Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    152s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    01/10/2023, 02:48

General

  • Target

    07c6f632effd6d9cf10f4c91f4e4cb219f797aabf3a0314685cd1d69c7d72d8c.exe

  • Size

    563KB

  • MD5

    9e91b82e1f2bdc4a1877d1e694abe6be

  • SHA1

    1bc5d4671c3df97abd2cb1a530f1c1cc8ae917a1

  • SHA256

    07c6f632effd6d9cf10f4c91f4e4cb219f797aabf3a0314685cd1d69c7d72d8c

  • SHA512

    9031bf31ad62288ef934bcaff5d2568aadeff66488d484a88a2f5a86f1e9b4e8aa2ce1581e0dc79ca955e47511e1a844b6c4f1ab8c24f11ccf3b0bfb2b566347

  • SSDEEP

    12288:t7+eLE8rKj25X0mcslMKTKK4KKDyK5FZ1EEEEmEEE1EEEEEEEEEEElKK1KKK1KKQ:t7ZLEK42Gm52KTKK4KKDyK5FZ1EEEEm7

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1264
      • C:\Users\Admin\AppData\Local\Temp\07c6f632effd6d9cf10f4c91f4e4cb219f797aabf3a0314685cd1d69c7d72d8c.exe
        "C:\Users\Admin\AppData\Local\Temp\07c6f632effd6d9cf10f4c91f4e4cb219f797aabf3a0314685cd1d69c7d72d8c.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:3028
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\$$a3E0A.bat
          3⤵
          • Deletes itself
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:2156
          • C:\Users\Admin\AppData\Local\Temp\07c6f632effd6d9cf10f4c91f4e4cb219f797aabf3a0314685cd1d69c7d72d8c.exe
            "C:\Users\Admin\AppData\Local\Temp\07c6f632effd6d9cf10f4c91f4e4cb219f797aabf3a0314685cd1d69c7d72d8c.exe"
            4⤵
            • Executes dropped EXE
            PID:2704
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2668
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2680
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:2912

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        251KB

        MD5

        c2a6027905a06bbdca9ac06c9feb8f56

        SHA1

        79bb865a8241f2a6309bdf793cd5765154281bac

        SHA256

        6c1921f4afc7425a52caf45c47e767e265f2c3b3566bab15e04e60f399ba1da3

        SHA512

        99acbb6f288d058c4e426da68d1f0f707bc3bb2e485676e0fcedc867050e0bf6f7f0d43b92ea750e81439973b711cb346944435dd02a9a0be3c79277adfe002f

      • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

        Filesize

        471KB

        MD5

        4cfdb20b04aa239d6f9e83084d5d0a77

        SHA1

        f22863e04cc1fd4435f785993ede165bd8245ac6

        SHA256

        30ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9

        SHA512

        35b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86

      • C:\Users\Admin\AppData\Local\Temp\$$a3E0A.bat

        Filesize

        722B

        MD5

        1902d8d67251bf744c76b97b2e319afe

        SHA1

        22af7bf9aaaae3799237034a913e19f3ccb3294b

        SHA256

        76af01114f27532979d46fb6d86c88af0c099b19583413e1a7d1ab58296e573d

        SHA512

        d70b6ca9b2627d85aa0cfb82ed80ac8738bcb976134258f4d997b0acfa113e2869bdfa24d7e72f3ff6f8e7c4d73db4100a104a58e54ac0ae91a9e8c370c62d85

      • C:\Users\Admin\AppData\Local\Temp\$$a3E0A.bat

        Filesize

        722B

        MD5

        1902d8d67251bf744c76b97b2e319afe

        SHA1

        22af7bf9aaaae3799237034a913e19f3ccb3294b

        SHA256

        76af01114f27532979d46fb6d86c88af0c099b19583413e1a7d1ab58296e573d

        SHA512

        d70b6ca9b2627d85aa0cfb82ed80ac8738bcb976134258f4d997b0acfa113e2869bdfa24d7e72f3ff6f8e7c4d73db4100a104a58e54ac0ae91a9e8c370c62d85

      • C:\Users\Admin\AppData\Local\Temp\07c6f632effd6d9cf10f4c91f4e4cb219f797aabf3a0314685cd1d69c7d72d8c.exe

        Filesize

        537KB

        MD5

        60e4522cdf1107402a0affd976fa6941

        SHA1

        95f2388dbc21e917da1299392997856b8eb62d7e

        SHA256

        01ba4ede639a49496908218e268241ffa7b18042a1147f6a6ec0887c44f02111

        SHA512

        dd5ec88eea863ad946bb4543d0b15edfc21a586f990f8397991cbbee297daaaf60e0dd0a572fd8c5bcbaf7752495da5a84fad152cd0646ce3b67a66718052248

      • C:\Users\Admin\AppData\Local\Temp\07c6f632effd6d9cf10f4c91f4e4cb219f797aabf3a0314685cd1d69c7d72d8c.exe.exe

        Filesize

        537KB

        MD5

        60e4522cdf1107402a0affd976fa6941

        SHA1

        95f2388dbc21e917da1299392997856b8eb62d7e

        SHA256

        01ba4ede639a49496908218e268241ffa7b18042a1147f6a6ec0887c44f02111

        SHA512

        dd5ec88eea863ad946bb4543d0b15edfc21a586f990f8397991cbbee297daaaf60e0dd0a572fd8c5bcbaf7752495da5a84fad152cd0646ce3b67a66718052248

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        21d3596d967b90ccc15b47a05eba7a58

        SHA1

        b6c542bcff0331dce02ebd9de067247f6e37dcf9

        SHA256

        c4061b0919b053f76bd6a55f4564a60d9c77ec9e508c9953f61f1b62f73e6f5c

        SHA512

        cd7922f6139fc8b3738a4f9fa245e58576c168d948ef3f8d616576803a2c58c4b846f75e461b410c67b3f3d032904a4d6025d482b40e5476cefddf2350d612ee

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        21d3596d967b90ccc15b47a05eba7a58

        SHA1

        b6c542bcff0331dce02ebd9de067247f6e37dcf9

        SHA256

        c4061b0919b053f76bd6a55f4564a60d9c77ec9e508c9953f61f1b62f73e6f5c

        SHA512

        cd7922f6139fc8b3738a4f9fa245e58576c168d948ef3f8d616576803a2c58c4b846f75e461b410c67b3f3d032904a4d6025d482b40e5476cefddf2350d612ee

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        21d3596d967b90ccc15b47a05eba7a58

        SHA1

        b6c542bcff0331dce02ebd9de067247f6e37dcf9

        SHA256

        c4061b0919b053f76bd6a55f4564a60d9c77ec9e508c9953f61f1b62f73e6f5c

        SHA512

        cd7922f6139fc8b3738a4f9fa245e58576c168d948ef3f8d616576803a2c58c4b846f75e461b410c67b3f3d032904a4d6025d482b40e5476cefddf2350d612ee

      • C:\Windows\rundl132.exe

        Filesize

        26KB

        MD5

        21d3596d967b90ccc15b47a05eba7a58

        SHA1

        b6c542bcff0331dce02ebd9de067247f6e37dcf9

        SHA256

        c4061b0919b053f76bd6a55f4564a60d9c77ec9e508c9953f61f1b62f73e6f5c

        SHA512

        cd7922f6139fc8b3738a4f9fa245e58576c168d948ef3f8d616576803a2c58c4b846f75e461b410c67b3f3d032904a4d6025d482b40e5476cefddf2350d612ee

      • F:\$RECYCLE.BIN\S-1-5-21-3750544865-3773649541-1858556521-1000\_desktop.ini

        Filesize

        9B

        MD5

        d1f4b3361b3ceba910fe1ab7ce1ab032

        SHA1

        6c1264e161c0ae8e2bf57dfcbf331b502b7ccf86

        SHA256

        1a8ca2a08b158ef349e80a839becb06d0e9b2ae3c4633d3a376a13260d71b45f

        SHA512

        c1269ac742982043f8e5f6610bbba71efd56841e32ee6eca478f6a474a1f0b9783f461377945a8ea88aff6c394c570948cb5d65289d0b8a55f80daf68c5e4498

      • \Users\Admin\AppData\Local\Temp\07c6f632effd6d9cf10f4c91f4e4cb219f797aabf3a0314685cd1d69c7d72d8c.exe

        Filesize

        537KB

        MD5

        60e4522cdf1107402a0affd976fa6941

        SHA1

        95f2388dbc21e917da1299392997856b8eb62d7e

        SHA256

        01ba4ede639a49496908218e268241ffa7b18042a1147f6a6ec0887c44f02111

        SHA512

        dd5ec88eea863ad946bb4543d0b15edfc21a586f990f8397991cbbee297daaaf60e0dd0a572fd8c5bcbaf7752495da5a84fad152cd0646ce3b67a66718052248

      • memory/1264-29-0x00000000029E0000-0x00000000029E1000-memory.dmp

        Filesize

        4KB

      • memory/2668-45-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2668-31-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2668-21-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2668-39-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2668-91-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2668-98-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2668-122-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2668-1850-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2668-3310-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3028-17-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3028-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3028-12-0x00000000002D0000-0x0000000000304000-memory.dmp

        Filesize

        208KB