Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    23/08/2023, 23:36

General

  • Target

    de1ff69ae086eec05daf0ff50a82d1bce005e91e63f9ea574c401554b077c83d.exe

  • Size

    173KB

  • MD5

    592234a2317ba22029bb09420b4690fe

  • SHA1

    e67ef09c5da79da773e1b130d378213d7ebc9385

  • SHA256

    de1ff69ae086eec05daf0ff50a82d1bce005e91e63f9ea574c401554b077c83d

  • SHA512

    cacf9401b49f8d7201a0236cf2961ffbbdf7519e92e9f37b84319c639f27199a810f746d23a004a72469fcee49265097270db4c555ccff24816b49d1d4b37b6a

  • SSDEEP

    3072:XftffjmNfpDBAKMk0gAN4lgOjCFQ2nf6bdtUNhomcN8KPqD:PVfjmNffMPgwIyNSb/Yhow

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 5 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Program crash 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1212
      • C:\Users\Admin\AppData\Local\Temp\de1ff69ae086eec05daf0ff50a82d1bce005e91e63f9ea574c401554b077c83d.exe
        "C:\Users\Admin\AppData\Local\Temp\de1ff69ae086eec05daf0ff50a82d1bce005e91e63f9ea574c401554b077c83d.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:1580
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\$$a7530.bat
          3⤵
          • Deletes itself
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:2464
          • C:\Users\Admin\AppData\Local\Temp\de1ff69ae086eec05daf0ff50a82d1bce005e91e63f9ea574c401554b077c83d.exe
            "C:\Users\Admin\AppData\Local\Temp\de1ff69ae086eec05daf0ff50a82d1bce005e91e63f9ea574c401554b077c83d.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:2720
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2720 -s 36
              5⤵
              • Loads dropped DLL
              • Program crash
              PID:3008
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2644
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2944
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:2004

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        251KB

        MD5

        0d4761cf7636b373c15676e6d9452f06

        SHA1

        7f9e3feb42bf97ec56438631d7cb91b4d0f56524

        SHA256

        77548fa3351e09c7e43805e80b704810cfd2fce393f320ab43c04bea6ac7e0bf

        SHA512

        62d6763a29750cb6e7ee55764699b20e2cd67ced26abbd9ba4b5554906d0dc432c3eb75522e2dee77e5a5d082ff297e21602c22049d0b45104613d1cc7c01e25

      • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

        Filesize

        471KB

        MD5

        4cfdb20b04aa239d6f9e83084d5d0a77

        SHA1

        f22863e04cc1fd4435f785993ede165bd8245ac6

        SHA256

        30ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9

        SHA512

        35b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86

      • C:\Users\Admin\AppData\Local\Temp\$$a7530.bat

        Filesize

        722B

        MD5

        2eb458a3a00ce327d9559817b0e7e75b

        SHA1

        aaebd739224ccf200b7fdfdf0dd4c89ba289498c

        SHA256

        a9ad4c4699a27e75b928bde6edff6eaad7e8275dcf673c8471e6bbeae9d2a9b7

        SHA512

        f46ab8b26088143022ddc18a708a739b8ee54e65ec277c6e17877f3d0ba4f53bbf7a6dbfa05b1808c709846ba415c953b3a2f3d5311bc2cb72cc795f490a843f

      • C:\Users\Admin\AppData\Local\Temp\$$a7530.bat

        Filesize

        722B

        MD5

        2eb458a3a00ce327d9559817b0e7e75b

        SHA1

        aaebd739224ccf200b7fdfdf0dd4c89ba289498c

        SHA256

        a9ad4c4699a27e75b928bde6edff6eaad7e8275dcf673c8471e6bbeae9d2a9b7

        SHA512

        f46ab8b26088143022ddc18a708a739b8ee54e65ec277c6e17877f3d0ba4f53bbf7a6dbfa05b1808c709846ba415c953b3a2f3d5311bc2cb72cc795f490a843f

      • C:\Users\Admin\AppData\Local\Temp\de1ff69ae086eec05daf0ff50a82d1bce005e91e63f9ea574c401554b077c83d.exe

        Filesize

        147KB

        MD5

        147fe284ae058482289c4b5fffc0071a

        SHA1

        06ed8cf0391122509e64add943a0f481899f1119

        SHA256

        10ee7c5e152a6445289aa4a90f2f96aadffb5767ceca2d2a9dfd826da59b549d

        SHA512

        e3efab9ca462e49dd57d3ec9fb1b9e8ba2dce8e0d9313581286b7ecb3c81f74a7c24864435bb7b8e11aa6b6c1eafbc2303dde082e386e4df210ffe581bd991be

      • C:\Users\Admin\AppData\Local\Temp\de1ff69ae086eec05daf0ff50a82d1bce005e91e63f9ea574c401554b077c83d.exe.exe

        Filesize

        147KB

        MD5

        147fe284ae058482289c4b5fffc0071a

        SHA1

        06ed8cf0391122509e64add943a0f481899f1119

        SHA256

        10ee7c5e152a6445289aa4a90f2f96aadffb5767ceca2d2a9dfd826da59b549d

        SHA512

        e3efab9ca462e49dd57d3ec9fb1b9e8ba2dce8e0d9313581286b7ecb3c81f74a7c24864435bb7b8e11aa6b6c1eafbc2303dde082e386e4df210ffe581bd991be

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        08e114b25aeb020094e7dce7eba9e065

        SHA1

        7e8557ad96037d61dfd290b75c28bd9473a33619

        SHA256

        79e1b456ae93204e57403b1622a1f5e60246f0a3fe3e6558a19890a49369ee99

        SHA512

        a2092635e0ae982faf40365b4478ba734e207f37c4dc578fce19d0114f8f552f709b027a150463a12cc321be9aea1b84194aab9ca55ee6afe24c2c23fb80f845

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        08e114b25aeb020094e7dce7eba9e065

        SHA1

        7e8557ad96037d61dfd290b75c28bd9473a33619

        SHA256

        79e1b456ae93204e57403b1622a1f5e60246f0a3fe3e6558a19890a49369ee99

        SHA512

        a2092635e0ae982faf40365b4478ba734e207f37c4dc578fce19d0114f8f552f709b027a150463a12cc321be9aea1b84194aab9ca55ee6afe24c2c23fb80f845

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        08e114b25aeb020094e7dce7eba9e065

        SHA1

        7e8557ad96037d61dfd290b75c28bd9473a33619

        SHA256

        79e1b456ae93204e57403b1622a1f5e60246f0a3fe3e6558a19890a49369ee99

        SHA512

        a2092635e0ae982faf40365b4478ba734e207f37c4dc578fce19d0114f8f552f709b027a150463a12cc321be9aea1b84194aab9ca55ee6afe24c2c23fb80f845

      • C:\Windows\rundl132.exe

        Filesize

        26KB

        MD5

        08e114b25aeb020094e7dce7eba9e065

        SHA1

        7e8557ad96037d61dfd290b75c28bd9473a33619

        SHA256

        79e1b456ae93204e57403b1622a1f5e60246f0a3fe3e6558a19890a49369ee99

        SHA512

        a2092635e0ae982faf40365b4478ba734e207f37c4dc578fce19d0114f8f552f709b027a150463a12cc321be9aea1b84194aab9ca55ee6afe24c2c23fb80f845

      • F:\$RECYCLE.BIN\S-1-5-21-4159544280-4273523227-683900707-1000\_desktop.ini

        Filesize

        9B

        MD5

        4a4922bdf377baedb0460540a7e52405

        SHA1

        82789c7c3ee038da34ac62e38ddde0fe667d52ac

        SHA256

        589848447b17adf03dfa9db6e17b5ec00d1fabf203fa496bae29ed64764a052f

        SHA512

        fe635f97709f5f3df9290c6c53a374351481f13aa45105f48fe3709c15532313eb4d032eed20f2a278b9837c84bba9ba7a7fa2d83cd2a1e3adc0bc930d40c2a1

      • \Users\Admin\AppData\Local\Temp\de1ff69ae086eec05daf0ff50a82d1bce005e91e63f9ea574c401554b077c83d.exe

        Filesize

        147KB

        MD5

        147fe284ae058482289c4b5fffc0071a

        SHA1

        06ed8cf0391122509e64add943a0f481899f1119

        SHA256

        10ee7c5e152a6445289aa4a90f2f96aadffb5767ceca2d2a9dfd826da59b549d

        SHA512

        e3efab9ca462e49dd57d3ec9fb1b9e8ba2dce8e0d9313581286b7ecb3c81f74a7c24864435bb7b8e11aa6b6c1eafbc2303dde082e386e4df210ffe581bd991be

      • \Users\Admin\AppData\Local\Temp\de1ff69ae086eec05daf0ff50a82d1bce005e91e63f9ea574c401554b077c83d.exe

        Filesize

        147KB

        MD5

        147fe284ae058482289c4b5fffc0071a

        SHA1

        06ed8cf0391122509e64add943a0f481899f1119

        SHA256

        10ee7c5e152a6445289aa4a90f2f96aadffb5767ceca2d2a9dfd826da59b549d

        SHA512

        e3efab9ca462e49dd57d3ec9fb1b9e8ba2dce8e0d9313581286b7ecb3c81f74a7c24864435bb7b8e11aa6b6c1eafbc2303dde082e386e4df210ffe581bd991be

      • \Users\Admin\AppData\Local\Temp\de1ff69ae086eec05daf0ff50a82d1bce005e91e63f9ea574c401554b077c83d.exe

        Filesize

        147KB

        MD5

        147fe284ae058482289c4b5fffc0071a

        SHA1

        06ed8cf0391122509e64add943a0f481899f1119

        SHA256

        10ee7c5e152a6445289aa4a90f2f96aadffb5767ceca2d2a9dfd826da59b549d

        SHA512

        e3efab9ca462e49dd57d3ec9fb1b9e8ba2dce8e0d9313581286b7ecb3c81f74a7c24864435bb7b8e11aa6b6c1eafbc2303dde082e386e4df210ffe581bd991be

      • \Users\Admin\AppData\Local\Temp\de1ff69ae086eec05daf0ff50a82d1bce005e91e63f9ea574c401554b077c83d.exe

        Filesize

        147KB

        MD5

        147fe284ae058482289c4b5fffc0071a

        SHA1

        06ed8cf0391122509e64add943a0f481899f1119

        SHA256

        10ee7c5e152a6445289aa4a90f2f96aadffb5767ceca2d2a9dfd826da59b549d

        SHA512

        e3efab9ca462e49dd57d3ec9fb1b9e8ba2dce8e0d9313581286b7ecb3c81f74a7c24864435bb7b8e11aa6b6c1eafbc2303dde082e386e4df210ffe581bd991be

      • \Users\Admin\AppData\Local\Temp\de1ff69ae086eec05daf0ff50a82d1bce005e91e63f9ea574c401554b077c83d.exe

        Filesize

        147KB

        MD5

        147fe284ae058482289c4b5fffc0071a

        SHA1

        06ed8cf0391122509e64add943a0f481899f1119

        SHA256

        10ee7c5e152a6445289aa4a90f2f96aadffb5767ceca2d2a9dfd826da59b549d

        SHA512

        e3efab9ca462e49dd57d3ec9fb1b9e8ba2dce8e0d9313581286b7ecb3c81f74a7c24864435bb7b8e11aa6b6c1eafbc2303dde082e386e4df210ffe581bd991be

      • memory/1212-35-0x0000000002A20000-0x0000000002A21000-memory.dmp

        Filesize

        4KB

      • memory/1580-15-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1580-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1580-18-0x0000000000250000-0x0000000000284000-memory.dmp

        Filesize

        208KB

      • memory/1580-37-0x0000000000250000-0x0000000000284000-memory.dmp

        Filesize

        208KB

      • memory/1580-16-0x0000000000250000-0x0000000000284000-memory.dmp

        Filesize

        208KB

      • memory/2464-28-0x0000000000170000-0x00000000001C0000-memory.dmp

        Filesize

        320KB

      • memory/2644-52-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2644-46-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2644-99-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2644-104-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2644-254-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2644-1858-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2644-38-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2644-3318-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2644-22-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2720-105-0x0000000000400000-0x0000000000450000-memory.dmp

        Filesize

        320KB