Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/08/2023, 03:58

General

  • Target

    16197c782fd800bed43b302000fe3f8a9e4f500bcbe5ecc83d63c396261bcc8f.exe

  • Size

    41KB

  • MD5

    4626379585dea573d8474c80c39d824b

  • SHA1

    6d35c00056b582d724da219e13f43757f4b6e899

  • SHA256

    16197c782fd800bed43b302000fe3f8a9e4f500bcbe5ecc83d63c396261bcc8f

  • SHA512

    3ed9f01a2558ecdb47cf1b38b9ca3693e6e14c0b78f21b848b98e05b71ad3f25f64255acb8c3c6476edf7c7e1f00add0c0c6d295cf72c11ea63efcef7850cbb6

  • SSDEEP

    768:pJq16GVRu1yK9fMnJG2V9dHS8HI64LMP1wy:pJM3SHuJV9NUtLMP1wy

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3228
      • C:\Users\Admin\AppData\Local\Temp\16197c782fd800bed43b302000fe3f8a9e4f500bcbe5ecc83d63c396261bcc8f.exe
        "C:\Users\Admin\AppData\Local\Temp\16197c782fd800bed43b302000fe3f8a9e4f500bcbe5ecc83d63c396261bcc8f.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:4084
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a6B1E.bat
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3692
          • C:\Users\Admin\AppData\Local\Temp\16197c782fd800bed43b302000fe3f8a9e4f500bcbe5ecc83d63c396261bcc8f.exe
            "C:\Users\Admin\AppData\Local\Temp\16197c782fd800bed43b302000fe3f8a9e4f500bcbe5ecc83d63c396261bcc8f.exe"
            4⤵
            • Executes dropped EXE
            PID:3004
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1556
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:4752
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:1116

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        254KB

        MD5

        fc5abdf84041898d0611e82ddfaa681b

        SHA1

        67b2b2a3c516aa82e687958db8799fce47b4aea2

        SHA256

        69d8a39499c612c4083459232412b68bb4c0edd4382c85ec2568318acf16db1e

        SHA512

        5bae9da9c8096b81b4c3049cd87b0ed0dee318a4b1ef81f60b081e898b6e38b1f74e61533d54c01de17974888583a7105ebeff6bb1cb54b8db89dacf45e78059

      • C:\Program Files\7-Zip\7z.exe

        Filesize

        487KB

        MD5

        0f1595b6fc556bdd2110c22655cc1442

        SHA1

        0e26079fedf000158e9aea69a672ed091ce7b474

        SHA256

        f014da38ac56c8da2ec98f1cbd38d1db7863836872c0e5140971540ff4612644

        SHA512

        3683d65316c08c1197a57f7df07c54a7f41e45e79c866eb7efc999793536e858cf91a35768f20dbc6f92362b5cc75c7926887e4422089f8c28eeef31a06d42b9

      • C:\Users\Admin\AppData\Local\Temp\$$a6B1E.bat

        Filesize

        722B

        MD5

        3021095ad4a8de5a5e70336e468a569e

        SHA1

        e907c5eb041b81f8148ba2afdf5effb47097c4e3

        SHA256

        8001b45a7aa95aab1b767384124ce73c2f7af7379950a77c48e89bd7bf94d92f

        SHA512

        d3ab4bad40b6f274857834edb826536597b4088d672f73e2af0ad879f42dbc540e4f5b87f89d55d51bc31c8fcd64adb9fb2adc55bdb893138faee011bd1fd4b4

      • C:\Users\Admin\AppData\Local\Temp\16197c782fd800bed43b302000fe3f8a9e4f500bcbe5ecc83d63c396261bcc8f.exe

        Filesize

        12KB

        MD5

        e3484945f925f2100f56440166ace7ff

        SHA1

        0fd86b8f1e0f1e70ad1cda6ad16b4f7e8448e390

        SHA256

        9f53f8fc797015e9b5ae35c802c879ce7d45ca78c364d12a99b8d9167056dee9

        SHA512

        99bbe843ab970f2fc9b210c207d0e83711033c200f369be7f5fb20c97003710baa56daf206e2e4356d820ad8a49d58b97d8c1c2882ac34a399376d2cdb4c63a5

      • C:\Users\Admin\AppData\Local\Temp\16197c782fd800bed43b302000fe3f8a9e4f500bcbe5ecc83d63c396261bcc8f.exe.exe

        Filesize

        12KB

        MD5

        e3484945f925f2100f56440166ace7ff

        SHA1

        0fd86b8f1e0f1e70ad1cda6ad16b4f7e8448e390

        SHA256

        9f53f8fc797015e9b5ae35c802c879ce7d45ca78c364d12a99b8d9167056dee9

        SHA512

        99bbe843ab970f2fc9b210c207d0e83711033c200f369be7f5fb20c97003710baa56daf206e2e4356d820ad8a49d58b97d8c1c2882ac34a399376d2cdb4c63a5

      • C:\Windows\Logo1_.exe

        Filesize

        29KB

        MD5

        780759899c3b5324b5ee62b0d656f11a

        SHA1

        6e46823a92632b76dbe47f14553f631c391d00b9

        SHA256

        5c9a1e2526783e8a167c7bbcb2c57d459ca3640de6598dc7ad92934e1bfb1084

        SHA512

        041828e5fa86c07058869726160e95f8c630599fd3ebb3754a02e423d225339e2b533c3c10e00e1382503190a53aa127168314c1a4fe50736e7071437e7cc636

      • C:\Windows\Logo1_.exe

        Filesize

        29KB

        MD5

        780759899c3b5324b5ee62b0d656f11a

        SHA1

        6e46823a92632b76dbe47f14553f631c391d00b9

        SHA256

        5c9a1e2526783e8a167c7bbcb2c57d459ca3640de6598dc7ad92934e1bfb1084

        SHA512

        041828e5fa86c07058869726160e95f8c630599fd3ebb3754a02e423d225339e2b533c3c10e00e1382503190a53aa127168314c1a4fe50736e7071437e7cc636

      • C:\Windows\rundl132.exe

        Filesize

        29KB

        MD5

        780759899c3b5324b5ee62b0d656f11a

        SHA1

        6e46823a92632b76dbe47f14553f631c391d00b9

        SHA256

        5c9a1e2526783e8a167c7bbcb2c57d459ca3640de6598dc7ad92934e1bfb1084

        SHA512

        041828e5fa86c07058869726160e95f8c630599fd3ebb3754a02e423d225339e2b533c3c10e00e1382503190a53aa127168314c1a4fe50736e7071437e7cc636

      • F:\$RECYCLE.BIN\S-1-5-21-1043950675-1972537973-2972532878-1000\_desktop.ini

        Filesize

        9B

        MD5

        ec7139d5bb99bcebaf0b91c58a9ec5aa

        SHA1

        70404362dd74e309722fd282c3492ec95674123c

        SHA256

        eb17ae1b1de9e95e0d159893048f2de5c1c158467e768cc0ddbaa517c45e0582

        SHA512

        b0114d8f74b17836819b750cff2b590b652e04bb2dc0e9dc8bffac7ed66bd9ded03cd35abc7fc0fcd0127a994c283dcd162e97e6dd76f5a903ff59e4951dfc48

      • memory/1556-49-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/1556-38-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/1556-4832-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/1556-3913-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/1556-1290-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/1556-214-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/1556-8-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/1556-53-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/1556-27-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/1556-42-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/3004-24-0x000000001B260000-0x000000001B268000-memory.dmp

        Filesize

        32KB

      • memory/3004-31-0x0000000000A90000-0x0000000000AA0000-memory.dmp

        Filesize

        64KB

      • memory/3004-18-0x0000000000310000-0x000000000031A000-memory.dmp

        Filesize

        40KB

      • memory/3004-30-0x0000000000A90000-0x0000000000AA0000-memory.dmp

        Filesize

        64KB

      • memory/3004-28-0x00007FFB54200000-0x00007FFB54BA1000-memory.dmp

        Filesize

        9.6MB

      • memory/3004-26-0x0000000000A90000-0x0000000000AA0000-memory.dmp

        Filesize

        64KB

      • memory/3004-19-0x00007FFB54200000-0x00007FFB54BA1000-memory.dmp

        Filesize

        9.6MB

      • memory/3004-23-0x000000001B1C0000-0x000000001B25C000-memory.dmp

        Filesize

        624KB

      • memory/3004-22-0x000000001B750000-0x000000001BC1E000-memory.dmp

        Filesize

        4.8MB

      • memory/3004-21-0x0000000000A90000-0x0000000000AA0000-memory.dmp

        Filesize

        64KB

      • memory/3004-20-0x00007FFB54200000-0x00007FFB54BA1000-memory.dmp

        Filesize

        9.6MB

      • memory/4084-0-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/4084-9-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB