Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
43s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
10/10/2023, 03:42
Static task
static1
Behavioral task
behavioral1
Sample
MAS_AIO.cmd
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
MAS_AIO.cmd
Resource
win10v2004-20230915-en
General
-
Target
MAS_AIO.cmd
-
Size
425KB
-
MD5
d3caa81fb77f8b2e90a81c47a43565c4
-
SHA1
9e47d9b039d325e66a22b874e4eb2d265669c4f3
-
SHA256
5697fdf7c6a11b7a3d48d492976f820a0f9c1a2d49ada258c411924a4e3c816b
-
SHA512
1bf881e71c5ae83b764a292fbafd12d6f7fb57547f7c064f434d81f36c5391b9ca97192d9988c27af5ac36870c9f69a5a66dfce0d95c01dee7e9b77af496022b
-
SSDEEP
3072:HR34RE57N9H7PIu0R/iNiYCCh3MPfiavbbJuAMTVFp6zGDNSCE2K6rOuW7EOGJGo:xjXEu0R6SChAbJu9p6zGDNS0K8OuD3
Malware Config
Signatures
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1944 sc.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 2776 reg.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 1264 wrote to memory of 1944 1264 cmd.exe 29 PID 1264 wrote to memory of 1944 1264 cmd.exe 29 PID 1264 wrote to memory of 1944 1264 cmd.exe 29 PID 1264 wrote to memory of 2136 1264 cmd.exe 30 PID 1264 wrote to memory of 2136 1264 cmd.exe 30 PID 1264 wrote to memory of 2136 1264 cmd.exe 30 PID 1264 wrote to memory of 2596 1264 cmd.exe 31 PID 1264 wrote to memory of 2596 1264 cmd.exe 31 PID 1264 wrote to memory of 2596 1264 cmd.exe 31 PID 1264 wrote to memory of 2128 1264 cmd.exe 32 PID 1264 wrote to memory of 2128 1264 cmd.exe 32 PID 1264 wrote to memory of 2128 1264 cmd.exe 32 PID 1264 wrote to memory of 1156 1264 cmd.exe 33 PID 1264 wrote to memory of 1156 1264 cmd.exe 33 PID 1264 wrote to memory of 1156 1264 cmd.exe 33 PID 1264 wrote to memory of 2332 1264 cmd.exe 34 PID 1264 wrote to memory of 2332 1264 cmd.exe 34 PID 1264 wrote to memory of 2332 1264 cmd.exe 34 PID 1264 wrote to memory of 2612 1264 cmd.exe 35 PID 1264 wrote to memory of 2612 1264 cmd.exe 35 PID 1264 wrote to memory of 2612 1264 cmd.exe 35 PID 1264 wrote to memory of 2652 1264 cmd.exe 36 PID 1264 wrote to memory of 2652 1264 cmd.exe 36 PID 1264 wrote to memory of 2652 1264 cmd.exe 36 PID 1264 wrote to memory of 2776 1264 cmd.exe 37 PID 1264 wrote to memory of 2776 1264 cmd.exe 37 PID 1264 wrote to memory of 2776 1264 cmd.exe 37 PID 1264 wrote to memory of 2704 1264 cmd.exe 38 PID 1264 wrote to memory of 2704 1264 cmd.exe 38 PID 1264 wrote to memory of 2704 1264 cmd.exe 38 PID 1264 wrote to memory of 2780 1264 cmd.exe 39 PID 1264 wrote to memory of 2780 1264 cmd.exe 39 PID 1264 wrote to memory of 2780 1264 cmd.exe 39 PID 2780 wrote to memory of 2632 2780 cmd.exe 40 PID 2780 wrote to memory of 2632 2780 cmd.exe 40 PID 2780 wrote to memory of 2632 2780 cmd.exe 40 PID 1264 wrote to memory of 2988 1264 cmd.exe 41 PID 1264 wrote to memory of 2988 1264 cmd.exe 41 PID 1264 wrote to memory of 2988 1264 cmd.exe 41 PID 1264 wrote to memory of 2132 1264 cmd.exe 42 PID 1264 wrote to memory of 2132 1264 cmd.exe 42 PID 1264 wrote to memory of 2132 1264 cmd.exe 42 PID 1264 wrote to memory of 2772 1264 cmd.exe 43 PID 1264 wrote to memory of 2772 1264 cmd.exe 43 PID 1264 wrote to memory of 2772 1264 cmd.exe 43 PID 1264 wrote to memory of 2792 1264 cmd.exe 44 PID 1264 wrote to memory of 2792 1264 cmd.exe 44 PID 1264 wrote to memory of 2792 1264 cmd.exe 44
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\MAS_AIO.cmd"1⤵
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Windows\System32\sc.exesc query Null2⤵
- Launches sc.exe
PID:1944
-
-
C:\Windows\System32\find.exefind /i "RUNNING"2⤵PID:2136
-
-
C:\Windows\System32\findstr.exefindstr /v "$" "MAS_AIO.cmd"2⤵PID:2596
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ver2⤵PID:2128
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "prompt $H&for %B in (1) do rem"2⤵PID:1156
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo "C:\Users\Admin\AppData\Local\Temp\MAS_AIO.cmd" "2⤵PID:2332
-
-
C:\Windows\System32\find.exefind /i "C:\Users\Admin\AppData\Local\Temp"2⤵PID:2612
-
-
C:\Windows\System32\fltMC.exefltmc2⤵PID:2652
-
-
C:\Windows\System32\reg.exereg query HKCU\Console /v QuickEdit2⤵
- Modifies registry key
PID:2776
-
-
C:\Windows\System32\find.exefind /i "0x0"2⤵PID:2704
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /v Desktop2⤵
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\System32\reg.exereg query "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /v Desktop3⤵PID:2632
-
-
-
C:\Windows\System32\mode.commode 76, 302⤵PID:2988
-
-
C:\Windows\System32\findstr.exefindstr /a:07 /f:`.txt "."2⤵PID:2132
-
-
C:\Windows\System32\findstr.exefindstr /a:0A /f:`.txt "."2⤵PID:2772
-
-
C:\Windows\System32\choice.exechoice /C:123456780 /N2⤵PID:2792
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
17B
MD5c48de30a6d93de10929a00f17d725a24
SHA1002e95b585f523b9f1dab14bdad2729032b1a81a
SHA25696ba30bf853b79cd26e5399db76def0f6be3c936fc1263232937fbc8a0c8c5b5
SHA5128657c3448c231484a7354b5bbf1cbc0377d0f49841baa67fdb8e6d162274470fa6128160209e9ee2d286172f0156aca0ab9a6440f4d5d69cab56612b4bc53b12
-
Filesize
64B
MD577d46f20e0040efbb88b3546e07ca3bc
SHA1e96b144bd7bc5b26cb9adf58399353223d10f404
SHA2564be35005732a8f6ca965235189ed6934bf6a4e3ba7c4e44f4291ed41752ec34c
SHA5126fcd8a48a149b453459e35337c277ebb87a09bdcb899bdfeadf588ff3729b4f09edbb94213f99fda012f5f96a65cd21ac43de997b0391d6bf93795efe2e9acde