Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    51s
  • max time network
    57s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/06/2024, 16:29

General

  • Target

    File/runReg_admin_CryptoKit.bat

  • Size

    358B

  • MD5

    b813c9f650bc28f8062a640788d589c7

  • SHA1

    99959bb6d7b00b9255d3ff7145be22669e5e92bd

  • SHA256

    0054e30f1d7d46f510cf2d91d0cbbb6d966c6e39af3fbdf90a40badee85349b3

  • SHA512

    344e0b1f986596b450613624b5e72384568a7246e77d995f85dd3dee6a7d0fab574ee8ab880fb3540703df68f7d2d6bf0b52afe899c0abb991bb4434b7ec4b34

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 46 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\File\runReg_admin_CryptoKit.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3108
    • C:\Windows\system32\mshta.exe
      mshta vbscript:CreateObject("Shell.Application").ShellExecute("cmd.exe","/c C:\Users\Admin\AppData\Local\Temp\File\RUNREG~1.BAT ::","","runas",1)(window.close)
      2⤵
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:3012
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\File\RUNREG~1.BAT ::
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:316
        • C:\Windows\system32\regsvr32.exe
          C:\Windows\system32\regsvr32 /s CryptoKit.SDEG.x86.dll
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3452
          • C:\Windows\SysWOW64\regsvr32.exe
            /s CryptoKit.SDEG.x86.dll
            5⤵
            • Modifies registry class
            PID:3116
        • C:\Windows\system32\PING.EXE
          ping -n 1 127.1
          4⤵
          • Runs ping.exe
          PID:5004

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads