Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    72s
  • max time network
    84s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/01/2024, 08:41

Errors

Reason
Machine shutdown

General

  • Target

    spoofer.bat

  • Size

    26KB

  • MD5

    71f3e121ed4c4edd93ed7e2eef18c60f

  • SHA1

    c2c10acae7ffe7c0d5ded9fe7603b0804dd743db

  • SHA256

    4b3c02fa1516c71b44708adee293fc0dff5a33fb989c1df8d26603ba3fcf0445

  • SHA512

    b2cf5ed127a15851264e75791d8f44c2fad28a03fa85c628fda08634f6c05f165e145f3615f509e3f84a59c173a2fffdfd6790d57484fa5f73f3fad27a9e3d8c

  • SSDEEP

    768:fBd3qX+ac4zOhpYBUtrwrhtAUIsTpt75qn:/4O

Score
8/10

Malware Config

Signatures

  • Sets file to hidden 1 TTPs 2 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Modifies data under HKEY_USERS 15 IoCs
  • Modifies registry class 3 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs
  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\spoofer.bat"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3948
    • C:\Windows\system32\cmd.exe
      cmd.exe
      2⤵
        PID:3892
      • C:\Windows\system32\cmd.exe
        cmd.exe
        2⤵
          PID:3620
        • C:\Windows\system32\cmd.exe
          cmd.exe
          2⤵
            PID:1196
          • C:\Windows\system32\calc.exe
            calc
            2⤵
            • Modifies registry class
            PID:1852
          • C:\Windows\system32\reg.exe
            reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v Greatgame /t REG_SZ
            2⤵
            • Adds Run key to start application
            • Modifies registry key
            PID:1020
          • C:\Windows\system32\attrib.exe
            Attrib +r +h Greatgame.bat
            2⤵
            • Sets file to hidden
            • Views/modifies file attributes
            PID:2716
          • C:\Windows\system32\attrib.exe
            Attrib +r +h
            2⤵
            • Sets file to hidden
            • Views/modifies file attributes
            PID:1576
          • C:\Windows\system32\rundll32.exe
            RUNDLL32 USER32.DLL.SwapMouseButton
            2⤵
              PID:2152
            • C:\Windows\system32\calc.exe
              calc
              2⤵
              • Modifies registry class
              PID:2496
            • C:\Windows\system32\tskill.exe
              tskill msnmsgr
              2⤵
              • Suspicious behavior: EnumeratesProcesses
              PID:3036
            • C:\Windows\system32\tskill.exe
              tskill LimeWire
              2⤵
              • Suspicious behavior: EnumeratesProcesses
              PID:4388
            • C:\Windows\system32\tskill.exe
              tskill iexplore
              2⤵
              • Suspicious behavior: EnumeratesProcesses
              PID:2128
            • C:\Windows\system32\tskill.exe
              tskill NMain
              2⤵
              • Suspicious behavior: EnumeratesProcesses
              PID:5100
            • C:\Windows\system32\cmd.exe
              cmd.exe
              2⤵
                PID:4092
              • C:\Windows\system32\calc.exe
                calc
                2⤵
                • Modifies registry class
                PID:3404
              • C:\Windows\system32\cmd.exe
                cmd.exe
                2⤵
                  PID:2196
                • C:\Windows\system32\msg.exe
                  msg * R.I.P
                  2⤵
                    PID:2508
                  • C:\Windows\system32\msg.exe
                    msg * R.I.P
                    2⤵
                      PID:5072
                    • C:\Windows\system32\shutdown.exe
                      shutdown -r -t 10 -c "VIRUS DETECTED"
                      2⤵
                      • Suspicious use of AdjustPrivilegeToken
                      PID:5024
                    • C:\Windows\system32\cmd.exe
                      cmd.exe
                      2⤵
                        PID:2520
                      • C:\Windows\system32\cmd.exe
                        cmd.exe
                        2⤵
                          PID:4384
                      • C:\Windows\system32\OpenWith.exe
                        C:\Windows\system32\OpenWith.exe -Embedding
                        1⤵
                        • Suspicious use of SetWindowsHookEx
                        PID:3268
                      • C:\Windows\system32\OpenWith.exe
                        C:\Windows\system32\OpenWith.exe -Embedding
                        1⤵
                        • Suspicious use of SetWindowsHookEx
                        PID:1404
                      • C:\Windows\system32\OpenWith.exe
                        C:\Windows\system32\OpenWith.exe -Embedding
                        1⤵
                        • Suspicious use of SetWindowsHookEx
                        PID:4036
                      • C:\Windows\system32\LogonUI.exe
                        "LogonUI.exe" /flags:0x4 /state0:0xa396f855 /state1:0x41c64e6d
                        1⤵
                        • Modifies data under HKEY_USERS
                        • Suspicious use of SetWindowsHookEx
                        PID:492

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads