Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    1s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/05/2024, 14:11

General

  • Target

    Beasty Cracked/BNY DUMPED/8fzqf7r.bat

  • Size

    3KB

  • MD5

    d143b3fa2c8e0eac4d70fd15ab222e3e

  • SHA1

    583370e6aa565e9b9d53dbc263c1717659ea3edd

  • SHA256

    2f89c39f1d38445d975658abcf79ecfee6a1c2976b76cf09633e4e27d95a5658

  • SHA512

    571e721c457ed8c697968f8a04344ec7adeafe0b38d9026c5925c801f5099fbb3504b85e4e22c65971ffe836ee03ceb3ef0ae8ca15ff78e5757792f924263f53

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Beasty Cracked\BNY DUMPED\8fzqf7r.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2336
    • C:\Windows\system32\certutil.exe
      CERTUTIL -f -decode "C:\Users\Admin\AppData\Local\Temp\Beasty Cracked\BNY DUMPED\8fzqf7r.bat" "C:\Users\Admin\AppData\Local\Temp\24433.cmd"
      2⤵
        PID:2292
      • C:\Windows\system32\getmac.exe
        getmac
        2⤵
          PID:4308
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c wmic nic where physicaladapter=true get deviceid | findstr [0-9]
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:3008
          • C:\Windows\System32\Wbem\WMIC.exe
            wmic nic where physicaladapter=true get deviceid
            3⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:1804
          • C:\Windows\system32\findstr.exe
            findstr [0-9]
            3⤵
              PID:2052
          • C:\Windows\system32\reg.exe
            REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002bE10318}\01
            2⤵
              PID:5040
            • C:\Windows\system32\reg.exe
              REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002bE10318}\001
              2⤵
                PID:4472
              • C:\Windows\system32\reg.exe
                REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002bE10318}\0001
                2⤵
                  PID:2156
                • C:\Windows\system32\reg.exe
                  REG ADD HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002bE10318}\0001 /v NetworkAddress /t REG_SZ /d CE80F7433E94 /f
                  2⤵
                    PID:1652
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\system32\cmd.exe /c wmic nic where physicaladapter=true get deviceid | findstr [0-9]
                    2⤵
                    • Suspicious use of WriteProcessMemory
                    PID:2024
                    • C:\Windows\System32\Wbem\WMIC.exe
                      wmic nic where physicaladapter=true get deviceid
                      3⤵
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2004
                    • C:\Windows\system32\findstr.exe
                      findstr [0-9]
                      3⤵
                        PID:1872
                    • C:\Windows\system32\reg.exe
                      REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002bE10318}\01
                      2⤵
                        PID:2148
                      • C:\Windows\system32\reg.exe
                        REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002bE10318}\001
                        2⤵
                          PID:1800
                        • C:\Windows\system32\reg.exe
                          REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002bE10318}\0001
                          2⤵
                            PID:4008
                          • C:\Windows\system32\reg.exe
                            REG ADD HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002bE10318}\0001 /v PnPCapabilities /t REG_DWORD /d 24 /f
                            2⤵
                              PID:4204
                            • C:\Windows\system32\cmd.exe
                              C:\Windows\system32\cmd.exe /c "wmic nic where (netconnectionid like '%') get netconnectionid,netconnectionstatus /format:csv"
                              2⤵
                              • Suspicious use of WriteProcessMemory
                              PID:4444
                              • C:\Windows\System32\Wbem\WMIC.exe
                                wmic nic where (netconnectionid like '%') get netconnectionid,netconnectionstatus /format:csv
                                3⤵
                                  PID:1400
                              • C:\Windows\system32\netsh.exe
                                netsh interface set interface name="Ethernet" disable
                                2⤵
                                  PID:548
                              • C:\Windows\System32\svchost.exe
                                C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s Netman
                                1⤵
                                  PID:2204

                                Network

                                MITRE ATT&CK Matrix

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\Users\Admin\AppData\Local\Temp\24433.cmd

                                  Filesize

                                  2KB

                                  MD5

                                  875a54f511baf4bc25c5cc2e4d56c1a0

                                  SHA1

                                  57bb04b6bb812f5bdff40a5bc324a17771145918

                                  SHA256

                                  d80a0db16a6a3ba969ead9957c04e3ca6cdb05dbdea48d0cb49269c8e24867e1

                                  SHA512

                                  8600c555a7c995076d7d71903b3fb6494e9c8f5c1cb49aaabec92200a4e8e2fb4f30fb8aa85e214e7a4b9a7c04453e821097ee873d0383d6b1a40719b59f470c