Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    30/05/2024, 19:14

General

  • Target

    a.bat

  • Size

    25KB

  • MD5

    1a124ac47a96d52728cc1177adb0f844

  • SHA1

    b11438028476f3724fb964054dc1812b16d4b85f

  • SHA256

    4f024d3a2b89341e025d7b9ca2bcc111c741765972066c9d12da2501f09c6524

  • SHA512

    925c8924f2bb950fc94c849760e5483a66845b9f21de842fb64ebc8d3773ee934387ac86eac29a3fbfa9c4d32c246c955d60cf03ba7029c797264f72510a2eba

  • SSDEEP

    768:DuVHO397H8tymn+pdTXj0DfQhsxifjqXXWybXtyR:DuZC

Score
1/10

Malware Config

Signatures

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates processes with tasklist 1 TTPs 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 22 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\a.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1772
    • C:\Windows\system32\reg.exe
      reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v Hidden /t REG_DWORD /d 0 /f
      2⤵
        PID:2124
      • C:\Windows\system32\attrib.exe
        attrib +h "C:\Users\Admin\AppData\Local\Temp\1390520447"
        2⤵
        • Views/modifies file attributes
        PID:2364
      • C:\Windows\system32\attrib.exe
        attrib +h "C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin"
        2⤵
        • Views/modifies file attributes
        PID:2312
      • C:\Windows\system32\attrib.exe
        attrib +h "C:\Users\Admin\AppData\Local\Temp\Low"
        2⤵
        • Views/modifies file attributes
        PID:2332
      • C:\Windows\system32\attrib.exe
        attrib +h "C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219"
        2⤵
        • Views/modifies file attributes
        PID:3044
      • C:\Windows\system32\attrib.exe
        attrib +h "C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219"
        2⤵
        • Views/modifies file attributes
        PID:2728
      • C:\Windows\system32\attrib.exe
        attrib +h "C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files"
        2⤵
        • Views/modifies file attributes
        PID:3032
      • C:\Windows\system32\attrib.exe
        attrib +h "C:\Users\Admin\AppData\Local\Temp\scoped_dir816_1791373456"
        2⤵
        • Views/modifies file attributes
        PID:2588
      • C:\Windows\system32\attrib.exe
        attrib +h "C:\Users\Admin\AppData\Local\Temp\scoped_dir816_2026301031"
        2⤵
        • Views/modifies file attributes
        PID:2080
      • C:\Windows\system32\attrib.exe
        attrib +h "C:\Users\Admin\AppData\Local\Temp\WPDNSE"
        2⤵
        • Views/modifies file attributes
        PID:3068
      • C:\Windows\system32\attrib.exe
        attrib +h "C:\Users\Admin\AppData\Local\Temp\*.tmp\*" /S /D
        2⤵
        • Views/modifies file attributes
        PID:2140
      • C:\Windows\system32\attrib.exe
        attrib +h ""
        2⤵
        • Views/modifies file attributes
        PID:2640
      • C:\Windows\system32\attrib.exe
        attrib +h ""
        2⤵
        • Views/modifies file attributes
        PID:2600
      • C:\Windows\system32\attrib.exe
        attrib +h ""
        2⤵
        • Views/modifies file attributes
        PID:2692
      • C:\Windows\system32\attrib.exe
        attrib +h ""
        2⤵
        • Views/modifies file attributes
        PID:2708
      • C:\Windows\system32\attrib.exe
        attrib +h ""
        2⤵
        • Views/modifies file attributes
        PID:2712
      • C:\Windows\system32\attrib.exe
        attrib +h ""
        2⤵
        • Views/modifies file attributes
        PID:2732
      • C:\Windows\system32\attrib.exe
        attrib +h ""
        2⤵
        • Views/modifies file attributes
        PID:2720
      • C:\Windows\system32\attrib.exe
        attrib +h ""
        2⤵
        • Views/modifies file attributes
        PID:2696
      • C:\Windows\system32\attrib.exe
        attrib +h ""
        2⤵
        • Views/modifies file attributes
        PID:2644
      • C:\Windows\system32\attrib.exe
        attrib +h ""
        2⤵
        • Views/modifies file attributes
        PID:2604
      • C:\Windows\system32\attrib.exe
        attrib +h ""
        2⤵
        • Views/modifies file attributes
        PID:2848
      • C:\Windows\system32\attrib.exe
        attrib +h ""
        2⤵
        • Views/modifies file attributes
        PID:2768
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c wmic baseboard get product /value | find "Product"
        2⤵
          PID:2744
          • C:\Windows\System32\Wbem\WMIC.exe
            wmic baseboard get product /value
            3⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:3036
          • C:\Windows\system32\find.exe
            find "Product"
            3⤵
              PID:2752
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c wmic csproduct get name /value | find "Name"
            2⤵
              PID:2760
              • C:\Windows\System32\Wbem\WMIC.exe
                wmic csproduct get name /value
                3⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:2740
              • C:\Windows\system32\find.exe
                find "Name"
                3⤵
                  PID:2500
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /c wmic cpu get caption /value | find "Caption"
                2⤵
                  PID:2572
                  • C:\Windows\System32\Wbem\WMIC.exe
                    wmic cpu get caption /value
                    3⤵
                      PID:2204
                    • C:\Windows\system32\find.exe
                      find "Caption"
                      3⤵
                        PID:2940
                    • C:\Windows\system32\tasklist.exe
                      tasklist
                      2⤵
                      • Enumerates processes with tasklist
                      PID:2916
                    • C:\Windows\system32\find.exe
                      find /i "VMwareService.exe"
                      2⤵
                        PID:2932
                      • C:\Windows\system32\tasklist.exe
                        tasklist
                        2⤵
                        • Enumerates processes with tasklist
                        PID:2968
                      • C:\Windows\system32\find.exe
                        find /i "VMwareTray.exe"
                        2⤵
                          PID:2964
                        • C:\Windows\system32\tasklist.exe
                          tasklist
                          2⤵
                          • Enumerates processes with tasklist
                          PID:564
                        • C:\Windows\system32\find.exe
                          find /i "provisioner.exe"
                          2⤵
                            PID:2392
                          • C:\Windows\system32\timeout.exe
                            timeout 5 /nobreak
                            2⤵
                            • Delays execution with timeout.exe
                            PID:2472

                        Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads