Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    159s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/10/2023, 02:48

General

  • Target

    07c6f632effd6d9cf10f4c91f4e4cb219f797aabf3a0314685cd1d69c7d72d8c.exe

  • Size

    563KB

  • MD5

    9e91b82e1f2bdc4a1877d1e694abe6be

  • SHA1

    1bc5d4671c3df97abd2cb1a530f1c1cc8ae917a1

  • SHA256

    07c6f632effd6d9cf10f4c91f4e4cb219f797aabf3a0314685cd1d69c7d72d8c

  • SHA512

    9031bf31ad62288ef934bcaff5d2568aadeff66488d484a88a2f5a86f1e9b4e8aa2ce1581e0dc79ca955e47511e1a844b6c4f1ab8c24f11ccf3b0bfb2b566347

  • SSDEEP

    12288:t7+eLE8rKj25X0mcslMKTKK4KKDyK5FZ1EEEEmEEE1EEEEEEEEEEElKK1KKK1KKQ:t7ZLEK42Gm52KTKK4KKDyK5FZ1EEEEm7

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3164
      • C:\Users\Admin\AppData\Local\Temp\07c6f632effd6d9cf10f4c91f4e4cb219f797aabf3a0314685cd1d69c7d72d8c.exe
        "C:\Users\Admin\AppData\Local\Temp\07c6f632effd6d9cf10f4c91f4e4cb219f797aabf3a0314685cd1d69c7d72d8c.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:1616
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aBB22.bat
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1272
          • C:\Users\Admin\AppData\Local\Temp\07c6f632effd6d9cf10f4c91f4e4cb219f797aabf3a0314685cd1d69c7d72d8c.exe
            "C:\Users\Admin\AppData\Local\Temp\07c6f632effd6d9cf10f4c91f4e4cb219f797aabf3a0314685cd1d69c7d72d8c.exe"
            4⤵
            • Executes dropped EXE
            PID:3608
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:4236
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:4284
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:4304

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        251KB

        MD5

        c2a6027905a06bbdca9ac06c9feb8f56

        SHA1

        79bb865a8241f2a6309bdf793cd5765154281bac

        SHA256

        6c1921f4afc7425a52caf45c47e767e265f2c3b3566bab15e04e60f399ba1da3

        SHA512

        99acbb6f288d058c4e426da68d1f0f707bc3bb2e485676e0fcedc867050e0bf6f7f0d43b92ea750e81439973b711cb346944435dd02a9a0be3c79277adfe002f

      • C:\Program Files\7-Zip\7z.exe

        Filesize

        484KB

        MD5

        bb8a24fa050d7197bfab673f384c94ab

        SHA1

        5c45e23448d74ff732ae69c1e5d4b5e24a6eceaa

        SHA256

        8116106c040c167e23bb375caf62bead62cfabf132994442024cb1d2e2b5f6c9

        SHA512

        162cb0554c98bb03feabd9df6b9cd60b68f2c64a46535dfd78f77d396880a7ee422febb7ebe8c130bbeb31fd7b8a32ebf61c98ed43efeaf4e238f1dc81832a2a

      • C:\Users\Admin\AppData\Local\Temp\$$aBB22.bat

        Filesize

        722B

        MD5

        370fe85621a782e2c800ab9756fe56d5

        SHA1

        080577aacb7b7d4370098e4132479a5e97aca1e3

        SHA256

        8c7a85f8dde6ee9be03093dfbf965e9083131fdd5bb95a413c6150077d2cb412

        SHA512

        e1ea5115435c530cd6806bdc7b99c0630ef1740d8507a048ef90ed8af788068d045bae443966d92090bcffdede07ec26f7fb333aefe0d0c0df0a5b778dd29b90

      • C:\Users\Admin\AppData\Local\Temp\07c6f632effd6d9cf10f4c91f4e4cb219f797aabf3a0314685cd1d69c7d72d8c.exe

        Filesize

        537KB

        MD5

        60e4522cdf1107402a0affd976fa6941

        SHA1

        95f2388dbc21e917da1299392997856b8eb62d7e

        SHA256

        01ba4ede639a49496908218e268241ffa7b18042a1147f6a6ec0887c44f02111

        SHA512

        dd5ec88eea863ad946bb4543d0b15edfc21a586f990f8397991cbbee297daaaf60e0dd0a572fd8c5bcbaf7752495da5a84fad152cd0646ce3b67a66718052248

      • C:\Users\Admin\AppData\Local\Temp\07c6f632effd6d9cf10f4c91f4e4cb219f797aabf3a0314685cd1d69c7d72d8c.exe.exe

        Filesize

        537KB

        MD5

        60e4522cdf1107402a0affd976fa6941

        SHA1

        95f2388dbc21e917da1299392997856b8eb62d7e

        SHA256

        01ba4ede639a49496908218e268241ffa7b18042a1147f6a6ec0887c44f02111

        SHA512

        dd5ec88eea863ad946bb4543d0b15edfc21a586f990f8397991cbbee297daaaf60e0dd0a572fd8c5bcbaf7752495da5a84fad152cd0646ce3b67a66718052248

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        21d3596d967b90ccc15b47a05eba7a58

        SHA1

        b6c542bcff0331dce02ebd9de067247f6e37dcf9

        SHA256

        c4061b0919b053f76bd6a55f4564a60d9c77ec9e508c9953f61f1b62f73e6f5c

        SHA512

        cd7922f6139fc8b3738a4f9fa245e58576c168d948ef3f8d616576803a2c58c4b846f75e461b410c67b3f3d032904a4d6025d482b40e5476cefddf2350d612ee

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        21d3596d967b90ccc15b47a05eba7a58

        SHA1

        b6c542bcff0331dce02ebd9de067247f6e37dcf9

        SHA256

        c4061b0919b053f76bd6a55f4564a60d9c77ec9e508c9953f61f1b62f73e6f5c

        SHA512

        cd7922f6139fc8b3738a4f9fa245e58576c168d948ef3f8d616576803a2c58c4b846f75e461b410c67b3f3d032904a4d6025d482b40e5476cefddf2350d612ee

      • C:\Windows\rundl132.exe

        Filesize

        26KB

        MD5

        21d3596d967b90ccc15b47a05eba7a58

        SHA1

        b6c542bcff0331dce02ebd9de067247f6e37dcf9

        SHA256

        c4061b0919b053f76bd6a55f4564a60d9c77ec9e508c9953f61f1b62f73e6f5c

        SHA512

        cd7922f6139fc8b3738a4f9fa245e58576c168d948ef3f8d616576803a2c58c4b846f75e461b410c67b3f3d032904a4d6025d482b40e5476cefddf2350d612ee

      • F:\$RECYCLE.BIN\S-1-5-21-1926387074-3400613176-3566796709-1000\_desktop.ini

        Filesize

        9B

        MD5

        d1f4b3361b3ceba910fe1ab7ce1ab032

        SHA1

        6c1264e161c0ae8e2bf57dfcbf331b502b7ccf86

        SHA256

        1a8ca2a08b158ef349e80a839becb06d0e9b2ae3c4633d3a376a13260d71b45f

        SHA512

        c1269ac742982043f8e5f6610bbba71efd56841e32ee6eca478f6a474a1f0b9783f461377945a8ea88aff6c394c570948cb5d65289d0b8a55f80daf68c5e4498

      • memory/1616-12-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1616-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4236-19-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4236-32-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4236-37-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4236-41-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4236-26-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4236-323-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4236-1278-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4236-9-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4236-4471-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4236-4831-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB