Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
21/05/2024, 13:35
Static task
static1
Behavioral task
behavioral1
Sample
wallpaper.bat.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
wallpaper.bat.exe
Resource
win10v2004-20240426-en
General
-
Target
wallpaper.bat.exe
-
Size
97KB
-
MD5
2b27ae48cb717f92fec9d4c62f9b058a
-
SHA1
6ba23ca2620ae39dccdcdce947db7c3d229c939a
-
SHA256
71c645b58cf6bd0d7919901fdd9c3654d5ec269c4678c2e58726585c3bf9612a
-
SHA512
5bbadcede2f96beeb4a46e82d7a44ec559ff8271ca0495bb5b9c4a0e6270203da43d9dc277e6b3c88c93edecab980a71990f2878233a9d2b212e4072c483270e
-
SSDEEP
1536:Y2Y0VNblnigen1FQGpaika1PASjg/oCRNd+FXIhUBZ:Y23rbZi/8GprF3jg/oMNd4I+f
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 4272 wrote to memory of 4324 4272 wallpaper.bat.exe 84 PID 4272 wrote to memory of 4324 4272 wallpaper.bat.exe 84 PID 4272 wrote to memory of 4324 4272 wallpaper.bat.exe 84 PID 4324 wrote to memory of 4172 4324 cmd.exe 85 PID 4324 wrote to memory of 4172 4324 cmd.exe 85 PID 4324 wrote to memory of 4172 4324 cmd.exe 85 PID 4272 wrote to memory of 1696 4272 wallpaper.bat.exe 86 PID 4272 wrote to memory of 1696 4272 wallpaper.bat.exe 86 PID 4272 wrote to memory of 1696 4272 wallpaper.bat.exe 86 PID 4272 wrote to memory of 644 4272 wallpaper.bat.exe 87 PID 4272 wrote to memory of 644 4272 wallpaper.bat.exe 87 PID 4272 wrote to memory of 644 4272 wallpaper.bat.exe 87 PID 4272 wrote to memory of 3160 4272 wallpaper.bat.exe 88 PID 4272 wrote to memory of 3160 4272 wallpaper.bat.exe 88 PID 4272 wrote to memory of 3160 4272 wallpaper.bat.exe 88 PID 4272 wrote to memory of 912 4272 wallpaper.bat.exe 89 PID 4272 wrote to memory of 912 4272 wallpaper.bat.exe 89 PID 4272 wrote to memory of 912 4272 wallpaper.bat.exe 89 PID 912 wrote to memory of 3368 912 cmd.exe 90 PID 912 wrote to memory of 3368 912 cmd.exe 90 PID 912 wrote to memory of 3368 912 cmd.exe 90 PID 4272 wrote to memory of 3120 4272 wallpaper.bat.exe 91 PID 4272 wrote to memory of 3120 4272 wallpaper.bat.exe 91 PID 4272 wrote to memory of 3120 4272 wallpaper.bat.exe 91 PID 4272 wrote to memory of 1236 4272 wallpaper.bat.exe 92 PID 4272 wrote to memory of 1236 4272 wallpaper.bat.exe 92 PID 4272 wrote to memory of 1236 4272 wallpaper.bat.exe 92 PID 4272 wrote to memory of 4632 4272 wallpaper.bat.exe 93 PID 4272 wrote to memory of 4632 4272 wallpaper.bat.exe 93 PID 4272 wrote to memory of 4632 4272 wallpaper.bat.exe 93 PID 4272 wrote to memory of 4372 4272 wallpaper.bat.exe 94 PID 4272 wrote to memory of 4372 4272 wallpaper.bat.exe 94 PID 4272 wrote to memory of 4372 4272 wallpaper.bat.exe 94 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 3368 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\wallpaper.bat.exe"C:\Users\Admin\AppData\Local\Temp\wallpaper.bat.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4272 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c mode con:cols=0120 lines=00302⤵
- Suspicious use of WriteProcessMemory
PID:4324 -
C:\Windows\SysWOW64\mode.commode con:cols=0120 lines=00303⤵PID:4172
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c title wallpaper2⤵PID:1696
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c if not exist "C:\Users\Admin\AppData\Local\Temp\myfiles" mkdir "C:\Users\Admin\AppData\Local\Temp\myfiles"2⤵PID:644
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c if not exist "C:\Users\Admin\AppData\Local\Temp\wtmpd" mkdir "C:\Users\Admin\AppData\Local\Temp\wtmpd"2⤵PID:3160
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c attrib +h C:\Users\Admin\AppData\Local\Temp\wtmpd2⤵
- Suspicious use of WriteProcessMemory
PID:912 -
C:\Windows\SysWOW64\attrib.exeattrib +h C:\Users\Admin\AppData\Local\Temp\wtmpd3⤵
- Views/modifies file attributes
PID:3368
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo:0>C:\Users\Admin\AppData\Local\Temp\i6.t2⤵PID:3120
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\i6.bat2⤵PID:1236
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c2⤵PID:4632
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c pause2⤵PID:4372
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
173B
MD50f8f70e88009593eefaa155a8e31b1d6
SHA1eabcc3f2135e0919e9456da0a4b1084f3382d4b6
SHA256941c169c07670650fc6c6148c1cae068b69bac209e05010594e164aafc7cdf8b
SHA51294df468b963f3c9d133a25e1ffa57039fac01fe960f0f738552ca6440e6242ff48d0b410fe70dd05a62e4842c925c9f2b0220ca9eb9cb4ff5490ada443c9a750
-
Filesize
3B
MD5a5ea0ad9260b1550a14cc58d2c39b03d
SHA1f0aedf295071ed34ab8c6a7692223d22b6a19841
SHA256f1b2f662800122bed0ff255693df89c4487fbdcf453d3524a42d4ec20c3d9c04
SHA5127c735c613ece191801114785c1ee26a0485cbf1e8ee2c3b85ba1ad290ef75eec9fede5e1a5dc26d504701f3542e6b6457818f4c1d62448d0db40d5f35c357d74