Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
124s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28/09/2024, 06:18
Static task
static1
Behavioral task
behavioral1
Sample
nigger.bat
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
nigger.bat
Resource
win10v2004-20240802-en
General
-
Target
nigger.bat
-
Size
22KB
-
MD5
9728d8cbe0f70e03fd89949af0e83ec9
-
SHA1
29156b3c59987aea93a444a7bc3e910d58cce381
-
SHA256
a0a59c0434f9f36915f4b00704f1270878412dd6f63639956616faed8d3417be
-
SHA512
6637bf029dfdeb38d225db1b60e28d2d351f70e609e6049274a88d95cb4c2f6067c855c63fc5faeff20610025327d4b3c840379be43df05c1de888d2b9696137
-
SSDEEP
192:P9+NMQsAG26lW9AU4c8gbDkMtzHkb4+6OFJIkRpGV9+NMQsAG26lW9AU4c8gbDkm:P9+mlk9+mlw
Malware Config
Signatures
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 1556 netsh.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\BitcoinMiner.bat xcopy.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\BitcoinMiner.bat xcopy.exe -
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
Kills process with taskkill 1 IoCs
pid Process 2412 taskkill.exe -
Runs net.exe
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2412 taskkill.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 3344 wrote to memory of 544 3344 cmd.exe 90 PID 3344 wrote to memory of 544 3344 cmd.exe 90 PID 544 wrote to memory of 4928 544 net.exe 91 PID 544 wrote to memory of 4928 544 net.exe 91 PID 3344 wrote to memory of 3272 3344 cmd.exe 92 PID 3344 wrote to memory of 3272 3344 cmd.exe 92 PID 3272 wrote to memory of 4992 3272 net.exe 93 PID 3272 wrote to memory of 4992 3272 net.exe 93 PID 3344 wrote to memory of 932 3344 cmd.exe 94 PID 3344 wrote to memory of 932 3344 cmd.exe 94 PID 932 wrote to memory of 3160 932 net.exe 95 PID 932 wrote to memory of 3160 932 net.exe 95 PID 3344 wrote to memory of 2412 3344 cmd.exe 96 PID 3344 wrote to memory of 2412 3344 cmd.exe 96 PID 3344 wrote to memory of 4188 3344 cmd.exe 98 PID 3344 wrote to memory of 4188 3344 cmd.exe 98 PID 4188 wrote to memory of 4376 4188 net.exe 99 PID 4188 wrote to memory of 4376 4188 net.exe 99 PID 3344 wrote to memory of 3292 3344 cmd.exe 100 PID 3344 wrote to memory of 3292 3344 cmd.exe 100 PID 3292 wrote to memory of 4660 3292 net.exe 101 PID 3292 wrote to memory of 4660 3292 net.exe 101 PID 3344 wrote to memory of 1556 3344 cmd.exe 102 PID 3344 wrote to memory of 1556 3344 cmd.exe 102 PID 3344 wrote to memory of 2012 3344 cmd.exe 103 PID 3344 wrote to memory of 2012 3344 cmd.exe 103 PID 2012 wrote to memory of 3012 2012 net.exe 104 PID 2012 wrote to memory of 3012 2012 net.exe 104 PID 3344 wrote to memory of 2636 3344 cmd.exe 105 PID 3344 wrote to memory of 2636 3344 cmd.exe 105 PID 3344 wrote to memory of 2792 3344 cmd.exe 106 PID 3344 wrote to memory of 2792 3344 cmd.exe 106 PID 3344 wrote to memory of 1184 3344 cmd.exe 107 PID 3344 wrote to memory of 1184 3344 cmd.exe 107 PID 3344 wrote to memory of 1352 3344 cmd.exe 108 PID 3344 wrote to memory of 1352 3344 cmd.exe 108
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\nigger.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:3344 -
C:\Windows\system32\net.exenet session2⤵
- Suspicious use of WriteProcessMemory
PID:544 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 session3⤵PID:4928
-
-
-
C:\Windows\system32\net.exenet stop "SDRSVC"2⤵
- Suspicious use of WriteProcessMemory
PID:3272 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "SDRSVC"3⤵PID:4992
-
-
-
C:\Windows\system32\net.exenet stop "WinDefend"2⤵
- Suspicious use of WriteProcessMemory
PID:932 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "WinDefend"3⤵PID:3160
-
-
-
C:\Windows\system32\taskkill.exetaskkill /f /t /im "MSASCui.exe"2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2412
-
-
C:\Windows\system32\net.exenet stop "security center"2⤵
- Suspicious use of WriteProcessMemory
PID:4188 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "security center"3⤵PID:4376
-
-
-
C:\Windows\system32\net.exenet stop sharedaccess2⤵
- Suspicious use of WriteProcessMemory
PID:3292 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop sharedaccess3⤵PID:4660
-
-
-
C:\Windows\system32\netsh.exenetsh firewall set opmode mode-disable2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:1556
-
-
C:\Windows\system32\net.exenet stop "wuauserv"2⤵
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "wuauserv"3⤵PID:3012
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo tasklist "2⤵PID:2636
-
-
C:\Windows\system32\find.exefind /I "L0Lz"2⤵PID:2792
-
-
C:\Windows\system32\xcopy.exeXCOPY "BitcoinMiner.bat" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup"2⤵
- Drops startup file
PID:1184
-
-
C:\Windows\system32\xcopy.exeXCOPY "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\BitcoinMiner.bat"2⤵PID:1352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4308,i,15436195446242760253,4000484513008731869,262144 --variations-seed-version --mojo-platform-channel-handle=3964 /prefetch:81⤵PID:1960
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD5e975f5739aa276ac84d20381d5864424
SHA1e908dbd044364a9c0289c93ca9b360e5596ff310
SHA256609a4f1965c69e4aa87b462c65f306614b403b43e145a4804833a8f9fd9d011b
SHA5127aea28f814ebc509061c45334ee06246499219f0f4de8f960cb4b030d93de9ebfee8067630e9355065f422e8fb4c275ea499337073fa513f8d092e96f51d2dcf