Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/08/2023, 06:36

General

  • Target

    fe55e3261d2c91f7f435e663f755f04e8304f88d8aff1bbcba885acf340c2b91.exe

  • Size

    386KB

  • MD5

    f3ab5a6e6110090d3390424eb4170e37

  • SHA1

    7d6ae8d932971c16ee63037bc5ff18a521877694

  • SHA256

    fe55e3261d2c91f7f435e663f755f04e8304f88d8aff1bbcba885acf340c2b91

  • SHA512

    38069cba860a9d42707232bcfba5505be929de72da3086c54ae58b8209be025447a862a798352dcfd022299c304f02bb38b329dd02e6e553d525b909db57a40c

  • SSDEEP

    6144:LmVfjmNG4WATf7l+psskdSMLLSATCNxFx3TQqNLq3:LI7+GITfgps/dSsLTCNxgWLq3

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3180
      • C:\Users\Admin\AppData\Local\Temp\fe55e3261d2c91f7f435e663f755f04e8304f88d8aff1bbcba885acf340c2b91.exe
        "C:\Users\Admin\AppData\Local\Temp\fe55e3261d2c91f7f435e663f755f04e8304f88d8aff1bbcba885acf340c2b91.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:2224
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a6F92.bat
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1672
          • C:\Users\Admin\AppData\Local\Temp\fe55e3261d2c91f7f435e663f755f04e8304f88d8aff1bbcba885acf340c2b91.exe
            "C:\Users\Admin\AppData\Local\Temp\fe55e3261d2c91f7f435e663f755f04e8304f88d8aff1bbcba885acf340c2b91.exe"
            4⤵
            • Executes dropped EXE
            PID:3644
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:4064
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:1756
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:1940

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        251KB

        MD5

        8ff02549f40904b60daba7b19439ba9f

        SHA1

        88c247f89555e14b084c3f292bda1d0162eaf427

        SHA256

        b6217ec4646499eec8098afdcc3d72f4d99d77db4967c168244ad56dee3e8ed1

        SHA512

        26c2c70a63de889b54963b8e875df361809dd565fbf9dd2531b8734c77ceffb2e551fc82b10991040aad91eb960e47f3b902ecdb98a2469d2a1a235e2933a493

      • C:\Program Files\7-Zip\7z.exe

        Filesize

        484KB

        MD5

        bb1ee0dd43a8a54d4906ed7432e8cab6

        SHA1

        8682815bfaec5350aa1791c5173ec9b921e7e398

        SHA256

        43d6d4233ef0c1519562e9baed9bab147fcffe4cea1d1131dabb0e3fc90c8d6e

        SHA512

        3a96b0800ff56fd22d56023ad1713c96faf2e3ef7f9b40947a839fc2a502a8a49bbc6b6a7e268b5540211e0b1d3afb56a24fb2bf4edec9a986db74a8ffb3124f

      • C:\Users\Admin\AppData\Local\Temp\$$a6F92.bat

        Filesize

        722B

        MD5

        0b131e4ce8f7d6c0f273716650dea49b

        SHA1

        ae64d6c9cf0c3ceb5b3847e07d61a0df81af745a

        SHA256

        3b6a8f151cc6ccc662d1cd2f35a1af1d9f4601c6a1de04b63ca5a599cb94282d

        SHA512

        6e639f0a5442fc3215352bba25611d7bfb1bd46063f1b76e48f6e569ebf5bb2266a4f807c0d5321cec7ee32b7ffd413690a510fd19f010b4c010286857e677e5

      • C:\Users\Admin\AppData\Local\Temp\fe55e3261d2c91f7f435e663f755f04e8304f88d8aff1bbcba885acf340c2b91.exe

        Filesize

        359KB

        MD5

        92384ca177708e57273cd9af9c21057e

        SHA1

        5c9372e1f7d897fc8db89bd75aefab185dc235bc

        SHA256

        c327cb79f271dfbf4502bf20f23fecb5332100762bb8a21cf20f4e2ef1012e27

        SHA512

        f0f968fde21e399079112402237fb16306fab98afeba88320f3e15d140477a0762e731f23591ea91f103f3b4e89876d510a3669e1b5c405b7dd777174fa12c9d

      • C:\Users\Admin\AppData\Local\Temp\fe55e3261d2c91f7f435e663f755f04e8304f88d8aff1bbcba885acf340c2b91.exe.exe

        Filesize

        359KB

        MD5

        92384ca177708e57273cd9af9c21057e

        SHA1

        5c9372e1f7d897fc8db89bd75aefab185dc235bc

        SHA256

        c327cb79f271dfbf4502bf20f23fecb5332100762bb8a21cf20f4e2ef1012e27

        SHA512

        f0f968fde21e399079112402237fb16306fab98afeba88320f3e15d140477a0762e731f23591ea91f103f3b4e89876d510a3669e1b5c405b7dd777174fa12c9d

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        f550472f192027ed00d127f1ae855190

        SHA1

        b11ed82a41a4ef6f4158aa2c99e2fa7e337b8acd

        SHA256

        9f90ca94aa8c53c02813c7d118ab884cafb7f25cf0e85d3e672d704b91c80adf

        SHA512

        a137c2d20f1727d9ee1412f0855cc9356e01cea016b3fba9891f82cc1f14982f67a0eab168d6db5bc8f7667679e7459abe7dc7fb19a4fb8c044f55e0842ed446

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        f550472f192027ed00d127f1ae855190

        SHA1

        b11ed82a41a4ef6f4158aa2c99e2fa7e337b8acd

        SHA256

        9f90ca94aa8c53c02813c7d118ab884cafb7f25cf0e85d3e672d704b91c80adf

        SHA512

        a137c2d20f1727d9ee1412f0855cc9356e01cea016b3fba9891f82cc1f14982f67a0eab168d6db5bc8f7667679e7459abe7dc7fb19a4fb8c044f55e0842ed446

      • C:\Windows\rundl132.exe

        Filesize

        26KB

        MD5

        f550472f192027ed00d127f1ae855190

        SHA1

        b11ed82a41a4ef6f4158aa2c99e2fa7e337b8acd

        SHA256

        9f90ca94aa8c53c02813c7d118ab884cafb7f25cf0e85d3e672d704b91c80adf

        SHA512

        a137c2d20f1727d9ee1412f0855cc9356e01cea016b3fba9891f82cc1f14982f67a0eab168d6db5bc8f7667679e7459abe7dc7fb19a4fb8c044f55e0842ed446

      • F:\$RECYCLE.BIN\S-1-5-21-3011986978-2180659500-3669311805-1000\_desktop.ini

        Filesize

        9B

        MD5

        ec7139d5bb99bcebaf0b91c58a9ec5aa

        SHA1

        70404362dd74e309722fd282c3492ec95674123c

        SHA256

        eb17ae1b1de9e95e0d159893048f2de5c1c158467e768cc0ddbaa517c45e0582

        SHA512

        b0114d8f74b17836819b750cff2b590b652e04bb2dc0e9dc8bffac7ed66bd9ded03cd35abc7fc0fcd0127a994c283dcd162e97e6dd76f5a903ff59e4951dfc48

      • memory/2224-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2224-9-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3644-22-0x0000000075850000-0x0000000075A65000-memory.dmp

        Filesize

        2.1MB

      • memory/3644-20-0x000000006FFF0000-0x0000000070000000-memory.dmp

        Filesize

        64KB

      • memory/3644-19-0x000000006FFF0000-0x0000000070000000-memory.dmp

        Filesize

        64KB

      • memory/3644-18-0x000000006FFF0000-0x0000000070000000-memory.dmp

        Filesize

        64KB

      • memory/4064-24-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4064-31-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4064-37-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4064-42-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4064-46-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4064-442-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4064-1283-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4064-8-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4064-4835-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB