Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    11/06/2024, 16:29

General

  • Target

    File/runReg_admin_CryptoKit.bat

  • Size

    358B

  • MD5

    b813c9f650bc28f8062a640788d589c7

  • SHA1

    99959bb6d7b00b9255d3ff7145be22669e5e92bd

  • SHA256

    0054e30f1d7d46f510cf2d91d0cbbb6d966c6e39af3fbdf90a40badee85349b3

  • SHA512

    344e0b1f986596b450613624b5e72384568a7246e77d995f85dd3dee6a7d0fab574ee8ab880fb3540703df68f7d2d6bf0b52afe899c0abb991bb4434b7ec4b34

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry class 46 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\File\runReg_admin_CryptoKit.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2780
    • C:\Windows\system32\mshta.exe
      mshta vbscript:CreateObject("Shell.Application").ShellExecute("cmd.exe","/c C:\Users\Admin\AppData\Local\Temp\File\RUNREG~1.BAT ::","","runas",1)(window.close)
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of WriteProcessMemory
      PID:2816
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\File\RUNREG~1.BAT ::
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2480
        • C:\Windows\system32\regsvr32.exe
          C:\Windows\system32\regsvr32 /s CryptoKit.SDEG.x86.dll
          4⤵
          • Suspicious behavior: CmdExeWriteProcessMemorySpam
          • Suspicious use of WriteProcessMemory
          PID:2552
          • C:\Windows\SysWOW64\regsvr32.exe
            /s CryptoKit.SDEG.x86.dll
            5⤵
            • Modifies registry class
            PID:2688
        • C:\Windows\system32\PING.EXE
          ping -n 1 127.1
          4⤵
          • Runs ping.exe
          PID:2464

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads