Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

12/10/2024, 19:24

241012-x4h6lsxcrg 8

12/10/2024, 19:03

241012-xqrwlawepg 5

Analysis

  • max time kernel
    94s
  • max time network
    97s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    12/10/2024, 19:24

General

  • Target

    service_discord_youtube.bat

  • Size

    1KB

  • MD5

    6457e714a70eb8ed34bdedfabe22a3b0

  • SHA1

    faaa36daee676eb6ff1a1e12f4577e509520fad0

  • SHA256

    f1312377f6ea6cbc873ff90a9fde5b17392f335c225c133754d05a40125b42cb

  • SHA512

    0fefa9b8dad045025f2dc42d9d83e4e1d22d8f5df0fd6fd2be9d883c72f5dbd7a4392594108cc8a0f75d8dc7d519f2561e02b37a53762a96f320087de18a002a

Malware Config

Signatures

  • Creates new service(s) 2 TTPs
  • Stops running service(s) 4 TTPs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Launches sc.exe 4 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Runs net.exe
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\service_discord_youtube.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3904
    • C:\Windows\system32\chcp.com
      chcp 65001
      2⤵
        PID:1984
      • C:\Windows\system32\net.exe
        net stop zapret
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1680
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop zapret
          3⤵
            PID:4156
        • C:\Windows\system32\sc.exe
          sc delete zapret
          2⤵
          • Launches sc.exe
          PID:4152
        • C:\Windows\system32\sc.exe
          sc create zapret binPath= "\"C:\Users\Admin\AppData\Local\Temp\bin\winws.exe\" --wf-tcp=80,443 --wf-udp=443,50000-65535 --filter-udp=443 --hostlist=\"C:\Users\Admin\AppData\Local\Temp\list-general.txt\" --dpi-desync=fake --dpi-desync-udplen-increment=10 --dpi-desync-repeats=6 --dpi-desync-udplen-pattern=0xDEADBEEF --dpi-desync-fake-quic=\"C:\Users\Admin\AppData\Local\Temp\bin\quic_initial_www_google_com.bin\" --new --filter-udp=50000-65535 --dpi-desync=fake --dpi-desync-any-protocol --dpi-desync-fake-quic=\"C:\Users\Admin\AppData\Local\Temp\bin\quic_initial_www_google_com.bin\" --new --filter-tcp=80 --hostlist=\"C:\Users\Admin\AppData\Local\Temp\list-general.txt\" --dpi-desync=fake,split2 --dpi-desync-autottl=2 --dpi-desync-fooling=md5sig --new --filter-tcp=443 --hostlist=\"C:\Users\Admin\AppData\Local\Temp\list-general.txt\" --dpi-desync=fake,split2 --dpi-desync-autottl=2 --dpi-desync-fooling=md5sig --dpi-desync-fake-tls=\"C:\Users\Admin\AppData\Local\Temp\bin\tls_clienthello_www_google_com.bin\"" DisplayName= "zapret DPI bypass : zapret" start= auto
          2⤵
          • Launches sc.exe
          PID:5016
        • C:\Windows\system32\sc.exe
          sc description zapret "zapret DPI bypass software"
          2⤵
          • Launches sc.exe
          PID:740
        • C:\Windows\system32\sc.exe
          sc start zapret
          2⤵
          • Launches sc.exe
          PID:2960
      • C:\Users\Admin\AppData\Local\Temp\bin\winws.exe
        "C:\Users\Admin\AppData\Local\Temp\bin\winws.exe" --wf-tcp=80,443 --wf-udp=443,50000-65535 --filter-udp=443 --hostlist="C:\Users\Admin\AppData\Local\Temp\list-general.txt" --dpi-desync=fake --dpi-desync-udplen-increment=10 --dpi-desync-repeats=6 --dpi-desync-udplen-pattern=0xDEADBEEF --dpi-desync-fake-quic="C:\Users\Admin\AppData\Local\Temp\bin\quic_initial_www_google_com.bin" --new --filter-udp=50000-65535 --dpi-desync=fake --dpi-desync-any-protocol --dpi-desync-fake-quic="C:\Users\Admin\AppData\Local\Temp\bin\quic_initial_www_google_com.bin" --new --filter-tcp=80 --hostlist="C:\Users\Admin\AppData\Local\Temp\list-general.txt" --dpi-desync=fake,split2 --dpi-desync-autottl=2 --dpi-desync-fooling=md5sig --new --filter-tcp=443 --hostlist="C:\Users\Admin\AppData\Local\Temp\list-general.txt" --dpi-desync=fake,split2 --dpi-desync-autottl=2 --dpi-desync-fooling=md5sig --dpi-desync-fake-tls="C:\Users\Admin\AppData\Local\Temp\bin\tls_clienthello_www_google_com.bin"
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:564

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/564-0-0x00007FFE1CD30000-0x00007FFE1D042000-memory.dmp

        Filesize

        3.1MB

      • memory/564-1-0x0000000100400000-0x0000000100446000-memory.dmp

        Filesize

        280KB

      • memory/564-4-0x0000000062800000-0x0000000062813000-memory.dmp

        Filesize

        76KB

      • memory/564-2-0x0000000100400000-0x0000000100446000-memory.dmp

        Filesize

        280KB

      • memory/564-5-0x00007FFE1CD30000-0x00007FFE1D042000-memory.dmp

        Filesize

        3.1MB