
windows7-x64
1SDIO_x64_R753.exe
windows10-2004-x64
4del_old_dr...ks.bat
windows7-x64
5del_old_dr...ks.bat
windows10-2004-x64
5docs/SDIO ...al.pdf
windows7-x64
1docs/SDIO ...al.pdf
windows10-2004-x64
1scripts/au...te.bat
windows7-x64
1scripts/au...te.bat
windows10-2004-x64
1scripts/pr...ed.bat
windows7-x64
1scripts/pr...ed.bat
windows10-2004-x64
1scripts/remote.bat
windows7-x64
6scripts/remote.bat
windows10-2004-x64
6scripts/sc...ks.bat
windows7-x64
1scripts/sc...ks.bat
windows10-2004-x64
1Analysis
-
max time kernel
1613s -
max time network
1579s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
29/05/2023, 21:43
Static task
static1
Behavioral task
behavioral1
Sample
SDIOTranslationTool.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
SDIOTranslationTool.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
SDIO_R753.exe
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
SDIO_R753.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
SDIO_auto.bat
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
SDIO_auto.bat
Resource
win10v2004-20230221-en
Behavioral task
behavioral7
Sample
SDIO_x64_R753.exe
Resource
win7-20230220-en
Behavioral task
behavioral8
Sample
SDIO_x64_R753.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral9
Sample
del_old_driverpacks.bat
Resource
win7-20230220-en
Behavioral task
behavioral10
Sample
del_old_driverpacks.bat
Resource
win10v2004-20230220-en
Behavioral task
behavioral11
Sample
docs/SDIO Reference Manual.pdf
Resource
win7-20230220-en
Behavioral task
behavioral12
Sample
docs/SDIO Reference Manual.pdf
Resource
win10v2004-20230220-en
Behavioral task
behavioral13
Sample
scripts/autoupdate.bat
Resource
win7-20230220-en
Behavioral task
behavioral14
Sample
scripts/autoupdate.bat
Resource
win10v2004-20230221-en
Behavioral task
behavioral15
Sample
scripts/prep_unpacked.bat
Resource
win7-20230220-en
Behavioral task
behavioral16
Sample
scripts/prep_unpacked.bat
Resource
win10v2004-20230220-en
Behavioral task
behavioral17
Sample
scripts/remote.bat
Resource
win7-20230220-en
Behavioral task
behavioral18
Sample
scripts/remote.bat
Resource
win10v2004-20230220-en
Behavioral task
behavioral19
Sample
scripts/scan_driver_packs.bat
Resource
win7-20230220-en
Behavioral task
behavioral20
Sample
scripts/scan_driver_packs.bat
Resource
win10v2004-20230220-en
General
-
Target
scripts/remote.bat
-
Size
213B
-
MD5
cdc25c410a2b6eb4e7e8c90294c2146e
-
SHA1
4628f12e486556bf90c592208c2c7b83af7ecfd2
-
SHA256
c6de4403113e0586cba59fdfc2cb20c68f2c690636692d03c9a4cce09ca61287
-
SHA512
b3cfa2c442e46bccca0e77a53971937cf29dcdd995168575e847f8e75a7fae4fb20fe3dd39effa74fe7bcd21b6774be2ee1d6be84287e9ae781f2fd0ce17bce7
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 3 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\u: net.exe File opened (read-only) \??\u: net.exe File opened (read-only) \??\u: cmd.exe -
Runs net.exe
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2648 wrote to memory of 2112 2648 cmd.exe 84 PID 2648 wrote to memory of 2112 2648 cmd.exe 84 PID 2648 wrote to memory of 4556 2648 cmd.exe 85 PID 2648 wrote to memory of 4556 2648 cmd.exe 85
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\scripts\remote.bat"1⤵
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\system32\net.exenet use u: "\\server\sdio"2⤵
- Enumerates connected drives
PID:2112
-
-
C:\Windows\system32\net.exenet use u: /delete2⤵
- Enumerates connected drives
PID:4556
-