Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    241s
  • max time network
    247s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    06/07/2024, 22:36

General

  • Target

    straya_1.9.bat

  • Size

    155KB

  • MD5

    1716f6e36b264ea30d1d8cff9110f139

  • SHA1

    759a3e09756685ca3c4fd274ca210fa19760dcf0

  • SHA256

    33c5653158fbb1828f7cf9d7c414cc5895883b4b89533869277c6959983848da

  • SHA512

    791318cdd740607a61d5da19348bb0ae5bc9afa2fc29139bb8f6160be8c15cd9934fa961fe599ccc52e7dd9cf9f8f5ca140ab25c1819783b3620ad295faac296

  • SSDEEP

    768:Th+jAcTtGiZQVrXS6Pk6PbXEShEYVpHDeyUExVGEeyN5/Y5/U5/+Zc0KCrA/+cbM:TW7YVpHDd0HN1OIM42XQ

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 3 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Using powershell.exe command.

  • Modifies data under HKEY_USERS 43 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 15 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\straya_1.9.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2064
    • C:\Windows\system32\chcp.com
      chcp 65001
      2⤵
        PID:3052
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -ExecutionPolicy Unrestricted -NoProfile Enable-ComputerRestore -Drive 'C:'
        2⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3068
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -ExecutionPolicy Unrestricted -NoProfile Checkpoint-Computer -Description 'Tweakify restore point'
        2⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2816
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2900
    • C:\Windows\system32\DrvInst.exe
      DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000003D8" "0000000000000590"
      1⤵
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      • Suspicious use of AdjustPrivilegeToken
      PID:2012

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

      Filesize

      7KB

      MD5

      342e37e2d03a6e7280a29c9f3cff0f80

      SHA1

      d33b8133c34339d70c326979a7835015ee222a78

      SHA256

      82ba236955bbb4191a4c77b2eba4d75c8706e6a39fdf09899ca836a75dee4598

      SHA512

      48cf0384444bbbc8c233010db136e65febddd9eea07a0693641ff9b6fcd64cd7b0068158b590f927a4a775d322aa18b439a4a145f4b9b7f482e7669c9114218d

    • memory/2816-18-0x000000001B3B0000-0x000000001B692000-memory.dmp

      Filesize

      2.9MB

    • memory/2816-19-0x0000000001FC0000-0x0000000001FC8000-memory.dmp

      Filesize

      32KB

    • memory/3068-4-0x000007FEF46DE000-0x000007FEF46DF000-memory.dmp

      Filesize

      4KB

    • memory/3068-5-0x000000001B200000-0x000000001B4E2000-memory.dmp

      Filesize

      2.9MB

    • memory/3068-6-0x0000000002470000-0x0000000002478000-memory.dmp

      Filesize

      32KB

    • memory/3068-7-0x000007FEF4420000-0x000007FEF4DBD000-memory.dmp

      Filesize

      9.6MB

    • memory/3068-8-0x000007FEF4420000-0x000007FEF4DBD000-memory.dmp

      Filesize

      9.6MB

    • memory/3068-9-0x000007FEF4420000-0x000007FEF4DBD000-memory.dmp

      Filesize

      9.6MB

    • memory/3068-10-0x000007FEF4420000-0x000007FEF4DBD000-memory.dmp

      Filesize

      9.6MB

    • memory/3068-11-0x000007FEF4420000-0x000007FEF4DBD000-memory.dmp

      Filesize

      9.6MB

    • memory/3068-12-0x000007FEF4420000-0x000007FEF4DBD000-memory.dmp

      Filesize

      9.6MB