Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    26/12/2023, 03:51

General

  • Target

    AutoSettings/Enable_Biometrics.bat

  • Size

    4KB

  • MD5

    926b8c39eec5f0cc73f31b3c18619b71

  • SHA1

    de8380ca4fd7b3e5dfc3f6bdfab93f69d12964bd

  • SHA256

    95cbc250371fd9689c08fa08c2ce9ba17c2798adb22778a8caaf4f716d10a785

  • SHA512

    a6983d57287e9a33b0919b98718565640aaa061903dd9fbaa71a55a228832d891a34ad2328855d081805df867e9a6b49ff7e1bc2111fc3b8c040a1b292f3ba1b

  • SSDEEP

    96:fgexK+/VNhXhHsG2Wk0kdKarsUBiTkit5JHiR6PbebTV:IkVNfXhHsG2Wk0mKarsUApJCRUwV

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 15 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 5 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Suspicious behavior: CmdExeWriteProcessMemorySpam 11 IoCs
  • Suspicious use of WriteProcessMemory 53 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\AutoSettings\Enable_Biometrics.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1940
    • C:\Windows\system32\chcp.com
      chcp 65001
      2⤵
        PID:2612
      • C:\Windows\system32\reg.exe
        reg query "HKU\S-1-5-19\Environment"
        2⤵
          PID:2272
        • C:\Users\Admin\AppData\Local\Temp\AUTOSE~1\Files\Tools\cecho.exe
          "C:\Users\Admin\AppData\Local\Temp\AUTOSE~1\Files\Tools\cecho.exe" {0b}Добавление настройки Групповой Политики в файл LGPO:{\n #}
          2⤵
          • Suspicious behavior: CmdExeWriteProcessMemorySpam
          PID:2820
        • C:\Users\Admin\AppData\Local\Temp\AUTOSE~1\Files\Tools\cecho.exe
          "C:\Users\Admin\AppData\Local\Temp\AUTOSE~1\Files\Tools\cecho.exe" {0f}"Разрешить использование биометрии" {0b}Настроить ГП!{\n #}
          2⤵
          • Suspicious behavior: CmdExeWriteProcessMemorySpam
          PID:2876
        • C:\Users\Admin\AppData\Local\Temp\AUTOSE~1\Files\Tools\cecho.exe
          "C:\Users\Admin\AppData\Local\Temp\AUTOSE~1\Files\Tools\cecho.exe" {0a}Добавлен параметр в LGPO файл {08}(для настройки ГП){#}:{\n #}
          2⤵
          • Suspicious behavior: CmdExeWriteProcessMemorySpam
          PID:2124
        • C:\Users\Admin\AppData\Local\Temp\AUTOSE~1\Files\Tools\cecho.exe
          "C:\Users\Admin\AppData\Local\Temp\AUTOSE~1\Files\Tools\cecho.exe" {0b}Добавление настройки Групповой Политики в файл LGPO:{\n #}
          2⤵
          • Suspicious behavior: CmdExeWriteProcessMemorySpam
          PID:3052
        • C:\Users\Admin\AppData\Local\Temp\AUTOSE~1\Files\Tools\cecho.exe
          "C:\Users\Admin\AppData\Local\Temp\AUTOSE~1\Files\Tools\cecho.exe" {0f}"Включить Windows Hellow для бизнеса" {0b}Настроить ГП!{\n #}
          2⤵
          • Suspicious behavior: CmdExeWriteProcessMemorySpam
          PID:2660
        • C:\Users\Admin\AppData\Local\Temp\AUTOSE~1\Files\Tools\cecho.exe
          "C:\Users\Admin\AppData\Local\Temp\AUTOSE~1\Files\Tools\cecho.exe" {0a}Добавлен параметр в LGPO файл {08}(для настройки ГП){#}:{\n #}
          2⤵
          • Suspicious behavior: CmdExeWriteProcessMemorySpam
          PID:2768
        • C:\Users\Admin\AppData\Local\Temp\AUTOSE~1\Files\Tools\cecho.exe
          "C:\Users\Admin\AppData\Local\Temp\AUTOSE~1\Files\Tools\cecho.exe" {0f}Биометрическая служба Windows "WbioSrvc"{\n #}
          2⤵
          • Suspicious behavior: CmdExeWriteProcessMemorySpam
          PID:2788
        • C:\Windows\system32\sc.exe
          sc config WbioSrvc start= auto
          2⤵
          • Launches sc.exe
          PID:2756
        • C:\Users\Admin\AppData\Local\Temp\AUTOSE~1\Files\Tools\cecho.exe
          "C:\Users\Admin\AppData\Local\Temp\AUTOSE~1\Files\Tools\cecho.exe" {0b}Применение параметров из LGPO файла {08}(настройка ГП) {\n #}
          2⤵
          • Suspicious behavior: CmdExeWriteProcessMemorySpam
          PID:2640
        • C:\Users\Admin\AppData\Local\Temp\AUTOSE~1\Files\Tools\LGPO.exe
          "C:\Users\Admin\AppData\Local\Temp\AUTOSE~1\Files\Tools\LGPO.exe" /t "C:\Users\Admin\AppData\Local\Temp\LGPO-file.txt" /q
          2⤵
          • Drops file in System32 directory
          • Suspicious behavior: CmdExeWriteProcessMemorySpam
          PID:2656
        • C:\Users\Admin\AppData\Local\Temp\AUTOSE~1\Files\Tools\cecho.exe
          "C:\Users\Admin\AppData\Local\Temp\AUTOSE~1\Files\Tools\cecho.exe" {0a}Исправление выполнено {\n #}
          2⤵
          • Suspicious behavior: CmdExeWriteProcessMemorySpam
          PID:2648
        • C:\Users\Admin\AppData\Local\Temp\AUTOSE~1\Files\Tools\cecho.exe
          "C:\Users\Admin\AppData\Local\Temp\AUTOSE~1\Files\Tools\cecho.exe" {0a}Перезагрузите компьютер!!! {\n #}
          2⤵
          • Suspicious behavior: CmdExeWriteProcessMemorySpam
          PID:2564

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\LGPO-file.txt

        Filesize

        143B

        MD5

        c7baae5131c75b53c18e82978ba2aa03

        SHA1

        31a97fd7321d6c016fd45320c2b91d6fcf929e0c

        SHA256

        d6391e4cec7f6be75b897a115a529c3dc4a0991fea2bf38ac44723d9261a9946

        SHA512

        0e44d745889411348e1353915e6bf9ae9be088537f1493f7713f17c94bacf4e15094c6855692ec13a37f04096a28b2830a6dcaa25b5ac6ff289641046bc0b507

      • memory/2124-4-0x0000000000400000-0x0000000000416000-memory.dmp

        Filesize

        88KB

      • memory/2564-27-0x0000000000400000-0x0000000000416000-memory.dmp

        Filesize

        88KB

      • memory/2564-26-0x0000000000400000-0x0000000000416000-memory.dmp

        Filesize

        88KB

      • memory/2640-13-0x0000000000400000-0x0000000000416000-memory.dmp

        Filesize

        88KB

      • memory/2648-25-0x0000000000400000-0x0000000000416000-memory.dmp

        Filesize

        88KB

      • memory/2660-7-0x0000000000400000-0x0000000000416000-memory.dmp

        Filesize

        88KB

      • memory/2768-10-0x0000000000400000-0x0000000000416000-memory.dmp

        Filesize

        88KB

      • memory/2768-9-0x0000000000400000-0x0000000000416000-memory.dmp

        Filesize

        88KB

      • memory/2788-11-0x0000000000400000-0x0000000000416000-memory.dmp

        Filesize

        88KB

      • memory/2788-12-0x0000000000400000-0x0000000000416000-memory.dmp

        Filesize

        88KB

      • memory/2820-0-0x0000000000400000-0x0000000000416000-memory.dmp

        Filesize

        88KB

      • memory/2820-1-0x0000000000400000-0x0000000000416000-memory.dmp

        Filesize

        88KB

      • memory/2876-2-0x0000000000400000-0x0000000000416000-memory.dmp

        Filesize

        88KB

      • memory/3052-6-0x0000000000400000-0x0000000000416000-memory.dmp

        Filesize

        88KB

      • memory/3052-5-0x0000000000400000-0x0000000000416000-memory.dmp

        Filesize

        88KB