Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    28/08/2023, 05:27

General

  • Target

    64fdee75d70c4ed9a77eb83a73ce58c108fcd296bc744a4a6a64be2416fe3786.exe

  • Size

    707KB

  • MD5

    b824283f13c3297d0540999934f2c0f4

  • SHA1

    e066816c5669489508ba8e165a17b697ba369ece

  • SHA256

    64fdee75d70c4ed9a77eb83a73ce58c108fcd296bc744a4a6a64be2416fe3786

  • SHA512

    0ef6a95e8ed099405f7bf52f36b19889f696a8d894076b092575cdcb98b56253aa0cf3bde6e77dca1b2281a1d54b67105a15ec956a645a7edc8f3f3e7750f50a

  • SSDEEP

    12288:FQ7+1SSnUKJwwgOBReMmc/VDznbvEownBuANaso1p7dZnuKYk0XLR:+7qSSnXRRwn4ANass5ZnurLR

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1280
      • C:\Users\Admin\AppData\Local\Temp\64fdee75d70c4ed9a77eb83a73ce58c108fcd296bc744a4a6a64be2416fe3786.exe
        "C:\Users\Admin\AppData\Local\Temp\64fdee75d70c4ed9a77eb83a73ce58c108fcd296bc744a4a6a64be2416fe3786.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:2364
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\$$a78C8.bat
          3⤵
          • Deletes itself
          • Loads dropped DLL
          PID:2276
          • C:\Users\Admin\AppData\Local\Temp\64fdee75d70c4ed9a77eb83a73ce58c108fcd296bc744a4a6a64be2416fe3786.exe
            "C:\Users\Admin\AppData\Local\Temp\64fdee75d70c4ed9a77eb83a73ce58c108fcd296bc744a4a6a64be2416fe3786.exe"
            4⤵
            • Executes dropped EXE
            PID:2812
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2428
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2384
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:2896

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        251KB

        MD5

        ce3ab54a1686671e1aa06ba0f186d4a6

        SHA1

        751203632351b005366309b86eb6c49fc4427cee

        SHA256

        b5f7b6a45f9e459d340e27aa043cad6305a188674c545a51c237d46470d3744e

        SHA512

        78986f2c05066685ab33c7188c0bff6528d9eb0ab84adaedf2dc45aeb617f853be1a5294494cebbe7e0b8ce2b69c9923d650fb0797d5d3b0c45c068df2e9a60c

      • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

        Filesize

        471KB

        MD5

        4cfdb20b04aa239d6f9e83084d5d0a77

        SHA1

        f22863e04cc1fd4435f785993ede165bd8245ac6

        SHA256

        30ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9

        SHA512

        35b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86

      • C:\Users\Admin\AppData\Local\Temp\$$a78C8.bat

        Filesize

        722B

        MD5

        c955be67c1b2ba24f9a6d144fb6c38f5

        SHA1

        5fa7776012d95c33006908c59839c656a8c48572

        SHA256

        90c8146d4b9d797e264194666d9f7d18dbee8aec94c7ba8dfb67f9be3630992c

        SHA512

        d0907bf0f4511b8af8d25704f07148c5de2c213e8c1df5a9d78f6d95d57c8644a966573a60a27df917221f661df82e8a3ebcc815312836956188b11a35f694ee

      • C:\Users\Admin\AppData\Local\Temp\$$a78C8.bat

        Filesize

        722B

        MD5

        c955be67c1b2ba24f9a6d144fb6c38f5

        SHA1

        5fa7776012d95c33006908c59839c656a8c48572

        SHA256

        90c8146d4b9d797e264194666d9f7d18dbee8aec94c7ba8dfb67f9be3630992c

        SHA512

        d0907bf0f4511b8af8d25704f07148c5de2c213e8c1df5a9d78f6d95d57c8644a966573a60a27df917221f661df82e8a3ebcc815312836956188b11a35f694ee

      • C:\Users\Admin\AppData\Local\Temp\64fdee75d70c4ed9a77eb83a73ce58c108fcd296bc744a4a6a64be2416fe3786.exe

        Filesize

        681KB

        MD5

        788896b8239adef16e61f4a25ef16705

        SHA1

        47e3a8bdca551bacd4c1cad147c1080a7f45e799

        SHA256

        2be6fff4f0aca183206af72e9e1fb968f0bcad89bd9fa6f4780f68f04d80b609

        SHA512

        3f660a2a1c09cd15e8297fe35e4bfec3308213eec3c8f9626e09ec1c8f1d5b2a21a7c9bebd465a2e593667819a003ade836b375a2c520c40ddea61160192ff2c

      • C:\Users\Admin\AppData\Local\Temp\64fdee75d70c4ed9a77eb83a73ce58c108fcd296bc744a4a6a64be2416fe3786.exe.exe

        Filesize

        681KB

        MD5

        788896b8239adef16e61f4a25ef16705

        SHA1

        47e3a8bdca551bacd4c1cad147c1080a7f45e799

        SHA256

        2be6fff4f0aca183206af72e9e1fb968f0bcad89bd9fa6f4780f68f04d80b609

        SHA512

        3f660a2a1c09cd15e8297fe35e4bfec3308213eec3c8f9626e09ec1c8f1d5b2a21a7c9bebd465a2e593667819a003ade836b375a2c520c40ddea61160192ff2c

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        8fe367821d93d8adceae7279c322e47d

        SHA1

        973e03b35086d7450aa872d95ec307429460b8cb

        SHA256

        0100e6f69544ca0befe8a154ef093401a92b6fec6a192414a8b8216ab905924a

        SHA512

        55ea574ec91cf9a24f0dcab54097918adb93f053ae21045f4dd62c3b618207a3fecc22755266f163866d2191e59caf896fcb933fd4dd0646233a662a70c9c442

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        8fe367821d93d8adceae7279c322e47d

        SHA1

        973e03b35086d7450aa872d95ec307429460b8cb

        SHA256

        0100e6f69544ca0befe8a154ef093401a92b6fec6a192414a8b8216ab905924a

        SHA512

        55ea574ec91cf9a24f0dcab54097918adb93f053ae21045f4dd62c3b618207a3fecc22755266f163866d2191e59caf896fcb933fd4dd0646233a662a70c9c442

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        8fe367821d93d8adceae7279c322e47d

        SHA1

        973e03b35086d7450aa872d95ec307429460b8cb

        SHA256

        0100e6f69544ca0befe8a154ef093401a92b6fec6a192414a8b8216ab905924a

        SHA512

        55ea574ec91cf9a24f0dcab54097918adb93f053ae21045f4dd62c3b618207a3fecc22755266f163866d2191e59caf896fcb933fd4dd0646233a662a70c9c442

      • C:\Windows\rundl132.exe

        Filesize

        26KB

        MD5

        8fe367821d93d8adceae7279c322e47d

        SHA1

        973e03b35086d7450aa872d95ec307429460b8cb

        SHA256

        0100e6f69544ca0befe8a154ef093401a92b6fec6a192414a8b8216ab905924a

        SHA512

        55ea574ec91cf9a24f0dcab54097918adb93f053ae21045f4dd62c3b618207a3fecc22755266f163866d2191e59caf896fcb933fd4dd0646233a662a70c9c442

      • F:\$RECYCLE.BIN\S-1-5-21-2969888527-3102471180-2307688834-1000\_desktop.ini

        Filesize

        9B

        MD5

        ec7139d5bb99bcebaf0b91c58a9ec5aa

        SHA1

        70404362dd74e309722fd282c3492ec95674123c

        SHA256

        eb17ae1b1de9e95e0d159893048f2de5c1c158467e768cc0ddbaa517c45e0582

        SHA512

        b0114d8f74b17836819b750cff2b590b652e04bb2dc0e9dc8bffac7ed66bd9ded03cd35abc7fc0fcd0127a994c283dcd162e97e6dd76f5a903ff59e4951dfc48

      • \Users\Admin\AppData\Local\Temp\64fdee75d70c4ed9a77eb83a73ce58c108fcd296bc744a4a6a64be2416fe3786.exe

        Filesize

        681KB

        MD5

        788896b8239adef16e61f4a25ef16705

        SHA1

        47e3a8bdca551bacd4c1cad147c1080a7f45e799

        SHA256

        2be6fff4f0aca183206af72e9e1fb968f0bcad89bd9fa6f4780f68f04d80b609

        SHA512

        3f660a2a1c09cd15e8297fe35e4bfec3308213eec3c8f9626e09ec1c8f1d5b2a21a7c9bebd465a2e593667819a003ade836b375a2c520c40ddea61160192ff2c

      • memory/1280-30-0x0000000002C10000-0x0000000002C11000-memory.dmp

        Filesize

        4KB

      • memory/2364-16-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2364-12-0x0000000000440000-0x0000000000474000-memory.dmp

        Filesize

        208KB

      • memory/2364-34-0x0000000000440000-0x0000000000474000-memory.dmp

        Filesize

        208KB

      • memory/2364-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2364-17-0x0000000000440000-0x0000000000474000-memory.dmp

        Filesize

        208KB

      • memory/2428-94-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2428-48-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2428-22-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2428-96-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2428-101-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2428-223-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2428-1853-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2428-42-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2428-3313-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2428-35-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB