Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    1s
  • max time network
    103s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    20/05/2024, 14:11

General

  • Target

    Beasty Cracked/BNY DUMPED/8fzqf7r.bat

  • Size

    3KB

  • MD5

    d143b3fa2c8e0eac4d70fd15ab222e3e

  • SHA1

    583370e6aa565e9b9d53dbc263c1717659ea3edd

  • SHA256

    2f89c39f1d38445d975658abcf79ecfee6a1c2976b76cf09633e4e27d95a5658

  • SHA512

    571e721c457ed8c697968f8a04344ec7adeafe0b38d9026c5925c801f5099fbb3504b85e4e22c65971ffe836ee03ceb3ef0ae8ca15ff78e5757792f924263f53

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\Beasty Cracked\BNY DUMPED\8fzqf7r.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1392
    • C:\Windows\system32\certutil.exe
      CERTUTIL -f -decode "C:\Users\Admin\AppData\Local\Temp\Beasty Cracked\BNY DUMPED\8fzqf7r.bat" "C:\Users\Admin\AppData\Local\Temp\24433.cmd"
      2⤵
        PID:1224
      • C:\Windows\system32\getmac.exe
        getmac
        2⤵
          PID:2192
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c wmic nic where physicaladapter=true get deviceid | findstr [0-9]
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:2636
          • C:\Windows\System32\Wbem\WMIC.exe
            wmic nic where physicaladapter=true get deviceid
            3⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:2644
          • C:\Windows\system32\findstr.exe
            findstr [0-9]
            3⤵
              PID:2700
          • C:\Windows\system32\reg.exe
            REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002bE10318}\07
            2⤵
              PID:2712
            • C:\Windows\system32\reg.exe
              REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002bE10318}\007
              2⤵
                PID:2728
              • C:\Windows\system32\reg.exe
                REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002bE10318}\0007
                2⤵
                  PID:2428
                • C:\Windows\system32\reg.exe
                  REG ADD HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002bE10318}\0007 /v NetworkAddress /t REG_SZ /d CE80F7433E94 /f
                  2⤵
                    PID:2228
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\system32\cmd.exe /c wmic nic where physicaladapter=true get deviceid | findstr [0-9]
                    2⤵
                    • Suspicious use of WriteProcessMemory
                    PID:2876
                    • C:\Windows\System32\Wbem\WMIC.exe
                      wmic nic where physicaladapter=true get deviceid
                      3⤵
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2580
                    • C:\Windows\system32\findstr.exe
                      findstr [0-9]
                      3⤵
                        PID:2736
                    • C:\Windows\system32\reg.exe
                      REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002bE10318}\07
                      2⤵
                        PID:1192
                      • C:\Windows\system32\reg.exe
                        REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002bE10318}\007
                        2⤵
                          PID:2584
                        • C:\Windows\system32\reg.exe
                          REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002bE10318}\0007
                          2⤵
                            PID:2592
                          • C:\Windows\system32\reg.exe
                            REG ADD HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002bE10318}\0007 /v PnPCapabilities /t REG_DWORD /d 24 /f
                            2⤵
                              PID:2704
                            • C:\Windows\system32\cmd.exe
                              C:\Windows\system32\cmd.exe /c "wmic nic where (netconnectionid like '%') get netconnectionid,netconnectionstatus /format:csv"
                              2⤵
                              • Suspicious use of WriteProcessMemory
                              PID:2468
                              • C:\Windows\System32\Wbem\WMIC.exe
                                wmic nic where (netconnectionid like '%') get netconnectionid,netconnectionstatus /format:csv
                                3⤵
                                  PID:2476
                              • C:\Windows\system32\netsh.exe
                                netsh interface set interface name="Local Area Connection" disable
                                2⤵
                                  PID:2452

                              Network

                              MITRE ATT&CK Matrix

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Users\Admin\AppData\Local\Temp\24433.cmd

                                Filesize

                                2KB

                                MD5

                                875a54f511baf4bc25c5cc2e4d56c1a0

                                SHA1

                                57bb04b6bb812f5bdff40a5bc324a17771145918

                                SHA256

                                d80a0db16a6a3ba969ead9957c04e3ca6cdb05dbdea48d0cb49269c8e24867e1

                                SHA512

                                8600c555a7c995076d7d71903b3fb6494e9c8f5c1cb49aaabec92200a4e8e2fb4f30fb8aa85e214e7a4b9a7c04453e821097ee873d0383d6b1a40719b59f470c