Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    11s
  • max time network
    16s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/05/2024, 19:14

General

  • Target

    a.bat

  • Size

    25KB

  • MD5

    1a124ac47a96d52728cc1177adb0f844

  • SHA1

    b11438028476f3724fb964054dc1812b16d4b85f

  • SHA256

    4f024d3a2b89341e025d7b9ca2bcc111c741765972066c9d12da2501f09c6524

  • SHA512

    925c8924f2bb950fc94c849760e5483a66845b9f21de842fb64ebc8d3773ee934387ac86eac29a3fbfa9c4d32c246c955d60cf03ba7029c797264f72510a2eba

  • SSDEEP

    768:DuVHO397H8tymn+pdTXj0DfQhsxifjqXXWybXtyR:DuZC

Score
1/10

Malware Config

Signatures

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates processes with tasklist 1 TTPs 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 22 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3016
    • C:\Windows\system32\reg.exe
      reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v Hidden /t REG_DWORD /d 0 /f
      2⤵
        PID:3976
      • C:\Windows\system32\attrib.exe
        attrib +h "C:\Users\Admin\AppData\Local\Temp\828675283"
        2⤵
        • Views/modifies file attributes
        PID:4684
      • C:\Windows\system32\attrib.exe
        attrib +h "C:\Users\Admin\AppData\Local\Temp\acrocef_low"
        2⤵
        • Views/modifies file attributes
        PID:2988
      • C:\Windows\system32\attrib.exe
        attrib +h "C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin"
        2⤵
        • Views/modifies file attributes
        PID:4516
      • C:\Windows\system32\attrib.exe
        attrib +h "C:\Users\Admin\AppData\Local\Temp\Low"
        2⤵
        • Views/modifies file attributes
        PID:2188
      • C:\Windows\system32\attrib.exe
        attrib +h "C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219"
        2⤵
        • Views/modifies file attributes
        PID:4964
      • C:\Windows\system32\attrib.exe
        attrib +h "C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219"
        2⤵
        • Views/modifies file attributes
        PID:4672
      • C:\Windows\system32\attrib.exe
        attrib +h "C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files"
        2⤵
        • Views/modifies file attributes
        PID:2736
      • C:\Windows\system32\attrib.exe
        attrib +h "C:\Users\Admin\AppData\Local\Temp\OneNote"
        2⤵
        • Views/modifies file attributes
        PID:2764
      • C:\Windows\system32\attrib.exe
        attrib +h "C:\Users\Admin\AppData\Local\Temp\{067D9787-1BC0-4E04-8C09-CA87A060680A}"
        2⤵
        • Views/modifies file attributes
        PID:2936
      • C:\Windows\system32\attrib.exe
        attrib +h "C:\Users\Admin\AppData\Local\Temp\*.tmp\*" /S /D
        2⤵
        • Views/modifies file attributes
        PID:1148
      • C:\Windows\system32\attrib.exe
        attrib +h ""
        2⤵
        • Views/modifies file attributes
        PID:1700
      • C:\Windows\system32\attrib.exe
        attrib +h ""
        2⤵
        • Views/modifies file attributes
        PID:3856
      • C:\Windows\system32\attrib.exe
        attrib +h ""
        2⤵
        • Views/modifies file attributes
        PID:2392
      • C:\Windows\system32\attrib.exe
        attrib +h ""
        2⤵
        • Views/modifies file attributes
        PID:2916
      • C:\Windows\system32\attrib.exe
        attrib +h ""
        2⤵
        • Views/modifies file attributes
        PID:2644
      • C:\Windows\system32\attrib.exe
        attrib +h ""
        2⤵
        • Views/modifies file attributes
        PID:5008
      • C:\Windows\system32\attrib.exe
        attrib +h ""
        2⤵
        • Views/modifies file attributes
        PID:4508
      • C:\Windows\system32\attrib.exe
        attrib +h ""
        2⤵
        • Views/modifies file attributes
        PID:2640
      • C:\Windows\system32\attrib.exe
        attrib +h ""
        2⤵
        • Views/modifies file attributes
        PID:2412
      • C:\Windows\system32\attrib.exe
        attrib +h ""
        2⤵
        • Views/modifies file attributes
        PID:3316
      • C:\Windows\system32\attrib.exe
        attrib +h ""
        2⤵
        • Views/modifies file attributes
        PID:4880
      • C:\Windows\system32\attrib.exe
        attrib +h ""
        2⤵
        • Views/modifies file attributes
        PID:2096
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c wmic baseboard get product /value | find "Product"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:3572
        • C:\Windows\System32\Wbem\WMIC.exe
          wmic baseboard get product /value
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:1680
        • C:\Windows\system32\find.exe
          find "Product"
          3⤵
            PID:632
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c wmic csproduct get name /value | find "Name"
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:4492
          • C:\Windows\System32\Wbem\WMIC.exe
            wmic csproduct get name /value
            3⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:3752
          • C:\Windows\system32\find.exe
            find "Name"
            3⤵
              PID:3400
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c wmic cpu get caption /value | find "Caption"
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:3608
            • C:\Windows\System32\Wbem\WMIC.exe
              wmic cpu get caption /value
              3⤵
                PID:808
              • C:\Windows\system32\find.exe
                find "Caption"
                3⤵
                  PID:3392
              • C:\Windows\system32\tasklist.exe
                tasklist
                2⤵
                • Enumerates processes with tasklist
                PID:5048
              • C:\Windows\system32\find.exe
                find /i "VMwareService.exe"
                2⤵
                  PID:1736
                • C:\Windows\system32\tasklist.exe
                  tasklist
                  2⤵
                  • Enumerates processes with tasklist
                  PID:2212
                • C:\Windows\system32\find.exe
                  find /i "VMwareTray.exe"
                  2⤵
                    PID:3952
                  • C:\Windows\system32\tasklist.exe
                    tasklist
                    2⤵
                    • Enumerates processes with tasklist
                    PID:920
                  • C:\Windows\system32\find.exe
                    find /i "provisioner.exe"
                    2⤵
                      PID:2552
                    • C:\Windows\system32\timeout.exe
                      timeout 5 /nobreak
                      2⤵
                      • Delays execution with timeout.exe
                      PID:1456

                  Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads