Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
3Files/Apps/7z.bat
windows7-x64
10Files/Apps...F4.bat
windows7-x64
8Files/Apps/bts.bat
windows7-x64
3Files/Apps/chrome.bat
windows7-x64
8Files/Apps/ctt.bat
windows7-x64
3Files/Apps...ch.bat
windows7-x64
6Files/Apps...ox.bat
windows7-x64
1Files/Apps/flux.bat
windows7-x64
3Files/Apps/geek.bat
windows7-x64
10Files/Apps/git.bat
windows7-x64
8Files/Apps/logo.bat
windows7-x64
3Files/Apps/pcm.bat
windows7-x64
8Files/Apps/ps7.bat
windows7-x64
10Files/Apps/pswin7.bat
windows7-x64
10Files/Apps/winget.bat
windows7-x64
3Files/Apps...ys.bat
windows7-x64
3Files/Back...ry.bat
windows7-x64
1Files/Comm...me.bat
windows7-x64
1Files/Comp...ps.bat
windows7-x64
1Files/Comp...up.bat
windows7-x64
1Files/GPEE.bat
windows7-x64
1Files/IPGe...or.exe
windows7-x64
3Files/IPStealer.bat
windows7-x64
1Files/Impo...ps.bat
windows7-x64
1Files/InfoFinder.bat
windows7-x64
1Files/Malw...et.bat
windows7-x64
1Files/Newt...on.dll
windows7-x64
1Files/Pass...or.bat
windows7-x64
1Files/RAUP.bat
windows7-x64
1Files/SMBB...er.bat
windows7-x64
1Files/SSAMBYO.bat
windows7-x64
8Files/Schn...s).bat
windows7-x64
1Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 12:02
Static task
static1
Behavioral task
behavioral1
Sample
Files/Apps/7z.bat
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Files/Apps/SuperF4.bat
Resource
win7-20240903-en
Behavioral task
behavioral3
Sample
Files/Apps/bts.bat
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Files/Apps/chrome.bat
Resource
win7-20240704-en
Behavioral task
behavioral5
Sample
Files/Apps/ctt.bat
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
Files/Apps/fastfetch.bat
Resource
win7-20240903-en
Behavioral task
behavioral7
Sample
Files/Apps/firefox.bat
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Files/Apps/flux.bat
Resource
win7-20240903-en
Behavioral task
behavioral9
Sample
Files/Apps/geek.bat
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
Files/Apps/git.bat
Resource
win7-20240708-en
Behavioral task
behavioral11
Sample
Files/Apps/logo.bat
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
Files/Apps/pcm.bat
Resource
win7-20240903-en
Behavioral task
behavioral13
Sample
Files/Apps/ps7.bat
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
Files/Apps/pswin7.bat
Resource
win7-20240708-en
Behavioral task
behavioral15
Sample
Files/Apps/winget.bat
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
Files/Apps/wintoys.bat
Resource
win7-20240704-en
Behavioral task
behavioral17
Sample
Files/BackupRegistry.bat
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
Files/CommandLineGame.bat
Resource
win7-20240903-en
Behavioral task
behavioral19
Sample
Files/Components/Import Backups.bat
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
Files/Components/Registry Backup.bat
Resource
win7-20240729-en
Behavioral task
behavioral21
Sample
Files/GPEE.bat
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
Files/IPGeolocator.exe
Resource
win7-20240903-en
Behavioral task
behavioral23
Sample
Files/IPStealer.bat
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
Files/ImportBackups.bat
Resource
win7-20240903-en
Behavioral task
behavioral25
Sample
Files/InfoFinder.bat
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
Files/Malwarebytes-Premium-Reset.bat
Resource
win7-20240708-en
Behavioral task
behavioral27
Sample
Files/Newtonsoft.Json.dll
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
Files/PasswordGenerator.bat
Resource
win7-20240903-en
Behavioral task
behavioral29
Sample
Files/RAUP.bat
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
Files/SMBBruteforcer.bat
Resource
win7-20240708-en
Behavioral task
behavioral31
Sample
Files/SSAMBYO.bat
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
Files/Schnuker/Files/Run Me (Instructions).bat
Resource
win7-20240903-en
General
-
Target
Files/Apps/7z.bat
-
Size
839B
-
MD5
baf3616b558a8160895bb9c31461d927
-
SHA1
af5f159645fec5df4aafc1a750c3384fe3763dbb
-
SHA256
bee39c3a45d5b37932654aaf12345292b570f292b6385e29eaa3f8dc9985cd1c
-
SHA512
10e754aabc91ed4cb007ddbeac840289b8d5db728e4f0ebe59cee7dedf546f073d8a9148fdd7c216d266977dade9dcda2ee75ce174c8c1dc2fd888ebe9597db0
Malware Config
Extracted
https://raw.githubusercontent.com/SchooiCodes/file_hosting/main/7z.ps1
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 5 2808 powershell.exe 6 2808 powershell.exe -
pid Process 2396 powershell.exe 2808 powershell.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 4 raw.githubusercontent.com 5 raw.githubusercontent.com 6 raw.githubusercontent.com -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2396 powershell.exe 2808 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2396 powershell.exe Token: SeDebugPrivilege 2808 powershell.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2532 wrote to memory of 2524 2532 cmd.exe 31 PID 2532 wrote to memory of 2524 2532 cmd.exe 31 PID 2532 wrote to memory of 2524 2532 cmd.exe 31 PID 2532 wrote to memory of 2188 2532 cmd.exe 32 PID 2532 wrote to memory of 2188 2532 cmd.exe 32 PID 2532 wrote to memory of 2188 2532 cmd.exe 32 PID 2188 wrote to memory of 2500 2188 cmd.exe 33 PID 2188 wrote to memory of 2500 2188 cmd.exe 33 PID 2188 wrote to memory of 2500 2188 cmd.exe 33 PID 2532 wrote to memory of 2372 2532 cmd.exe 34 PID 2532 wrote to memory of 2372 2532 cmd.exe 34 PID 2532 wrote to memory of 2372 2532 cmd.exe 34 PID 2532 wrote to memory of 1932 2532 cmd.exe 35 PID 2532 wrote to memory of 1932 2532 cmd.exe 35 PID 2532 wrote to memory of 1932 2532 cmd.exe 35 PID 2532 wrote to memory of 2396 2532 cmd.exe 36 PID 2532 wrote to memory of 2396 2532 cmd.exe 36 PID 2532 wrote to memory of 2396 2532 cmd.exe 36 PID 2532 wrote to memory of 2808 2532 cmd.exe 37 PID 2532 wrote to memory of 2808 2532 cmd.exe 37 PID 2532 wrote to memory of 2808 2532 cmd.exe 37
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Files\Apps\7z.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\system32\fltMC.exefltmc2⤵PID:2524
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c chcp2⤵
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\system32\chcp.comchcp3⤵PID:2500
-
-
-
C:\Windows\system32\chcp.comchcp 650012⤵PID:2372
-
-
C:\Windows\system32\chcp.comchcp 4372⤵PID:1932
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "$PSVersionTable.PSVersion.Major"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2396
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "$wc = New-Object System.Net.WebClient; $script = $wc.DownloadString('https://raw.githubusercontent.com/SchooiCodes/file_hosting/main/7z.ps1'); Invoke-Expression $script"2⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\EOMT3Y2SBI8FJR6CPUIT.temp
Filesize7KB
MD5b4b396e584e9ac35da145e1477f4b820
SHA1d8aa91e32043c2742beec756f6258f1db1ed56c5
SHA256a4dc2188d5178fc57c15e39a621d7f46e291c0da2cdaa21a85fda62cfc747a54
SHA51208248b81cdf407deae58fcb75b4b836230e79631794a67d269802cec5dce3bb18d1eb763f542e77a17a0e22fb9577acc17d787a3ef04323665ac49b3b4f4fff7