Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
129s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
06/06/2024, 15:46
Static task
static1
Behavioral task
behavioral1
Sample
NEW PO-198.bat
Resource
win7-20240508-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
NEW PO-198.bat
Resource
win10v2004-20240508-en
3 signatures
150 seconds
General
-
Target
NEW PO-198.bat
-
Size
59KB
-
MD5
25bf533828bde12570817d2f1fde454f
-
SHA1
7388eca873dc737a31eb9ee9b7bec88a0997b60a
-
SHA256
c269f3d4b6c6d32479b95fff909c48a537e808e9f21e3a4af6284e58c40108e1
-
SHA512
f6333c1cf7c3cb8aa3373a8b188adfa18211826a391d1dd7e1dd64f5dee4cce90268baaad1eef6e525a30b18ce048148a1a3c2029019f39a325faee8baaae984
-
SSDEEP
1536:oZUge6egrNuGhItAl1/49Y+ce/mL94eZn4o:oTQw4GGtAlBwce/mfn1
Score
8/10
Malware Config
Signatures
-
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 1124 attrib.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2344 wrote to memory of 5036 2344 cmd.exe 86 PID 2344 wrote to memory of 5036 2344 cmd.exe 86 PID 2344 wrote to memory of 3688 2344 cmd.exe 87 PID 2344 wrote to memory of 3688 2344 cmd.exe 87 PID 2344 wrote to memory of 1124 2344 cmd.exe 88 PID 2344 wrote to memory of 1124 2344 cmd.exe 88 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 1124 attrib.exe
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NEW PO-198.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo F "2⤵PID:5036
-
-
C:\Windows\system32\xcopy.exexcopy /d /q /y /h /i C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Users\Admin\AppData\Local\Temp\NEW PO-198.bat.Njk2⤵PID:3688
-
-
C:\Windows\system32\attrib.exeattrib +s +h C:\Users\Admin\AppData\Local\Temp\NEW PO-198.bat.Njk2⤵
- Sets file to hidden
- Views/modifies file attributes
PID:1124
-