Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/10/2023, 03:54

General

  • Target

    bd0fbfdbe4a315ed33523151ae7295920c017f458aaae65cf4cd7febf9b3413c.exe

  • Size

    134KB

  • MD5

    83e940b83a1bf71eae05deb832b7cc43

  • SHA1

    1c9ddc3fc5bc0aeb3f48e7a4100dba5efe1a4fbd

  • SHA256

    bd0fbfdbe4a315ed33523151ae7295920c017f458aaae65cf4cd7febf9b3413c

  • SHA512

    a8a7083d27dc8adc8250e4f1a88558ac6e7b30a8cb73d07d0dfabaec31d1a59bf5659fc357437c431c165a6bcf3de83f6358d1dbafdffdf4a417869ce05e7597

  • SSDEEP

    1536:xfgLdQAQfwt7FZJ92Bs4CKBAR2pmU/BGhkp3szGPpbTDblnYVJV1PBsf:xftffepVPv4ARXU/HZ9/D8Dsf

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3248
      • C:\Users\Admin\AppData\Local\Temp\bd0fbfdbe4a315ed33523151ae7295920c017f458aaae65cf4cd7febf9b3413c.exe
        "C:\Users\Admin\AppData\Local\Temp\bd0fbfdbe4a315ed33523151ae7295920c017f458aaae65cf4cd7febf9b3413c.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:3748
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a7138.bat
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:4736
          • C:\Users\Admin\AppData\Local\Temp\bd0fbfdbe4a315ed33523151ae7295920c017f458aaae65cf4cd7febf9b3413c.exe
            "C:\Users\Admin\AppData\Local\Temp\bd0fbfdbe4a315ed33523151ae7295920c017f458aaae65cf4cd7febf9b3413c.exe"
            4⤵
            • Executes dropped EXE
            PID:4296
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2308
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:3172
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:4968

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        251KB

        MD5

        770e80db366145f997b81f8040496869

        SHA1

        4d924c50b0c714b97047df34a0bd4adaf2de6a83

        SHA256

        dccf1246394aab3657a9ebd19ebd4150b9420f438bd50e40aafbc8ac8d51ebdb

        SHA512

        754b5ee9fdcc4614ad626ece4d684fdc2f4b20d5c20042dba268f4c7b1c913b2b707ac1903bfb85a79598975e4b6ab4eb508660a242cb9feb2196d6368a6ff8d

      • C:\Program Files\7-Zip\7z.exe

        Filesize

        484KB

        MD5

        07c5e9a9f606b5ae33bdb24d21af81bf

        SHA1

        58be120b62a58788956df840d4462515829cf0e4

        SHA256

        60ebb105f4147a89b4abc067a1e66dd97757738f945db1a90bf9799d56a45b94

        SHA512

        c18d2519cfc5bcaee1483e4a77b6bbe9241310580bdeefee14870aef3973f113ab487ec58ee7d081661eb21e6c3a98f2044aa4b24cf0ee56a3f22e7321ece6ad

      • C:\Users\Admin\AppData\Local\Temp\$$a7138.bat

        Filesize

        722B

        MD5

        235a5a6f4d97aa178840d919875628c4

        SHA1

        4481ad9a50aa41d8fdf6d49bef7b90deaa8a67e1

        SHA256

        7ff0d91a17cb99acdf0366c6a46d119e5b32169a5ae16d58548d8094a3bcbcc9

        SHA512

        d8d669021e1f5049c54d4fee9fe3a82600b5d3835156284713b4ad80188f25683f36922fd92778f1d4fa05f9ebe4cd72ae2ec18b906a3166b2e1dc0bc951b0f3

      • C:\Users\Admin\AppData\Local\Temp\bd0fbfdbe4a315ed33523151ae7295920c017f458aaae65cf4cd7febf9b3413c.exe

        Filesize

        108KB

        MD5

        47a545692e4cd815111496b18699ef60

        SHA1

        6d05db7a6e82b286b0fbe3dfdd1d0384c198b3e8

        SHA256

        fa5cf502c3261eabbbf3f232b6b46004993f83adc098397ae5378d5c3e973c83

        SHA512

        0c97eeeb59e6452f82077cfb9b0847360d5aa0b000c8cfe7bc96f812b9195f3c0dae4f9d3f1c913e5351dba0816cf856a0fae77eeda97e1543b00419c4f7bb04

      • C:\Users\Admin\AppData\Local\Temp\bd0fbfdbe4a315ed33523151ae7295920c017f458aaae65cf4cd7febf9b3413c.exe.exe

        Filesize

        108KB

        MD5

        47a545692e4cd815111496b18699ef60

        SHA1

        6d05db7a6e82b286b0fbe3dfdd1d0384c198b3e8

        SHA256

        fa5cf502c3261eabbbf3f232b6b46004993f83adc098397ae5378d5c3e973c83

        SHA512

        0c97eeeb59e6452f82077cfb9b0847360d5aa0b000c8cfe7bc96f812b9195f3c0dae4f9d3f1c913e5351dba0816cf856a0fae77eeda97e1543b00419c4f7bb04

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        8758044db9fce67ea2ad542f86e69e57

        SHA1

        60cc4d25ea4e17f676e8ac8be10b9dfe2f7ed67d

        SHA256

        0c91b552dc6db19b6711e32cb8c9c604b60dc9d674be06cccb6adf08b4dbd82d

        SHA512

        411737be53feaef0829190b6610c729b925949bcc0b4a65063ab393acb1a92c577093e6377a373704ce54d27a593f2faddc23c80c660638f7c304a93f1972c93

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        8758044db9fce67ea2ad542f86e69e57

        SHA1

        60cc4d25ea4e17f676e8ac8be10b9dfe2f7ed67d

        SHA256

        0c91b552dc6db19b6711e32cb8c9c604b60dc9d674be06cccb6adf08b4dbd82d

        SHA512

        411737be53feaef0829190b6610c729b925949bcc0b4a65063ab393acb1a92c577093e6377a373704ce54d27a593f2faddc23c80c660638f7c304a93f1972c93

      • C:\Windows\rundl132.exe

        Filesize

        26KB

        MD5

        8758044db9fce67ea2ad542f86e69e57

        SHA1

        60cc4d25ea4e17f676e8ac8be10b9dfe2f7ed67d

        SHA256

        0c91b552dc6db19b6711e32cb8c9c604b60dc9d674be06cccb6adf08b4dbd82d

        SHA512

        411737be53feaef0829190b6610c729b925949bcc0b4a65063ab393acb1a92c577093e6377a373704ce54d27a593f2faddc23c80c660638f7c304a93f1972c93

      • F:\$RECYCLE.BIN\S-1-5-21-2344688013-2965468717-2034126-1000\_desktop.ini

        Filesize

        10B

        MD5

        f72d794bbb322d5865b8074038cb8900

        SHA1

        9e6e5d1e3714686f86670ef6b5a8810d9bb04e44

        SHA256

        0a4ac5e7118bf826da89694e99e1334547e87fa7608a0e7c83df379d8cd04aa6

        SHA512

        12992cc499ce1dbb2641a279ce148111e4da49be595af37fb58bdb3870effa7bb81b720df0faf420500ab9ea52a791b425ba77fd1a4547ef3e0665a199ba4cea

      • memory/2308-40-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2308-45-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2308-21-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2308-4813-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2308-29-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2308-35-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2308-4108-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2308-1281-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2308-9-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2308-46-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3748-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3748-8-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4296-19-0x0000000000730000-0x0000000000750000-memory.dmp

        Filesize

        128KB

      • memory/4296-18-0x0000000000730000-0x0000000000750000-memory.dmp

        Filesize

        128KB