Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

12/10/2024, 19:24

241012-x4h6lsxcrg 8

12/10/2024, 19:03

241012-xqrwlawepg 5

Analysis

  • max time kernel
    147s
  • max time network
    144s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    12/10/2024, 19:03

General

  • Target

    discord_youtube.bat

  • Size

    866B

  • MD5

    fb41e984a0f58a55d057b062059a6ee1

  • SHA1

    7bd17cddd02464e0ac4de1201fac889bd229bb1d

  • SHA256

    2c8c88df4eaf172e0ef39b4d6adedc3aa9d3ad04d3767cde8cadf997606144be

  • SHA512

    b8d488c5b92aa79a522376e4d4192c9c8fc822e66111324516552897ec68e9c00c5731295a49cedae97154dd5fffe40f7053dd224a93591c1d0138035c9d61ec

Score
5/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\discord_youtube.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3476
    • C:\Windows\system32\chcp.com
      chcp 65001
      2⤵
        PID:244
      • C:\Users\Admin\AppData\Local\Temp\bin\winws.exe
        "C:\Users\Admin\AppData\Local\Temp\bin\winws.exe" --wf-tcp=80,443 --wf-udp=443,50000-65535 --filter-udp=443 --hostlist="list-general.txt" --dpi-desync=fake --dpi-desync-udplen-increment=10 --dpi-desync-repeats=6 --dpi-desync-udplen-pattern=0xDEADBEEF --dpi-desync-fake-quic="C:\Users\Admin\AppData\Local\Temp\bin\quic_initial_www_google_com.bin" --new --filter-udp=50000-65535 --dpi-desync=fake --dpi-desync-any-protocol --dpi-desync-fake-quic="C:\Users\Admin\AppData\Local\Temp\bin\quic_initial_www_google_com.bin" --new --filter-tcp=80 --hostlist="list-general.txt" --dpi-desync=fake,split2 --dpi-desync-autottl=2 --dpi-desync-fooling=md5sig --new --filter-tcp=443 --hostlist="list-general.txt" --dpi-desync=fake,split2 --dpi-desync-autottl=2 --dpi-desync-fooling=md5sig --dpi-desync-fake-tls="C:\Users\Admin\AppData\Local\Temp\bin\tls_clienthello_www_google_com.bin"
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:4024
    • C:\Windows\system32\BackgroundTransferHost.exe
      "BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.13
      1⤵
      • Modifies registry class
      PID:4724
    • C:\Windows\system32\taskmgr.exe
      "C:\Windows\system32\taskmgr.exe" /0
      1⤵
      • Checks SCSI registry key(s)
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3116
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:5084

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\BackgroundTransferApi\2c977b03-1a5f-4c3d-a626-46d3c5ddda6f.down_data

        Filesize

        555KB

        MD5

        5683c0028832cae4ef93ca39c8ac5029

        SHA1

        248755e4e1db552e0b6f8651b04ca6d1b31a86fb

        SHA256

        855abd360d8a8d6974eba92b70cbd09ce519bc8773439993f9ab37cb6847309e

        SHA512

        aba434bd29be191c823b02ea9b639beb10647bbe7759bbffdaa790dfb1ec2c58d74c525ef11aacda209e4effe322d1d3a07b115446c8914b07a3bce4d8a0e2c3

      • memory/3116-22-0x000001BAFDAF0000-0x000001BAFDAF1000-memory.dmp

        Filesize

        4KB

      • memory/3116-14-0x000001BAFDAF0000-0x000001BAFDAF1000-memory.dmp

        Filesize

        4KB

      • memory/3116-19-0x000001BAFDAF0000-0x000001BAFDAF1000-memory.dmp

        Filesize

        4KB

      • memory/3116-20-0x000001BAFDAF0000-0x000001BAFDAF1000-memory.dmp

        Filesize

        4KB

      • memory/3116-21-0x000001BAFDAF0000-0x000001BAFDAF1000-memory.dmp

        Filesize

        4KB

      • memory/3116-12-0x000001BAFDAF0000-0x000001BAFDAF1000-memory.dmp

        Filesize

        4KB

      • memory/3116-18-0x000001BAFDAF0000-0x000001BAFDAF1000-memory.dmp

        Filesize

        4KB

      • memory/3116-23-0x000001BAFDAF0000-0x000001BAFDAF1000-memory.dmp

        Filesize

        4KB

      • memory/3116-13-0x000001BAFDAF0000-0x000001BAFDAF1000-memory.dmp

        Filesize

        4KB

      • memory/3116-24-0x000001BAFDAF0000-0x000001BAFDAF1000-memory.dmp

        Filesize

        4KB

      • memory/4024-4-0x0000000062800000-0x0000000062813000-memory.dmp

        Filesize

        76KB

      • memory/4024-0-0x0000000100400000-0x0000000100446000-memory.dmp

        Filesize

        280KB

      • memory/4024-1-0x00007FFCF76D0000-0x00007FFCF79E2000-memory.dmp

        Filesize

        3.1MB

      • memory/4024-2-0x0000000100400000-0x0000000100446000-memory.dmp

        Filesize

        280KB

      • memory/4024-5-0x00007FFCF76D0000-0x00007FFCF79E2000-memory.dmp

        Filesize

        3.1MB