Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    08/09/2024, 12:02

General

  • Target

    Files/Malwarebytes-Premium-Reset.bat

  • Size

    1KB

  • MD5

    a5f28326d7555d81f8c22e5b46693571

  • SHA1

    c235bc7b6202c6e5c112a635365dc92bc3bf4d9a

  • SHA256

    6c0430a7504cb0aaa7328a1ce8100c3f890b158924d7f5905688930632715b60

  • SHA512

    028f737501eecffa6f6656bdc4943a71867cbeff9d7bc7e66fc046e584e8129aa0025fb9f73a449c12b4e215746a0698a315330bc5247473cf585cc49d36c317

Score
1/10

Malware Config

Signatures

  • Delays execution with timeout.exe 1 IoCs
  • Kills process with taskkill 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\Files\Malwarebytes-Premium-Reset.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3036
    • C:\Windows\system32\taskkill.exe
      taskkill.exe /f /im mbam.exe
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:2536
    • C:\Windows\system32\taskkill.exe
      taskkill.exe /f /im mbamtray.exe
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:3060
    • C:\Windows\system32\fltMC.exe
      fltmc
      2⤵
        PID:320
      • C:\Windows\System32\schtasks.exe
        C:\Windows\System32\schtasks /query /tn "Malwarebytes-Premium-Reset"
        2⤵
          PID:2736
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c powershell -c "[guid]::NewGuid().ToString()"
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:2756
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell -c "[guid]::NewGuid().ToString()"
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2824
        • C:\Windows\system32\reg.exe
          reg add "HKLM\SOFTWARE\Microsoft\Cryptography" /v "MachineGuid" /t REG_SZ /d "cf0f4b78-f63d-45cb-a24d-8fe29bdff48d" /f
          2⤵
            PID:2788
          • C:\Windows\System32\schtasks.exe
            C:\Windows\System32\schtasks /create /tn "Malwarebytes-Premium-Reset" /sc weekly /mo 2 /tr "for /f %a in ('powershell -c \"[guid]::NewGuid().ToString()\"'^) do (reg add \"HKLM\SOFTWARE\Microsoft\Cryptography\" /v \"MachineGuid\" /t REG_SZ /d \"%a\" /f)"
            2⤵
            • Scheduled Task/Job: Scheduled Task
            PID:2164
          • C:\Windows\system32\timeout.exe
            timeout /t 3
            2⤵
            • Delays execution with timeout.exe
            PID:2872

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2824-4-0x000007FEF553E000-0x000007FEF553F000-memory.dmp

          Filesize

          4KB

        • memory/2824-5-0x000000001B5D0000-0x000000001B8B2000-memory.dmp

          Filesize

          2.9MB

        • memory/2824-8-0x000007FEF5280000-0x000007FEF5C1D000-memory.dmp

          Filesize

          9.6MB

        • memory/2824-9-0x000007FEF5280000-0x000007FEF5C1D000-memory.dmp

          Filesize

          9.6MB

        • memory/2824-7-0x000007FEF5280000-0x000007FEF5C1D000-memory.dmp

          Filesize

          9.6MB

        • memory/2824-6-0x0000000001F80000-0x0000000001F88000-memory.dmp

          Filesize

          32KB

        • memory/2824-10-0x000007FEF5280000-0x000007FEF5C1D000-memory.dmp

          Filesize

          9.6MB

        • memory/2824-11-0x000007FEF5280000-0x000007FEF5C1D000-memory.dmp

          Filesize

          9.6MB