Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
300s -
max time network
255s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
13/11/2023, 18:31
Behavioral task
behavioral1
Sample
1.bat
Resource
win10v2004-20231020-en
Behavioral task
behavioral2
Sample
2.bat
Resource
win10v2004-20231023-en
Behavioral task
behavioral3
Sample
3.bat
Resource
win10v2004-20231023-en
Behavioral task
behavioral4
Sample
exe/ntregopt.exe
Resource
win10v2004-20231020-en
Behavioral task
behavioral5
Sample
exe/reshacker.exe
Resource
win10v2004-20231025-en
Behavioral task
behavioral6
Sample
exe/upx.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral7
Sample
reg.bat
Resource
win10v2004-20231020-en
General
-
Target
2.bat
-
Size
7KB
-
MD5
6309aac4ef0c0b950132b1dbc1c12cef
-
SHA1
f10ec525b9dbb1acf24b11e4abee8eea9dd89e87
-
SHA256
2b333eab32ac752d39a66b3363c720e95648ac717710cb25b22cc8f773dd5c89
-
SHA512
87ad787ea880eb65ab5770d7bda7d0db9a30aa9f1eb40735f5079337c3aae16bea2d0f5a0f8ece4addfd4c91aa1bc04ae028a8168e22fe7a140729a5e3139815
-
SSDEEP
96:3haETwB97sWfad9dmqP3pW59fQAMtuua0OKO7MyvBb2WtBOtKetivObnQiJ:3wBiWyd9RY5Wts0OKO4yvRtAwetCO3
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4272 wrote to memory of 1244 4272 cmd.exe 85 PID 4272 wrote to memory of 1244 4272 cmd.exe 85 PID 1244 wrote to memory of 4512 1244 cmd.exe 86 PID 1244 wrote to memory of 4512 1244 cmd.exe 86 PID 4512 wrote to memory of 3836 4512 cmd.exe 87 PID 4512 wrote to memory of 3836 4512 cmd.exe 87 PID 3836 wrote to memory of 4500 3836 cmd.exe 88 PID 3836 wrote to memory of 4500 3836 cmd.exe 88 PID 4500 wrote to memory of 1144 4500 cmd.exe 89 PID 4500 wrote to memory of 1144 4500 cmd.exe 89 PID 1144 wrote to memory of 5048 1144 cmd.exe 90 PID 1144 wrote to memory of 5048 1144 cmd.exe 90 PID 5048 wrote to memory of 964 5048 cmd.exe 91 PID 5048 wrote to memory of 964 5048 cmd.exe 91 PID 964 wrote to memory of 1620 964 cmd.exe 92 PID 964 wrote to memory of 1620 964 cmd.exe 92 PID 1620 wrote to memory of 1760 1620 cmd.exe 93 PID 1620 wrote to memory of 1760 1620 cmd.exe 93 PID 1760 wrote to memory of 3016 1760 cmd.exe 94 PID 1760 wrote to memory of 3016 1760 cmd.exe 94 PID 3016 wrote to memory of 1228 3016 cmd.exe 95 PID 3016 wrote to memory of 1228 3016 cmd.exe 95 PID 1228 wrote to memory of 3412 1228 cmd.exe 96 PID 1228 wrote to memory of 3412 1228 cmd.exe 96 PID 3412 wrote to memory of 2272 3412 cmd.exe 97 PID 3412 wrote to memory of 2272 3412 cmd.exe 97 PID 2272 wrote to memory of 572 2272 cmd.exe 98 PID 2272 wrote to memory of 572 2272 cmd.exe 98 PID 572 wrote to memory of 4604 572 cmd.exe 99 PID 572 wrote to memory of 4604 572 cmd.exe 99 PID 4604 wrote to memory of 2932 4604 cmd.exe 100 PID 4604 wrote to memory of 2932 4604 cmd.exe 100 PID 2932 wrote to memory of 4972 2932 cmd.exe 101 PID 2932 wrote to memory of 4972 2932 cmd.exe 101 PID 4972 wrote to memory of 2652 4972 cmd.exe 102 PID 4972 wrote to memory of 2652 4972 cmd.exe 102 PID 2652 wrote to memory of 400 2652 cmd.exe 103 PID 2652 wrote to memory of 400 2652 cmd.exe 103 PID 400 wrote to memory of 4528 400 cmd.exe 104 PID 400 wrote to memory of 4528 400 cmd.exe 104 PID 4528 wrote to memory of 444 4528 cmd.exe 105 PID 4528 wrote to memory of 444 4528 cmd.exe 105 PID 444 wrote to memory of 2780 444 cmd.exe 106 PID 444 wrote to memory of 2780 444 cmd.exe 106 PID 2780 wrote to memory of 1416 2780 cmd.exe 107 PID 2780 wrote to memory of 1416 2780 cmd.exe 107 PID 1416 wrote to memory of 576 1416 cmd.exe 108 PID 1416 wrote to memory of 576 1416 cmd.exe 108 PID 576 wrote to memory of 2016 576 cmd.exe 109 PID 576 wrote to memory of 2016 576 cmd.exe 109 PID 2016 wrote to memory of 4484 2016 cmd.exe 110 PID 2016 wrote to memory of 4484 2016 cmd.exe 110 PID 4484 wrote to memory of 4736 4484 cmd.exe 111 PID 4484 wrote to memory of 4736 4484 cmd.exe 111 PID 4736 wrote to memory of 4808 4736 cmd.exe 112 PID 4736 wrote to memory of 4808 4736 cmd.exe 112 PID 4808 wrote to memory of 1676 4808 cmd.exe 113 PID 4808 wrote to memory of 1676 4808 cmd.exe 113 PID 1676 wrote to memory of 3212 1676 cmd.exe 114 PID 1676 wrote to memory of 3212 1676 cmd.exe 114 PID 3212 wrote to memory of 1252 3212 cmd.exe 115 PID 3212 wrote to memory of 1252 3212 cmd.exe 115 PID 1252 wrote to memory of 3676 1252 cmd.exe 116 PID 1252 wrote to memory of 3676 1252 cmd.exe 116
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:4272 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR2⤵
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR3⤵
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR4⤵
- Suspicious use of WriteProcessMemory
PID:3836 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR5⤵
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR6⤵
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR7⤵
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR8⤵
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR9⤵
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR10⤵
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR11⤵
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR12⤵
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR13⤵
- Suspicious use of WriteProcessMemory
PID:3412 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR14⤵
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR15⤵
- Suspicious use of WriteProcessMemory
PID:572 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR16⤵
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR17⤵
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR18⤵
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR19⤵
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR20⤵
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR21⤵
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR22⤵
- Suspicious use of WriteProcessMemory
PID:444 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR23⤵
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR24⤵
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR25⤵
- Suspicious use of WriteProcessMemory
PID:576 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR26⤵
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR27⤵
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR28⤵
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR29⤵
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR30⤵
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR31⤵
- Suspicious use of WriteProcessMemory
PID:3212 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR32⤵
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR33⤵PID:3676
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR34⤵PID:4200
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR35⤵PID:4948
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR36⤵PID:4088
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR37⤵PID:3796
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR38⤵PID:2696
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR39⤵PID:1908
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR40⤵PID:3612
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR41⤵PID:3200
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR42⤵PID:3908
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR43⤵PID:4916
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR44⤵PID:1792
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR45⤵PID:1796
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR46⤵PID:4072
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR47⤵PID:1860
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR48⤵PID:752
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR49⤵PID:2996
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR50⤵PID:3012
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR51⤵PID:4164
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR52⤵PID:1264
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR53⤵PID:4664
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR54⤵PID:1272
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR55⤵PID:2480
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR56⤵PID:3364
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR57⤵PID:3456
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR58⤵PID:1512
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR59⤵PID:4008
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR60⤵PID:3588
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR61⤵PID:4864
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR62⤵PID:2420
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR63⤵PID:1872
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR64⤵PID:3144
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR65⤵PID:64
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR66⤵PID:556
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR67⤵PID:2192
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR68⤵PID:532
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR69⤵PID:3344
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR70⤵PID:3244
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR71⤵PID:4304
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR72⤵PID:5008
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR73⤵PID:4284
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR74⤵PID:1300
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR75⤵PID:3132
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR76⤵PID:1060
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR77⤵PID:1436
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR78⤵PID:2396
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR79⤵PID:3756
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR80⤵PID:3980
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR81⤵PID:5128
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR82⤵PID:5148
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR83⤵PID:5168
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR84⤵PID:5192
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR85⤵PID:5208
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR86⤵PID:5224
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR87⤵PID:5240
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR88⤵PID:5260
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR89⤵PID:5280
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR90⤵PID:5296
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR91⤵PID:5316
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR92⤵PID:5336
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR93⤵PID:5360
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR94⤵PID:5376
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR95⤵PID:5392
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR96⤵PID:5412
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR97⤵PID:5428
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR98⤵PID:5444
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR99⤵PID:5460
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR100⤵PID:5476
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR101⤵PID:5512
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR102⤵PID:5544
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR103⤵PID:5560
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR104⤵PID:5576
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR105⤵PID:5592
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR106⤵PID:5608
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR107⤵PID:5632
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR108⤵PID:5648
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR109⤵PID:5668
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR110⤵PID:5688
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR111⤵PID:5712
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR112⤵PID:5732
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR113⤵PID:5748
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR114⤵PID:5764
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR115⤵PID:5780
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR116⤵PID:5796
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR117⤵PID:5812
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR118⤵PID:5828
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR119⤵PID:5844
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR120⤵PID:5868
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR121⤵PID:5892
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR122⤵PID:5908
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-