Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
1Static
static
1Malware-ma...et.bat
windows7-x64
1Malware-ma...et.bat
windows10-2004-x64
1Malware-ma...ME.ps1
windows7-x64
1Malware-ma...ME.ps1
windows10-2004-x64
1Malware-ma...ns.bat
windows7-x64
1Malware-ma...ns.bat
windows10-2004-x64
1Malware-ma...pc.bat
windows7-x64
Malware-ma...pc.bat
windows10-2004-x64
Malware-ma...wn.bat
windows7-x64
1Malware-ma...wn.bat
windows10-2004-x64
1Analysis
-
max time kernel
92s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
27/03/2024, 22:41
Static task
static1
Behavioral task
behavioral1
Sample
Malware-master/Disablenet.bat
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Malware-master/Disablenet.bat
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
Malware-master/README.ps1
Resource
win7-20240319-en
Behavioral task
behavioral4
Sample
Malware-master/README.ps1
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
Malware-master/Shutdowns.bat
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
Malware-master/Shutdowns.bat
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
Malware-master/crashespc.bat
Resource
win7-20240220-en
Behavioral task
behavioral8
Sample
Malware-master/crashespc.bat
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
Malware-master/system_meltdown.bat
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
Malware-master/system_meltdown.bat
Resource
win10v2004-20240226-en
General
-
Target
Malware-master/Disablenet.bat
-
Size
420B
-
MD5
824a7bdbc0f32e6be84498f484e9346b
-
SHA1
0f59f00ec29e1d5d7e9b77cc40ce2afb241bd1ef
-
SHA256
12bf9300c346dc1d384594ce8cd9299fde0fd05ce8f20eda5ca202cbc66381ee
-
SHA512
d93deee70274b3b07ba3969bd5fd9748fb1a69c480c8283b1add17517aca46edd4193484564b946caf5fb5a6c03ea84f28b057af1fc7d3e825a54e69dd2b7cc8
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3844 wrote to memory of 4032 3844 cmd.exe 85 PID 3844 wrote to memory of 4032 3844 cmd.exe 85 PID 3844 wrote to memory of 1936 3844 cmd.exe 86 PID 3844 wrote to memory of 1936 3844 cmd.exe 86
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Malware-master\Disablenet.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:3844 -
C:\Windows\system32\reg.exereg add hkey_local_machinesoftwaremicrosoftwindowscurrentv ersionrun /v WINDOWsAPI /t reg_sz /d c:windowswimn32.bat /f2⤵PID:4032
-
-
C:\Windows\system32\reg.exereg add hkey_current_usersoftwaremicrosoftwindowscurrentve rsionrun /v CONTROLexit /t reg_sz /d c:windowswimn32.bat /f2⤵PID:1936
-