Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    27/08/2023, 18:13

General

  • Target

    08fe09f46ad8f6a47621d2371fa997a217e9d0ba941361ccb7bb647a45ec4f37.exe

  • Size

    170KB

  • MD5

    e88564b4b8b90025c4a5030c335e9e1d

  • SHA1

    0ec482e5e1ca40c6e67e5791f5330c1fa06d719b

  • SHA256

    08fe09f46ad8f6a47621d2371fa997a217e9d0ba941361ccb7bb647a45ec4f37

  • SHA512

    67e6d34ca75fe0e13bb6cff2f773add5b621f086ec61b41a8729026092c5c61c84ca2b8e0c60b76c1ef1138955f409dab7544a7597a982b587b71a7292f752fa

  • SSDEEP

    3072:DftffjmNwfRoFANgYolUuvJj6YTpxmw8n2jbR0M+dtY4B1PrYsCdS2K:TVfjmNgGFANgYrQJjfTyT2jvChB1zc5K

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1280
      • C:\Users\Admin\AppData\Local\Temp\08fe09f46ad8f6a47621d2371fa997a217e9d0ba941361ccb7bb647a45ec4f37.exe
        "C:\Users\Admin\AppData\Local\Temp\08fe09f46ad8f6a47621d2371fa997a217e9d0ba941361ccb7bb647a45ec4f37.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:2208
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\$$a8575.bat
          3⤵
          • Deletes itself
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:2404
          • C:\Users\Admin\AppData\Local\Temp\08fe09f46ad8f6a47621d2371fa997a217e9d0ba941361ccb7bb647a45ec4f37.exe
            "C:\Users\Admin\AppData\Local\Temp\08fe09f46ad8f6a47621d2371fa997a217e9d0ba941361ccb7bb647a45ec4f37.exe"
            4⤵
            • Executes dropped EXE
            PID:1640
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2424
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2644
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:620

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        251KB

        MD5

        9b0bc8b1993876f0e2827074f00b2bbc

        SHA1

        5ad84492247a9e78bd49b81391cdf66395828c11

        SHA256

        f2abf093d8a85efe8804e03df77ef3f7b7393240449e24ecd2b7ff5a371e64a1

        SHA512

        780b1a15d3caf3ef07b63dc1def60ad024a85695c3a8fa99a2c57c13f005e3273ec9708ac9ae1094ed6efdcbb2eb92414292d081bc58ba7ab55ba6d81304b89a

      • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

        Filesize

        471KB

        MD5

        4cfdb20b04aa239d6f9e83084d5d0a77

        SHA1

        f22863e04cc1fd4435f785993ede165bd8245ac6

        SHA256

        30ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9

        SHA512

        35b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86

      • C:\Users\Admin\AppData\Local\Temp\$$a8575.bat

        Filesize

        722B

        MD5

        0e2a7b58ad448a619d0d0ac62c74ff88

        SHA1

        e5b2e912e182d14791246fcada9a246f818a4bb0

        SHA256

        ed56861ddda5dde09fad50c9709595833dc8bac0a6bbf375dc44efdc051667c0

        SHA512

        f065b3d7e2e02d675629a5b302db34584349022eb6a8ba9a800bee78143451d32e8d4a33e2a2fd3a68f6564154322c0d144ca37ff9b7c59ad470b87177c43a6d

      • C:\Users\Admin\AppData\Local\Temp\$$a8575.bat

        Filesize

        722B

        MD5

        0e2a7b58ad448a619d0d0ac62c74ff88

        SHA1

        e5b2e912e182d14791246fcada9a246f818a4bb0

        SHA256

        ed56861ddda5dde09fad50c9709595833dc8bac0a6bbf375dc44efdc051667c0

        SHA512

        f065b3d7e2e02d675629a5b302db34584349022eb6a8ba9a800bee78143451d32e8d4a33e2a2fd3a68f6564154322c0d144ca37ff9b7c59ad470b87177c43a6d

      • C:\Users\Admin\AppData\Local\Temp\08fe09f46ad8f6a47621d2371fa997a217e9d0ba941361ccb7bb647a45ec4f37.exe

        Filesize

        144KB

        MD5

        8730e7c3de224d3521593dfec6b4af8e

        SHA1

        13d95b1ee77d16135a5bcfc9021128657757dbd5

        SHA256

        e2e08144cf62bac6a7325125abbe3e64452fa2455a5210f5ed9c362f95e4009e

        SHA512

        8f4345da0cc35ed1f04372e216efb0fe2edcdef7d353bb586f3ae8ff92de25bb18e4a03e08465328a3103b649c3b03855835e5eae6b726f983408989cde02cf4

      • C:\Users\Admin\AppData\Local\Temp\08fe09f46ad8f6a47621d2371fa997a217e9d0ba941361ccb7bb647a45ec4f37.exe.exe

        Filesize

        144KB

        MD5

        8730e7c3de224d3521593dfec6b4af8e

        SHA1

        13d95b1ee77d16135a5bcfc9021128657757dbd5

        SHA256

        e2e08144cf62bac6a7325125abbe3e64452fa2455a5210f5ed9c362f95e4009e

        SHA512

        8f4345da0cc35ed1f04372e216efb0fe2edcdef7d353bb586f3ae8ff92de25bb18e4a03e08465328a3103b649c3b03855835e5eae6b726f983408989cde02cf4

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        8ffc219ecd87d53276239ce7e62a7bb9

        SHA1

        5181c0e6bab0852e9f8139df9771ff6f5db64d20

        SHA256

        c5f1c38f3615c99b0bec3e310b9806480a66fa230db4eb216875e20465f4ebe0

        SHA512

        7cc6c938404420ce4175723b1339292ceeabc42728304e720350588c605b84277e64b5e009eea5b0ae56f6cd50534a334b49d2b45b467b598e45699275e6481f

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        8ffc219ecd87d53276239ce7e62a7bb9

        SHA1

        5181c0e6bab0852e9f8139df9771ff6f5db64d20

        SHA256

        c5f1c38f3615c99b0bec3e310b9806480a66fa230db4eb216875e20465f4ebe0

        SHA512

        7cc6c938404420ce4175723b1339292ceeabc42728304e720350588c605b84277e64b5e009eea5b0ae56f6cd50534a334b49d2b45b467b598e45699275e6481f

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        8ffc219ecd87d53276239ce7e62a7bb9

        SHA1

        5181c0e6bab0852e9f8139df9771ff6f5db64d20

        SHA256

        c5f1c38f3615c99b0bec3e310b9806480a66fa230db4eb216875e20465f4ebe0

        SHA512

        7cc6c938404420ce4175723b1339292ceeabc42728304e720350588c605b84277e64b5e009eea5b0ae56f6cd50534a334b49d2b45b467b598e45699275e6481f

      • C:\Windows\rundl132.exe

        Filesize

        26KB

        MD5

        8ffc219ecd87d53276239ce7e62a7bb9

        SHA1

        5181c0e6bab0852e9f8139df9771ff6f5db64d20

        SHA256

        c5f1c38f3615c99b0bec3e310b9806480a66fa230db4eb216875e20465f4ebe0

        SHA512

        7cc6c938404420ce4175723b1339292ceeabc42728304e720350588c605b84277e64b5e009eea5b0ae56f6cd50534a334b49d2b45b467b598e45699275e6481f

      • F:\$RECYCLE.BIN\S-1-5-21-4219371764-2579186923-3390623117-1000\_desktop.ini

        Filesize

        9B

        MD5

        c0232c2f01c543d260713210da47a57b

        SHA1

        63f2c13c2c5c83091133c2802e69993d52e3ec65

        SHA256

        278e1b8fd3f40d95faaecf548098b8d9ee4b32e98a8878559c8c8dfcd5cd1197

        SHA512

        2ccfd67393a63f03f588296bb798d7a7d4ec2ea5d6ac486cb7bdf8a5a66b1df944d8b548f317e58bfe17dea2ae54e536ffe77bc11a43c931f3d10e299ab3fca0

      • \Users\Admin\AppData\Local\Temp\08fe09f46ad8f6a47621d2371fa997a217e9d0ba941361ccb7bb647a45ec4f37.exe

        Filesize

        144KB

        MD5

        8730e7c3de224d3521593dfec6b4af8e

        SHA1

        13d95b1ee77d16135a5bcfc9021128657757dbd5

        SHA256

        e2e08144cf62bac6a7325125abbe3e64452fa2455a5210f5ed9c362f95e4009e

        SHA512

        8f4345da0cc35ed1f04372e216efb0fe2edcdef7d353bb586f3ae8ff92de25bb18e4a03e08465328a3103b649c3b03855835e5eae6b726f983408989cde02cf4

      • memory/1280-29-0x0000000002960000-0x0000000002961000-memory.dmp

        Filesize

        4KB

      • memory/2208-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2208-31-0x0000000000260000-0x0000000000294000-memory.dmp

        Filesize

        208KB

      • memory/2208-15-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2208-17-0x0000000000260000-0x0000000000294000-memory.dmp

        Filesize

        208KB

      • memory/2424-46-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2424-40-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2424-92-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2424-99-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2424-144-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2424-1851-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2424-21-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2424-3311-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2424-32-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB