Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
10AutoSettin...ck.bat
windows7-x64
7AutoSettin...ck.bat
windows10-2004-x64
7AutoSettin...ck.bat
windows7-x64
7AutoSettin...ck.bat
windows10-2004-x64
7AutoSettin...cs.bat
windows7-x64
7AutoSettin...cs.bat
windows10-2004-x64
7AutoSettin...rs.bat
windows7-x64
7AutoSettin...rs.bat
windows10-2004-x64
7AutoSettin...gs.bat
windows7-x64
1AutoSettin...gs.bat
windows10-2004-x64
1AutoSettin...7z.dll
windows7-x64
3AutoSettin...7z.dll
windows10-2004-x64
3AutoSettin...7z.exe
windows7-x64
1AutoSettin...7z.exe
windows10-2004-x64
1AutoSettin...er.exe
windows7-x64
1AutoSettin...er.exe
windows10-2004-x64
1AutoSettin...le.exe
windows7-x64
7AutoSettin...le.exe
windows10-2004-x64
7AutoSettin...PO.exe
windows7-x64
1AutoSettin...PO.exe
windows10-2004-x64
1AutoSettin...64.exe
windows7-x64
3AutoSettin...64.exe
windows10-2004-x64
3AutoSettin...86.exe
windows7-x64
7AutoSettin...86.exe
windows10-2004-x64
7AutoSettin...64.exe
windows7-x64
1AutoSettin...64.exe
windows10-2004-x64
1AutoSettin...86.exe
windows7-x64
1AutoSettin...86.exe
windows10-2004-x64
1AutoSettin...ks.ps1
windows7-x64
1AutoSettin...ks.ps1
windows10-2004-x64
1AutoSettin...ho.exe
windows7-x64
7AutoSettin...ho.exe
windows10-2004-x64
7Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 03:51
Behavioral task
behavioral1
Sample
AutoSettings/Check.bat
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
AutoSettings/Check.bat
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
AutoSettings/Disable_NumLock.bat
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
AutoSettings/Disable_NumLock.bat
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
AutoSettings/Enable_Biometrics.bat
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
AutoSettings/Enable_Biometrics.bat
Resource
win10v2004-20231222-en
Behavioral task
behavioral7
Sample
AutoSettings/Enable_Sensors.bat
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
AutoSettings/Enable_Sensors.bat
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
AutoSettings/Files/MySettings.bat
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
AutoSettings/Files/MySettings.bat
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
AutoSettings/Files/Tools/7z.dll
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
AutoSettings/Files/Tools/7z.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
AutoSettings/Files/Tools/7z.exe
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
AutoSettings/Files/Tools/7z.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
AutoSettings/Files/Tools/ExitExplorer.exe
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
AutoSettings/Files/Tools/ExitExplorer.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral17
Sample
AutoSettings/Files/Tools/Handle.exe
Resource
win7-20231129-en
Behavioral task
behavioral18
Sample
AutoSettings/Files/Tools/Handle.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral19
Sample
AutoSettings/Files/Tools/LGPO.exe
Resource
win7-20231215-en
Behavioral task
behavioral20
Sample
AutoSettings/Files/Tools/LGPO.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral21
Sample
AutoSettings/Files/Tools/RunFromToken_x64.exe
Resource
win7-20231215-en
Behavioral task
behavioral22
Sample
AutoSettings/Files/Tools/RunFromToken_x64.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral23
Sample
AutoSettings/Files/Tools/RunFromToken_x86.exe
Resource
win7-20231215-en
Behavioral task
behavioral24
Sample
AutoSettings/Files/Tools/RunFromToken_x86.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral25
Sample
AutoSettings/Files/Tools/SetACLx64.exe
Resource
win7-20231215-en
Behavioral task
behavioral26
Sample
AutoSettings/Files/Tools/SetACLx64.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral27
Sample
AutoSettings/Files/Tools/SetACLx86.exe
Resource
win7-20231215-en
Behavioral task
behavioral28
Sample
AutoSettings/Files/Tools/SetACLx86.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral29
Sample
AutoSettings/Files/Tools/ViewMyDisks.ps1
Resource
win7-20231215-en
Behavioral task
behavioral30
Sample
AutoSettings/Files/Tools/ViewMyDisks.ps1
Resource
win10v2004-20231222-en
Behavioral task
behavioral31
Sample
AutoSettings/Files/Tools/cecho.exe
Resource
win7-20231215-en
Behavioral task
behavioral32
Sample
AutoSettings/Files/Tools/cecho.exe
Resource
win10v2004-20231222-en
General
-
Target
AutoSettings/Check.bat
-
Size
111KB
-
MD5
8de1beb7c5e0ff6e71b001dbe92385d2
-
SHA1
a100fe979553a0993d916c76ba5e0e87717af3c1
-
SHA256
798e841f8cc6a5fd3f27670bc31d3f89c62e5e3a2d0515c9719cf503a24b8862
-
SHA512
8fbb45e81f037218a9a3bbe6fe97021fdae232d9e845b77800c17664de5d9e4b8ee5f922c46919c358c77e10e0958ed8b7ff307cc1c5de20a4fa52d65923b3e0
-
SSDEEP
1536:hDE9SdURwRfzXYJEOauvUHyxC69amzkHV:hDE9SdmwRfzXDOauvUHyxCuazHV
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3244-76-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral2/memory/3244-77-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral2/memory/4912-78-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral2/memory/4912-79-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral2/memory/4844-80-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral2/memory/4844-81-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral2/memory/2508-85-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral2/memory/1968-87-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral2/memory/216-86-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral2/memory/2932-84-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral2/memory/4416-83-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral2/memory/756-82-0x0000000000400000-0x0000000000416000-memory.dmp upx -
Suspicious use of AdjustPrivilegeToken 42 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 4188 WMIC.exe Token: SeSecurityPrivilege 4188 WMIC.exe Token: SeTakeOwnershipPrivilege 4188 WMIC.exe Token: SeLoadDriverPrivilege 4188 WMIC.exe Token: SeSystemProfilePrivilege 4188 WMIC.exe Token: SeSystemtimePrivilege 4188 WMIC.exe Token: SeProfSingleProcessPrivilege 4188 WMIC.exe Token: SeIncBasePriorityPrivilege 4188 WMIC.exe Token: SeCreatePagefilePrivilege 4188 WMIC.exe Token: SeBackupPrivilege 4188 WMIC.exe Token: SeRestorePrivilege 4188 WMIC.exe Token: SeShutdownPrivilege 4188 WMIC.exe Token: SeDebugPrivilege 4188 WMIC.exe Token: SeSystemEnvironmentPrivilege 4188 WMIC.exe Token: SeRemoteShutdownPrivilege 4188 WMIC.exe Token: SeUndockPrivilege 4188 WMIC.exe Token: SeManageVolumePrivilege 4188 WMIC.exe Token: 33 4188 WMIC.exe Token: 34 4188 WMIC.exe Token: 35 4188 WMIC.exe Token: 36 4188 WMIC.exe Token: SeIncreaseQuotaPrivilege 4188 WMIC.exe Token: SeSecurityPrivilege 4188 WMIC.exe Token: SeTakeOwnershipPrivilege 4188 WMIC.exe Token: SeLoadDriverPrivilege 4188 WMIC.exe Token: SeSystemProfilePrivilege 4188 WMIC.exe Token: SeSystemtimePrivilege 4188 WMIC.exe Token: SeProfSingleProcessPrivilege 4188 WMIC.exe Token: SeIncBasePriorityPrivilege 4188 WMIC.exe Token: SeCreatePagefilePrivilege 4188 WMIC.exe Token: SeBackupPrivilege 4188 WMIC.exe Token: SeRestorePrivilege 4188 WMIC.exe Token: SeShutdownPrivilege 4188 WMIC.exe Token: SeDebugPrivilege 4188 WMIC.exe Token: SeSystemEnvironmentPrivilege 4188 WMIC.exe Token: SeRemoteShutdownPrivilege 4188 WMIC.exe Token: SeUndockPrivilege 4188 WMIC.exe Token: SeManageVolumePrivilege 4188 WMIC.exe Token: 33 4188 WMIC.exe Token: 34 4188 WMIC.exe Token: 35 4188 WMIC.exe Token: 36 4188 WMIC.exe -
Suspicious use of WriteProcessMemory 45 IoCs
description pid Process procid_target PID 1232 wrote to memory of 4392 1232 cmd.exe 90 PID 1232 wrote to memory of 4392 1232 cmd.exe 90 PID 1232 wrote to memory of 4440 1232 cmd.exe 89 PID 1232 wrote to memory of 4440 1232 cmd.exe 89 PID 1232 wrote to memory of 1380 1232 cmd.exe 94 PID 1232 wrote to memory of 1380 1232 cmd.exe 94 PID 1380 wrote to memory of 3192 1380 cmd.exe 95 PID 1380 wrote to memory of 3192 1380 cmd.exe 95 PID 1232 wrote to memory of 4356 1232 cmd.exe 96 PID 1232 wrote to memory of 4356 1232 cmd.exe 96 PID 1232 wrote to memory of 4652 1232 cmd.exe 97 PID 1232 wrote to memory of 4652 1232 cmd.exe 97 PID 4652 wrote to memory of 1332 4652 cmd.exe 98 PID 4652 wrote to memory of 1332 4652 cmd.exe 98 PID 1232 wrote to memory of 2472 1232 cmd.exe 99 PID 1232 wrote to memory of 2472 1232 cmd.exe 99 PID 2472 wrote to memory of 4188 2472 cmd.exe 100 PID 2472 wrote to memory of 4188 2472 cmd.exe 100 PID 1232 wrote to memory of 3244 1232 cmd.exe 102 PID 1232 wrote to memory of 3244 1232 cmd.exe 102 PID 1232 wrote to memory of 3244 1232 cmd.exe 102 PID 1232 wrote to memory of 4912 1232 cmd.exe 103 PID 1232 wrote to memory of 4912 1232 cmd.exe 103 PID 1232 wrote to memory of 4912 1232 cmd.exe 103 PID 1232 wrote to memory of 4844 1232 cmd.exe 104 PID 1232 wrote to memory of 4844 1232 cmd.exe 104 PID 1232 wrote to memory of 4844 1232 cmd.exe 104 PID 1232 wrote to memory of 756 1232 cmd.exe 110 PID 1232 wrote to memory of 756 1232 cmd.exe 110 PID 1232 wrote to memory of 756 1232 cmd.exe 110 PID 1232 wrote to memory of 4416 1232 cmd.exe 109 PID 1232 wrote to memory of 4416 1232 cmd.exe 109 PID 1232 wrote to memory of 4416 1232 cmd.exe 109 PID 1232 wrote to memory of 2932 1232 cmd.exe 108 PID 1232 wrote to memory of 2932 1232 cmd.exe 108 PID 1232 wrote to memory of 2932 1232 cmd.exe 108 PID 1232 wrote to memory of 2508 1232 cmd.exe 107 PID 1232 wrote to memory of 2508 1232 cmd.exe 107 PID 1232 wrote to memory of 2508 1232 cmd.exe 107 PID 1232 wrote to memory of 216 1232 cmd.exe 106 PID 1232 wrote to memory of 216 1232 cmd.exe 106 PID 1232 wrote to memory of 216 1232 cmd.exe 106 PID 1232 wrote to memory of 1968 1232 cmd.exe 105 PID 1232 wrote to memory of 1968 1232 cmd.exe 105 PID 1232 wrote to memory of 1968 1232 cmd.exe 105
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\AutoSettings\Check.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Windows\system32\reg.exereg query "HKU\S-1-5-19\Environment"2⤵PID:4440
-
-
C:\Windows\system32\chcp.comchcp 650012⤵PID:4392
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c 2>nul reg query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion" /v "UBR"2⤵
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Windows\system32\reg.exereg query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion" /v "UBR"3⤵PID:3192
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ver2⤵PID:4356
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c 2>nul reg query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion" /v "ProductName"2⤵
- Suspicious use of WriteProcessMemory
PID:4652 -
C:\Windows\system32\reg.exereg query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion" /v "ProductName"3⤵PID:1332
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic os get MUILanguages /Value 2>nul2⤵
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Windows\System32\Wbem\WMIC.exewmic os get MUILanguages /Value3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4188
-
-
-
C:\Users\Admin\AppData\Local\Temp\AutoSettings\Files\Tools\cecho.exe"C:\Users\Admin\AppData\Local\Temp\AutoSettings\Files\Tools\cecho.exe" {08} ╔═════════════════════════════════════════════════════════════════════╗ {\n #}2⤵PID:3244
-
-
C:\Users\Admin\AppData\Local\Temp\AutoSettings\Files\Tools\cecho.exe"C:\Users\Admin\AppData\Local\Temp\AutoSettings\Files\Tools\cecho.exe" {08} ║ {07}Проверка {08}редакции {0f}Windows 10 Enterprise {0a}LTSB RS1 10.0.14393 {08}║ {\n #}2⤵PID:4912
-
-
C:\Users\Admin\AppData\Local\Temp\AutoSettings\Files\Tools\cecho.exe"C:\Users\Admin\AppData\Local\Temp\AutoSettings\Files\Tools\cecho.exe" {08} ╚═════════════════════════════════════════════════════════════════════╝ {\n #}2⤵PID:4844
-
-
C:\Users\Admin\AppData\Local\Temp\AutoSettings\Files\Tools\cecho.exe"C:\Users\Admin\AppData\Local\Temp\AutoSettings\Files\Tools\cecho.exe" {08} | Версия 3.16{\n #}2⤵PID:1968
-
-
C:\Users\Admin\AppData\Local\Temp\AutoSettings\Files\Tools\cecho.exe"C:\Users\Admin\AppData\Local\Temp\AutoSettings\Files\Tools\cecho.exe" {0b} [Без ввода]{#} = {0e}Выйти {\n #}2⤵PID:216
-
-
C:\Users\Admin\AppData\Local\Temp\AutoSettings\Files\Tools\cecho.exe"C:\Users\Admin\AppData\Local\Temp\AutoSettings\Files\Tools\cecho.exe" {0b} [3] = {0e}Сделать все{#} (Проверить значения слежения, AppStore и настроек) {\n #}2⤵PID:2508
-
-
C:\Users\Admin\AppData\Local\Temp\AutoSettings\Files\Tools\cecho.exe"C:\Users\Admin\AppData\Local\Temp\AutoSettings\Files\Tools\cecho.exe" {0b} [2] = {0e}Settings{#} (Только проверка значений дополнительных настроек Windows) {\n #}2⤵PID:2932
-
-
C:\Users\Admin\AppData\Local\Temp\AutoSettings\Files\Tools\cecho.exe"C:\Users\Admin\AppData\Local\Temp\AutoSettings\Files\Tools\cecho.exe" {0b} [1] = {0e}Spy{#} (Только проверка значений по слежению, сбору и AppStore) {\n #}2⤵PID:4416
-
-
C:\Users\Admin\AppData\Local\Temp\AutoSettings\Files\Tools\cecho.exe"C:\Users\Admin\AppData\Local\Temp\AutoSettings\Files\Tools\cecho.exe" Ваша Windows:{0a} x64 {#}|{0a} en-US, de-DE, es-ES, fr-FR {#}| {0e}10.0.19041.1288 {4f} Версия не поддерживается {#} {00}.{\n #}2⤵PID:756
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD56f478bb851479b47c68cc595e44e682f
SHA1889ff300f374c23578ec876388fe89ad554c20c6
SHA25630518495160eb5418a6bdb1981579728abce0ace48c9dbfd9777784611d00a87
SHA512d6878cf9c358cd2fe203fabea580f88ce94f12e075ca435ea1f2f1151a6678318d26f81002c29d82f31908efa33f242fde296386bdd66594988491f670918b33