Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    46s
  • max time network
    42s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    21/07/2024, 23:54

General

  • Target

    Windows-Activator-main/Windows-Activator.bat

  • Size

    16KB

  • MD5

    6c4a49f9d6cc22f3d177140477d22c0e

  • SHA1

    bbfd0c0603a23f9e8dfecbcbdcd5cf7db3473c92

  • SHA256

    408262209ea1b70bc6b65a2c01caa7a06f2ab72191189b9e3cb3f256129474ab

  • SHA512

    cfcc50da5ba0651299cb45163f920e5c503d4afd399998c9f6c93b583cca55f85a40633b93a037e00f732fd342b286e33d1be4a707cb56130043373107735682

  • SSDEEP

    384:WlWMFEhZDW4KpO42db+xHo/1C7RcI3CwXgOHIb:eFEhpoZHo/1C7Rt3CwXgOHg

Score
1/10

Malware Config

Signatures

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\Windows-Activator-main\Windows-Activator.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:496
    • C:\Windows\system32\fltMC.exe
      fltmc
      2⤵
        PID:2180
      • C:\Windows\system32\mode.com
        mode con cols=60 lines=25
        2⤵
          PID:2272
        • C:\Windows\system32\choice.exe
          choice /C:12345 /N /M "YOUR CHOICE : "
          2⤵
            PID:2276
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c reg query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion" | findstr CurrentVersion | findstr REG_SZ
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:2332
            • C:\Windows\system32\reg.exe
              reg query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion"
              3⤵
                PID:2932
              • C:\Windows\system32\findstr.exe
                findstr CurrentVersion
                3⤵
                  PID:2192
                • C:\Windows\system32\findstr.exe
                  findstr REG_SZ
                  3⤵
                    PID:2244
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /c reg query "HKLM\System\CurrentControlSet\Control\Session Manager\Environment" /v "PROCESSOR_ARCHITECTURE"
                  2⤵
                  • Suspicious use of WriteProcessMemory
                  PID:2472
                  • C:\Windows\system32\reg.exe
                    reg query "HKLM\System\CurrentControlSet\Control\Session Manager\Environment" /v "PROCESSOR_ARCHITECTURE"
                    3⤵
                      PID:984
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\system32\cmd.exe /c "wmic path SoftwareLicensingProduct where (Name LIKE '%Windows%' and PartialProductKey is not null) get LicenseStatus /format:list"
                    2⤵
                    • Suspicious use of WriteProcessMemory
                    PID:2748
                    • C:\Windows\System32\Wbem\WMIC.exe
                      wmic path SoftwareLicensingProduct where (Name LIKE '%Windows%' and PartialProductKey is not null) get LicenseStatus /format:list
                      3⤵
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2712
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\system32\cmd.exe /c "wmic path SoftwareLicensingProduct where (Name LIKE '%Windows%' and LicenseStatus='2') get name /value"
                    2⤵
                    • Suspicious use of WriteProcessMemory
                    PID:2900
                    • C:\Windows\System32\Wbem\WMIC.exe
                      wmic path SoftwareLicensingProduct where (Name LIKE '%Windows%' and LicenseStatus='2') get name /value
                      3⤵
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2892
                  • C:\Windows\system32\mode.com
                    mode con cols=97 lines=15
                    2⤵
                      PID:2628
                    • C:\Windows\system32\mode.com
                      mode con cols=97 lines=48
                      2⤵
                        PID:320
                      • C:\Windows\system32\reg.exe
                        reg add "HKLM\SYSTEM\Tokens" /v "Channel" /t REG_SZ /d "Retail" /f
                        2⤵
                          PID:2164
                        • C:\Windows\system32\reg.exe
                          reg add "HKLM\SYSTEM\Tokens\Kernel" /v "Kernel-ProductInfo" /t REG_DWORD /d /f
                          2⤵
                            PID:2740
                          • C:\Windows\system32\reg.exe
                            reg add "HKLM\SYSTEM\Tokens\Kernel" /v "Security-SPP-GenuineLocalStatus" /t REG_DWORD /d 1 /f
                            2⤵
                              PID:2656
                            • C:\Windows\system32\cscript.exe
                              cscript /nologo C:\Windows\system32\slmgr.vbs -ipk
                              2⤵
                                PID:2660
                              • C:\Users\Admin\AppData\Local\Temp\Windows-Activator-main\bin\x64\gatherosstate.exe
                                "bin\x64\gatherosstate.exe"
                                2⤵
                                  PID:2624
                                • C:\Windows\system32\timeout.exe
                                  timeout /t 3
                                  2⤵
                                  • Delays execution with timeout.exe
                                  PID:2336
                                • C:\Windows\system32\cscript.exe
                                  cscript /nologo C:\Windows\system32\slmgr.vbs -ato
                                  2⤵
                                    PID:2444
                                  • C:\Windows\system32\reg.exe
                                    reg delete "HKLM\SYSTEM\Tokens" /f
                                    2⤵
                                      PID:1876
                                    • C:\Windows\system32\mode.com
                                      mode con cols=60 lines=25
                                      2⤵
                                        PID:2984
                                      • C:\Windows\system32\choice.exe
                                        choice /C:12345 /N /M "YOUR CHOICE : "
                                        2⤵
                                          PID:2904

                                      Network

                                      MITRE ATT&CK Matrix

                                      Replay Monitor

                                      Loading Replay Monitor...

                                      Downloads

                                      • memory/2624-0-0x0000000000020000-0x0000000000030000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/2624-2-0x0000000000020000-0x0000000000030000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/2624-1-0x0000000000020000-0x0000000000030000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/2624-4-0x0000000000020000-0x0000000000030000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/2624-5-0x0000000000020000-0x0000000000030000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/2624-6-0x0000000066CC0000-0x0000000066CD7000-memory.dmp

                                        Filesize

                                        92KB