Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

09/11/2024, 22:49 UTC

241109-2r2veatfrl 10

09/11/2024, 22:47 UTC

241109-2qkjqssrdz 10

09/11/2024, 22:46 UTC

241109-2p2fvstfqj 10

09/11/2024, 22:44 UTC

241109-2nsgkasrbt 10

07/11/2024, 16:00 UTC

241107-tfl1taxpgl 10

10/02/2024, 17:17 UTC

240210-vtnl8sge36 10

Analysis

  • max time kernel
    3s
  • max time network
    107s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    10/02/2024, 17:17 UTC

General

  • Target

    ggpermV3/macchanger.bat

  • Size

    2KB

  • MD5

    c0b8d81370dd4defc9317dc6c204d581

  • SHA1

    fa2b6a292c398d2a2febbdddcf39a62ffbb6fb23

  • SHA256

    4d8d40a7e435fc815d088d7309a6bece3a9d798b4fb8170ca3d9c4c7c8c6784f

  • SHA512

    271552179a651414d8b321017a8675a1cd09ac83394cc014453d28f1837b60db657b1d75362af71d075b1f4e33ac5eedf6556a43709589a6159c4d0ef2d00828

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\ggpermV3\macchanger.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2208
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c wmic nic where physicaladapter=true get deviceid | findstr [0-9]
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2488
      • C:\Windows\System32\Wbem\WMIC.exe
        wmic nic where physicaladapter=true get deviceid
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2216
      • C:\Windows\system32\findstr.exe
        findstr [0-9]
        3⤵
          PID:2100
      • C:\Windows\system32\reg.exe
        REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002bE10318}\07
        2⤵
          PID:2788
        • C:\Windows\system32\reg.exe
          REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002bE10318}\007
          2⤵
            PID:2820
          • C:\Windows\system32\reg.exe
            REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002bE10318}\0007
            2⤵
              PID:2852
            • C:\Windows\system32\reg.exe
              REG ADD HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002bE10318}\0007 /v NetworkAddress /t REG_SZ /d 3A8F84882413 /f
              2⤵
                PID:2780
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /c wmic nic where physicaladapter=true get deviceid | findstr [0-9]
                2⤵
                • Suspicious use of WriteProcessMemory
                PID:2736
                • C:\Windows\System32\Wbem\WMIC.exe
                  wmic nic where physicaladapter=true get deviceid
                  3⤵
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2712
                • C:\Windows\system32\findstr.exe
                  findstr [0-9]
                  3⤵
                    PID:2344
                • C:\Windows\system32\reg.exe
                  REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002bE10318}\07
                  2⤵
                    PID:2772
                  • C:\Windows\system32\reg.exe
                    REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002bE10318}\007
                    2⤵
                      PID:2896
                    • C:\Windows\system32\reg.exe
                      REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002bE10318}\0007
                      2⤵
                        PID:2604
                      • C:\Windows\system32\reg.exe
                        REG ADD HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002bE10318}\0007 /v PnPCapabilities /t REG_DWORD /d 24 /f
                        2⤵
                          PID:1492
                        • C:\Windows\system32\cmd.exe
                          C:\Windows\system32\cmd.exe /c "wmic nic where (netconnectionid like '%') get netconnectionid,netconnectionstatus /format:csv"
                          2⤵
                          • Suspicious use of WriteProcessMemory
                          PID:2716
                          • C:\Windows\System32\Wbem\WMIC.exe
                            wmic nic where (netconnectionid like '%') get netconnectionid,netconnectionstatus /format:csv
                            3⤵
                              PID:2844
                          • C:\Windows\system32\netsh.exe
                            netsh interface set interface name="Local Area Connection" disable
                            2⤵
                              PID:2580
                          • C:\Windows\system32\cmd.exe
                            cmd /c "C:\Users\Admin\AppData\Local\Temp\ggpermV3\macchanger.bat"
                            1⤵
                            • Suspicious use of WriteProcessMemory
                            PID:2208
                            • C:\Windows\system32\cmd.exe
                              C:\Windows\system32\cmd.exe /c wmic nic where physicaladapter=true get deviceid | findstr [0-9]
                              2⤵
                              • Suspicious use of WriteProcessMemory
                              PID:2488
                              • C:\Windows\System32\Wbem\WMIC.exe
                                wmic nic where physicaladapter=true get deviceid
                                3⤵
                                  PID:2216
                                • C:\Windows\system32\findstr.exe
                                  findstr [0-9]
                                  3⤵
                                    PID:2100
                                • C:\Windows\system32\reg.exe
                                  REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002bE10318}\07
                                  2⤵
                                    PID:2788
                                  • C:\Windows\system32\reg.exe
                                    REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002bE10318}\007
                                    2⤵
                                      PID:2820
                                    • C:\Windows\system32\reg.exe
                                      REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002bE10318}\0007
                                      2⤵
                                        PID:2852
                                      • C:\Windows\system32\reg.exe
                                        REG ADD HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002bE10318}\0007 /v NetworkAddress /t REG_SZ /d 3A8F84882413 /f
                                        2⤵
                                          PID:2780
                                        • C:\Windows\system32\cmd.exe
                                          C:\Windows\system32\cmd.exe /c wmic nic where physicaladapter=true get deviceid | findstr [0-9]
                                          2⤵
                                            PID:2736
                                            • C:\Windows\System32\Wbem\WMIC.exe
                                              wmic nic where physicaladapter=true get deviceid
                                              3⤵
                                                PID:2712
                                              • C:\Windows\system32\findstr.exe
                                                findstr [0-9]
                                                3⤵
                                                  PID:2344
                                              • C:\Windows\system32\reg.exe
                                                REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002bE10318}\07
                                                2⤵
                                                  PID:2772
                                                • C:\Windows\system32\reg.exe
                                                  REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002bE10318}\007
                                                  2⤵
                                                    PID:2896
                                                  • C:\Windows\system32\reg.exe
                                                    REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002bE10318}\0007
                                                    2⤵
                                                      PID:2604
                                                    • C:\Windows\system32\reg.exe
                                                      REG ADD HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002bE10318}\0007 /v PnPCapabilities /t REG_DWORD /d 24 /f
                                                      2⤵
                                                        PID:1492
                                                      • C:\Windows\system32\cmd.exe
                                                        C:\Windows\system32\cmd.exe /c "wmic nic where (netconnectionid like '%') get netconnectionid,netconnectionstatus /format:csv"
                                                        2⤵
                                                          PID:2716
                                                          • C:\Windows\System32\Wbem\WMIC.exe
                                                            wmic nic where (netconnectionid like '%') get netconnectionid,netconnectionstatus /format:csv
                                                            3⤵
                                                              PID:2844
                                                          • C:\Windows\system32\netsh.exe
                                                            netsh interface set interface name="Local Area Connection" disable
                                                            2⤵
                                                              PID:2580

                                                          Network

                                                          MITRE ATT&CK Matrix

                                                          Replay Monitor

                                                          Loading Replay Monitor...

                                                          Downloads

                                                          We care about your privacy.

                                                          This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.