Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    29/09/2023, 23:23

General

  • Target

    7e62fabd24864f6e937e3f4eb7b0d584eab1c7a1fea79074ae458d9d838a6edc.exe

  • Size

    1.8MB

  • MD5

    aeec9d4e8e49b8c3cbd8ec691e0c071c

  • SHA1

    e24dfe791a6d0f988c76e1bdda149abde418fd6f

  • SHA256

    7e62fabd24864f6e937e3f4eb7b0d584eab1c7a1fea79074ae458d9d838a6edc

  • SHA512

    858280134baefb8a8076c966f665145573efc7a9c620a4e33725bd80217b396f4dfc57ed485224e96327ee4729e88a66a269c9df611023c42095ead833d42c5c

  • SSDEEP

    49152:07DYbVtugvKlSA+n32pWx43UxThfAToZqScjc3tu:O+rvgz+n32kCUxTRog

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 19 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1248
      • C:\Users\Admin\AppData\Local\Temp\7e62fabd24864f6e937e3f4eb7b0d584eab1c7a1fea79074ae458d9d838a6edc.exe
        "C:\Users\Admin\AppData\Local\Temp\7e62fabd24864f6e937e3f4eb7b0d584eab1c7a1fea79074ae458d9d838a6edc.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:2104
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\$$a3D00.bat
          3⤵
          • Deletes itself
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:3052
          • C:\Users\Admin\AppData\Local\Temp\7e62fabd24864f6e937e3f4eb7b0d584eab1c7a1fea79074ae458d9d838a6edc.exe
            "C:\Users\Admin\AppData\Local\Temp\7e62fabd24864f6e937e3f4eb7b0d584eab1c7a1fea79074ae458d9d838a6edc.exe"
            4⤵
            • Executes dropped EXE
            • Checks whether UAC is enabled
            • Writes to the Master Boot Record (MBR)
            • Modifies Internet Explorer settings
            • Suspicious behavior: EnumeratesProcesses
            PID:2624
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2296
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2728
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:2504

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        251KB

        MD5

        b74b60e3f66b89f3de5bd1e6c4d7ea88

        SHA1

        bc382ca48ac7d8801e8174355a72b010487d44e8

        SHA256

        23a2c358c164ab0ff7d5911a11da02e8517a30661df5a693643ee7666ff6d663

        SHA512

        d0065301ae7248b85aef84c9b061edbf04df0543d9ae3d352563aa9a245d3ef0d4063718a8c54fae48dd48429e691f64fa88264cf6d35544a647b14c6be45f8a

      • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

        Filesize

        471KB

        MD5

        99ea9b604a7a734d3087fa6159684c42

        SHA1

        709fa1068ad4d560fe03e05b68056f1b0bedbfc8

        SHA256

        3f733f9e6fec7c4165ca8ba41eb23f604a248babe794c4ad2c6c3ce8032aab1c

        SHA512

        7af8008c7e187f925c62efc97e1891a7a38d089302dba39fbde137fb895e0592847ed0982c824c2075be8e6b95b6ce165ecb848ab85adf53779ebef613410fbb

      • C:\Users\Admin\AppData\Local\Temp\$$a3D00.bat

        Filesize

        722B

        MD5

        381f5261d206cd9c0eaa9f1cf2cf66b1

        SHA1

        29e451cab4c38929f00e102a293e3b843901f1ac

        SHA256

        34bcc4124d1549034be79e065e2a1a6882614ab1b4733fa883c51b755caa93e8

        SHA512

        d89c2e4a3c378d21f832d7c69288ce1cd76a1efce06ad6889a26de7f60599fc37a7d5d76f48e0d26e8a8e2893351a51ed452620786eca3bab636463417d4cb03

      • C:\Users\Admin\AppData\Local\Temp\$$a3D00.bat

        Filesize

        722B

        MD5

        381f5261d206cd9c0eaa9f1cf2cf66b1

        SHA1

        29e451cab4c38929f00e102a293e3b843901f1ac

        SHA256

        34bcc4124d1549034be79e065e2a1a6882614ab1b4733fa883c51b755caa93e8

        SHA512

        d89c2e4a3c378d21f832d7c69288ce1cd76a1efce06ad6889a26de7f60599fc37a7d5d76f48e0d26e8a8e2893351a51ed452620786eca3bab636463417d4cb03

      • C:\Users\Admin\AppData\Local\Temp\7e62fabd24864f6e937e3f4eb7b0d584eab1c7a1fea79074ae458d9d838a6edc.exe

        Filesize

        1.8MB

        MD5

        8f6a1effaab5bc3aa41a210fbe858148

        SHA1

        daab0e4852dfeb944d5fa13f5a9039880c9023f9

        SHA256

        ce537a333ddb3271a3bc68b9f1cd1d22808c0808eac1fe4225c9ad95e771c7e5

        SHA512

        bbe79b942937cf19a76ee5b320bf46e33323e09d587dc42066131ab83ad4da86181725560dd919c9316e67e34fded1f472a43235f99c4e3d3e1b780f4d5263b1

      • C:\Users\Admin\AppData\Local\Temp\7e62fabd24864f6e937e3f4eb7b0d584eab1c7a1fea79074ae458d9d838a6edc.exe.exe

        Filesize

        1.8MB

        MD5

        8f6a1effaab5bc3aa41a210fbe858148

        SHA1

        daab0e4852dfeb944d5fa13f5a9039880c9023f9

        SHA256

        ce537a333ddb3271a3bc68b9f1cd1d22808c0808eac1fe4225c9ad95e771c7e5

        SHA512

        bbe79b942937cf19a76ee5b320bf46e33323e09d587dc42066131ab83ad4da86181725560dd919c9316e67e34fded1f472a43235f99c4e3d3e1b780f4d5263b1

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        c438cd45dba79de60cfe6dedf51add8b

        SHA1

        9a84bde939cfeae643e96ce34a3bceee2e9f640e

        SHA256

        2d8f4cf4e9edb7b563432e0974e2de11b776c274739521674577c9242e509f9c

        SHA512

        7f28a39c22247d5ff2c14f02c415defa68f960b7448f87ca8c50ea2ca0f41454c313b57e76505f24ac5430da4f2afd487b3e32c10841fea01c86c5816a4f997c

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        c438cd45dba79de60cfe6dedf51add8b

        SHA1

        9a84bde939cfeae643e96ce34a3bceee2e9f640e

        SHA256

        2d8f4cf4e9edb7b563432e0974e2de11b776c274739521674577c9242e509f9c

        SHA512

        7f28a39c22247d5ff2c14f02c415defa68f960b7448f87ca8c50ea2ca0f41454c313b57e76505f24ac5430da4f2afd487b3e32c10841fea01c86c5816a4f997c

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        c438cd45dba79de60cfe6dedf51add8b

        SHA1

        9a84bde939cfeae643e96ce34a3bceee2e9f640e

        SHA256

        2d8f4cf4e9edb7b563432e0974e2de11b776c274739521674577c9242e509f9c

        SHA512

        7f28a39c22247d5ff2c14f02c415defa68f960b7448f87ca8c50ea2ca0f41454c313b57e76505f24ac5430da4f2afd487b3e32c10841fea01c86c5816a4f997c

      • C:\Windows\rundl132.exe

        Filesize

        26KB

        MD5

        c438cd45dba79de60cfe6dedf51add8b

        SHA1

        9a84bde939cfeae643e96ce34a3bceee2e9f640e

        SHA256

        2d8f4cf4e9edb7b563432e0974e2de11b776c274739521674577c9242e509f9c

        SHA512

        7f28a39c22247d5ff2c14f02c415defa68f960b7448f87ca8c50ea2ca0f41454c313b57e76505f24ac5430da4f2afd487b3e32c10841fea01c86c5816a4f997c

      • F:\$RECYCLE.BIN\S-1-5-21-3750544865-3773649541-1858556521-1000\_desktop.ini

        Filesize

        9B

        MD5

        0d8cc6d8ad77008e4eea5193ba074b8b

        SHA1

        ed3ef3737662f0b0d7dabb8a681fdab8882322a1

        SHA256

        02cb6e1ee5bc2475b62b35df1ff95d9d38080ea818c3fea2c65ceb449c761999

        SHA512

        8cf0f361865203a0b8ea23fb3a33827b86958c4035294db074562956d6fe213d9069f3e5687ea66284e14f4406d74d348d98eec1af10b2538acd7a302752813f

      • \Users\Admin\AppData\Local\Temp\7e62fabd24864f6e937e3f4eb7b0d584eab1c7a1fea79074ae458d9d838a6edc.exe

        Filesize

        1.8MB

        MD5

        8f6a1effaab5bc3aa41a210fbe858148

        SHA1

        daab0e4852dfeb944d5fa13f5a9039880c9023f9

        SHA256

        ce537a333ddb3271a3bc68b9f1cd1d22808c0808eac1fe4225c9ad95e771c7e5

        SHA512

        bbe79b942937cf19a76ee5b320bf46e33323e09d587dc42066131ab83ad4da86181725560dd919c9316e67e34fded1f472a43235f99c4e3d3e1b780f4d5263b1

      • memory/1248-30-0x0000000002970000-0x0000000002971000-memory.dmp

        Filesize

        4KB

      • memory/2104-16-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2104-12-0x0000000000220000-0x0000000000254000-memory.dmp

        Filesize

        208KB

      • memory/2104-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2296-95-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2296-34-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2296-43-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2296-49-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2296-101-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2296-1853-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2296-3313-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2624-33-0x00000000013E0000-0x00000000015C0000-memory.dmp

        Filesize

        1.9MB

      • memory/2624-26-0x00000000013E0000-0x00000000015C0000-memory.dmp

        Filesize

        1.9MB

      • memory/3052-24-0x0000000002150000-0x0000000002330000-memory.dmp

        Filesize

        1.9MB