Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
7s -
max time network
0s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
12/10/2024, 08:42
Static task
static1
Behavioral task
behavioral1
Sample
driverless-disk.bat
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
driverless-disk.bat
Resource
win10v2004-20241007-en
General
-
Target
driverless-disk.bat
-
Size
13KB
-
MD5
49a5f55868a783b754fead973013bbee
-
SHA1
298c7ecf80b26bd204b709f1a13c6dc0d7747a91
-
SHA256
22f83229ea6dbe8f8e831939dfd7831a7817ac967ccb87afda077d1d47cea4e2
-
SHA512
8f7e27e3232137c3622e156595618e8ae19ae29fc9ee75be51ee715b821d3a0320956e84a34502020d88a3ef5b6c45405afb7012fbf96288c2aa4c305236f1d1
-
SSDEEP
192:dIc4yR9Y9A/r1/kMUnNLyCYSvGOqHQ28lh9YDpqWkSyt1ninmdKgZ:bxR9hjF/UnECROBClh9YDpDkSy3inlo
Malware Config
Signatures
-
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\System\ControlSet001\Enum\SCSI powershell.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI powershell.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI powershell.exe Key opened \REGISTRY\MACHINE\System\ControlSet001\Enum\SCSI\Disk&Ven_Dell&Prod_THINAIR_DISK powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_Dell&Prod_THINAIR_DISK powershell.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2596 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2596 powershell.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1308 wrote to memory of 2384 1308 cmd.exe 30 PID 1308 wrote to memory of 2384 1308 cmd.exe 30 PID 1308 wrote to memory of 2384 1308 cmd.exe 30 PID 2384 wrote to memory of 2992 2384 net.exe 31 PID 2384 wrote to memory of 2992 2384 net.exe 31 PID 2384 wrote to memory of 2992 2384 net.exe 31 PID 1308 wrote to memory of 2596 1308 cmd.exe 32 PID 1308 wrote to memory of 2596 1308 cmd.exe 32 PID 1308 wrote to memory of 2596 1308 cmd.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\driverless-disk.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Windows\system32\net.exeNET FILE2⤵
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 FILE3⤵PID:2992
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell /nologo /noprofile /command "&{[ScriptBlock]::Create((cat """C:\Users\Admin\AppData\Local\Temp\driverless-disk.bat""") -join [Char[]]10).Invoke(@(&{$args}))}"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2596
-