Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    73s
  • max time network
    32s
  • platform
    windows7_x64
  • resource
    win7-20230621-en
  • resource tags

    arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system
  • submitted
    05/07/2023, 02:59

General

  • Target

    FreeMinecraft.bat

  • Size

    1KB

  • MD5

    3e167c5a56f002c7c31b5dd4a03cb1b5

  • SHA1

    09ad7bedbf488e80594601a2d6f4321cf99c23dd

  • SHA256

    470a4da4e2f91d06647da87b98657a5afd36768c2583b2f44745dd32ce14355c

  • SHA512

    56d8159536e3e0ad35054af4fc55a247b35ac63bc359ec7b2f75d001bca8bdf6ec2d56447f0f62967684c28d2c26a2f7a95a2fce3575546d72d97276ab49cce5

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 11 IoCs
  • Suspicious use of WriteProcessMemory 53 IoCs
  • Views/modifies file attributes 1 TTPs 4 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\FreeMinecraft.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:680
    • C:\Windows\system32\reg.exe
      reg delete HKCR/.exe
      2⤵
        PID:920
      • C:\Windows\system32\reg.exe
        reg delete HKCR/.dll
        2⤵
          PID:792
        • C:\Windows\system32\reg.exe
          reg delete HKCR/*
          2⤵
            PID:808
          • C:\Windows\system32\attrib.exe
            attrib -r -s -h c:autoexec.bat
            2⤵
            • Views/modifies file attributes
            PID:1472
          • C:\Windows\system32\attrib.exe
            attrib -r -s -h c:boot.ini
            2⤵
            • Views/modifies file attributes
            PID:780
          • C:\Windows\system32\attrib.exe
            attrib -r -s -h c:ntldr
            2⤵
            • Views/modifies file attributes
            PID:268
          • C:\Windows\system32\attrib.exe
            attrib -r -s -h c:windowswin.ini
            2⤵
            • Views/modifies file attributes
            PID:1712
          • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
            "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"
            2⤵
            • Drops file in Windows directory
            • Modifies Internet Explorer settings
            • Modifies registry class
            • Suspicious behavior: AddClipboardFormatListener
            • Suspicious behavior: CmdExeWriteProcessMemorySpam
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:864
            • C:\Windows\splwow64.exe
              C:\Windows\splwow64.exe 12288
              3⤵
                PID:1656
            • C:\Windows\system32\mspaint.exe
              mspaint
              2⤵
              • Drops file in Windows directory
              • Suspicious use of SetWindowsHookEx
              PID:1380
            • C:\Windows\system32\notepad.exe
              notepad
              2⤵
                PID:1308
              • C:\Windows\system32\write.exe
                write
                2⤵
                • Suspicious use of WriteProcessMemory
                PID:1372
                • C:\Program Files\Windows NT\Accessories\wordpad.exe
                  "C:\Program Files\Windows NT\Accessories\wordpad.exe"
                  3⤵
                  • Suspicious use of SetWindowsHookEx
                  PID:936
              • C:\Windows\system32\cmd.exe
                cmd
                2⤵
                  PID:1528
                • C:\Windows\explorer.exe
                  explorer
                  2⤵
                    PID:888
                  • C:\Windows\system32\control.exe
                    control
                    2⤵
                      PID:1620
                    • C:\Windows\system32\calc.exe
                      calc
                      2⤵
                        PID:676
                    • C:\Windows\SysWOW64\DllHost.exe
                      C:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}
                      1⤵
                        PID:364

                      Network

                      MITRE ATT&CK Enterprise v6

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Windows\system32\spool\DRIVERS\x64\3\mxdwdui.BUD

                        Filesize

                        56KB

                        MD5

                        bd72dcf1083b6e22ccbfa0e8e27fb1e0

                        SHA1

                        3fd23d4f14da768da7b8364d74c54932d704e74e

                        SHA256

                        90f44f69950a796ab46ff09181585ac9dabf21271f16ebb9ea385c957e5955c1

                        SHA512

                        72360ab4078ad5e0152324f9a856b3396e2d0247f7f95ac8a5a53a25126ac3cff567cc523849e28d92a99730ee8ffb30366f09c428258f93a5cca6d0c5905562

                      • memory/864-77-0x000000005FFF0000-0x0000000060000000-memory.dmp

                        Filesize

                        64KB

                      • memory/936-75-0x0000000001EE0000-0x0000000001EE1000-memory.dmp

                        Filesize

                        4KB

                      • memory/1380-74-0x000007FEFB0A0000-0x000007FEFB0EC000-memory.dmp

                        Filesize

                        304KB

                      • memory/1380-76-0x0000000001DF0000-0x0000000001DF1000-memory.dmp

                        Filesize

                        4KB

                      • memory/1380-85-0x0000000001DF0000-0x0000000001DF1000-memory.dmp

                        Filesize

                        4KB