Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    151s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/01/2024, 04:38

General

  • Target

    Network Optimizer.bat

  • Size

    713B

  • MD5

    b63146f5589597d2e4b77d5b833013d7

  • SHA1

    4860468d6048cd86274899e6f48cb2bd07f4ae15

  • SHA256

    f436ac7c6a86ca3f3b7fc2c19ae36bcbf482d5c902b48b9464b7ae37ebd1b446

  • SHA512

    321b690c9939e286e548bd21847e91e3c68fd96c7053fe4d99c835f134cd22312d38f00b26624adce3dbb5ec77debfe24a7a37259d0ed6f3a89cdb45b4f7acf2

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 2 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Checks SCSI registry key(s) 3 TTPs 58 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 12 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 57 IoCs
  • Suspicious use of SendNotifyMessage 62 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Network Optimizer.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1832
    • C:\Windows\system32\taskkill.exe
      taskkill /f /im explorer.exe
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:2716
    • C:\Windows\system32\msg.exe
      msg * No apagues tu computadora
      2⤵
        PID:1748
      • C:\Windows\system32\msg.exe
        msg * Si no tus archivos seran encriptados
        2⤵
          PID:3540
        • C:\Windows\system32\msg.exe
          msg * y robados :)
          2⤵
            PID:4172
          • C:\Windows\system32\msg.exe
            msg * Acordate que nada sale gratis!
            2⤵
              PID:3484
            • C:\Windows\system32\msg.exe
              msg * gg
              2⤵
                PID:676
              • C:\Windows\system32\msg.exe
                msg * gg
                2⤵
                  PID:3644
                • C:\Windows\system32\msg.exe
                  msg * No apagues tu computadora
                  2⤵
                    PID:468
                  • C:\Windows\system32\msg.exe
                    msg * Si no tus archivos seran encriptados
                    2⤵
                      PID:4576
                    • C:\Windows\system32\msg.exe
                      msg * y robados :)
                      2⤵
                        PID:400
                      • C:\Windows\system32\msg.exe
                        msg * Acordate que nada sale gratis!
                        2⤵
                          PID:3536
                        • C:\Windows\system32\msg.exe
                          msg * gg
                          2⤵
                            PID:1552
                          • C:\Windows\system32\msg.exe
                            msg * gg
                            2⤵
                              PID:3444
                            • C:\Windows\system32\msg.exe
                              msg * No apagues tu computadora
                              2⤵
                                PID:1840
                              • C:\Windows\system32\msg.exe
                                msg * Si no tus archivos seran encriptados
                                2⤵
                                  PID:3852
                                • C:\Windows\system32\msg.exe
                                  msg * y robados :)
                                  2⤵
                                    PID:1604
                                  • C:\Windows\system32\msg.exe
                                    msg * Acordate que nada sale gratis!
                                    2⤵
                                      PID:208
                                    • C:\Windows\system32\msg.exe
                                      msg * gg
                                      2⤵
                                        PID:2276
                                      • C:\Windows\system32\msg.exe
                                        msg * gg
                                        2⤵
                                          PID:1416
                                        • C:\Windows\explorer.exe
                                          explorer.exe
                                          2⤵
                                          • Modifies Installed Components in the registry
                                          • Enumerates connected drives
                                          • Checks SCSI registry key(s)
                                          • Modifies registry class
                                          • Suspicious behavior: GetForegroundWindowSpam
                                          • Suspicious use of AdjustPrivilegeToken
                                          • Suspicious use of FindShellTrayWindow
                                          • Suspicious use of SendNotifyMessage
                                          • Suspicious use of SetWindowsHookEx
                                          PID:2804
                                      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                        1⤵
                                        • Modifies registry class
                                        • Suspicious use of SetWindowsHookEx
                                        PID:3872
                                      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                        1⤵
                                        • Modifies Internet Explorer settings
                                        • Modifies registry class
                                        • Suspicious use of SetWindowsHookEx
                                        PID:2072
                                      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                        1⤵
                                        • Modifies Internet Explorer settings
                                        • Modifies registry class
                                        • Suspicious use of SetWindowsHookEx
                                        PID:548
                                      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                        1⤵
                                        • Modifies Internet Explorer settings
                                        • Modifies registry class
                                        • Suspicious use of SetWindowsHookEx
                                        PID:3888
                                      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                        1⤵
                                        • Modifies Internet Explorer settings
                                        • Modifies registry class
                                        • Suspicious use of SetWindowsHookEx
                                        PID:4008
                                      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                        1⤵
                                        • Modifies Internet Explorer settings
                                        • Modifies registry class
                                        • Suspicious use of SetWindowsHookEx
                                        PID:3432
                                      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                        1⤵
                                        • Modifies Internet Explorer settings
                                        • Modifies registry class
                                        • Suspicious use of SetWindowsHookEx
                                        PID:3816

                                      Network

                                      MITRE ATT&CK Enterprise v15

                                      Replay Monitor

                                      Loading Replay Monitor...

                                      Downloads

                                      • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133505447828894969.txt

                                        Filesize

                                        74KB

                                        MD5

                                        c09e63e4b960a163934b3c29f3bd2cc9

                                        SHA1

                                        d3a43b35c14ae2e353a1a15c518ab2595f6a0399

                                        SHA256

                                        308deca5e1ef4d875fbe0aff3ce4b0b575b28e643dffda819d4390ec77faf157

                                        SHA512

                                        5ca3321034dff47e3afe0b0bdfaffc08782991660910a29375a8e0363794b78247282aba65dbd882ae225aa140ae63927dfd0946a441ee6fa64a1d8c146777b9

                                      • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\0A55C1OB\microsoft.windows[1].xml

                                        Filesize

                                        97B

                                        MD5

                                        291a3f3ebf21195c8af7c2f120ca4dfc

                                        SHA1

                                        1cade2dac000db3bca92e2daee371beffd2c0bee

                                        SHA256

                                        fbe32bda6ca669397ca6d02b329f235aee87a8f36b09a589548e969c19cb78de

                                        SHA512

                                        ed2dea282f97d25171e0e95fe718103e04e37f13a1edf79373af204ac344cdb9a0fca34d82e45d3475a9845ee92644a99a1c2733f8858fe384e3b6958331f287

                                      • memory/548-48-0x0000022E1DE20000-0x0000022E1DE40000-memory.dmp

                                        Filesize

                                        128KB

                                      • memory/548-52-0x0000022E1DDE0000-0x0000022E1DE00000-memory.dmp

                                        Filesize

                                        128KB

                                      • memory/548-55-0x0000022E1E1F0000-0x0000022E1E210000-memory.dmp

                                        Filesize

                                        128KB

                                      • memory/2072-11-0x0000020A06AE0000-0x0000020A06B00000-memory.dmp

                                        Filesize

                                        128KB

                                      • memory/2072-13-0x0000020A06AA0000-0x0000020A06AC0000-memory.dmp

                                        Filesize

                                        128KB

                                      • memory/2072-15-0x0000020A070C0000-0x0000020A070E0000-memory.dmp

                                        Filesize

                                        128KB

                                      • memory/2804-5-0x0000000004820000-0x0000000004821000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/3432-112-0x0000027F7E8D0000-0x0000027F7E8F0000-memory.dmp

                                        Filesize

                                        128KB

                                      • memory/3432-115-0x0000027F7E890000-0x0000027F7E8B0000-memory.dmp

                                        Filesize

                                        128KB

                                      • memory/3432-118-0x0000027F7ED30000-0x0000027F7ED50000-memory.dmp

                                        Filesize

                                        128KB

                                      • memory/3816-133-0x000002A91BF70000-0x000002A91BF90000-memory.dmp

                                        Filesize

                                        128KB

                                      • memory/3816-135-0x000002A91BF30000-0x000002A91BF50000-memory.dmp

                                        Filesize

                                        128KB

                                      • memory/3816-137-0x000002A91C340000-0x000002A91C360000-memory.dmp

                                        Filesize

                                        128KB

                                      • memory/3888-72-0x000001F5A8040000-0x000001F5A8060000-memory.dmp

                                        Filesize

                                        128KB

                                      • memory/3888-75-0x000001F5A86E0000-0x000001F5A8700000-memory.dmp

                                        Filesize

                                        128KB

                                      • memory/3888-70-0x000001F5A8080000-0x000001F5A80A0000-memory.dmp

                                        Filesize

                                        128KB

                                      • memory/4008-91-0x0000019005510000-0x0000019005530000-memory.dmp

                                        Filesize

                                        128KB

                                      • memory/4008-93-0x00000190054D0000-0x00000190054F0000-memory.dmp

                                        Filesize

                                        128KB

                                      • memory/4008-96-0x0000019005960000-0x0000019005980000-memory.dmp

                                        Filesize

                                        128KB