Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    141s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/10/2023, 14:38

General

  • Target

    b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe

  • Size

    33KB

  • MD5

    2dbe6bbefc65c1ca0ee7171a08383336

  • SHA1

    68fb3d025158255f8be919c3587fcec8786879a7

  • SHA256

    b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee

  • SHA512

    4d642abe74c7acb964dbd99c57f8b598a9311cec2cb0bfbd8b4532c0a584e3d7eec82177783b7c1936224fb554527f604b1eba991fb046ae8393e450c44a800a

  • SSDEEP

    768:PwjhElOIEvzMXqtwp/lttaL7HP4wIncLRdR5kP78a0RJW/a:PoaYzMXqtGNttyUn01Q78a4R

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 60 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3248
      • C:\Users\Admin\AppData\Local\Temp\b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe
        "C:\Users\Admin\AppData\Local\Temp\b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe"
        2⤵
        • Drops file in Drivers directory
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:4772
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:968
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            4⤵
              PID:884
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:4296
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              4⤵
                PID:1716

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files\Google\Chrome\Application\chrome.exe

          Filesize

          2.8MB

          MD5

          9d5fbaad712c01c8f14741b98284aba9

          SHA1

          b2e87bb774b27278569035129b76f3fe976cf532

          SHA256

          67dd78b29ab5d04140846a07704446b8136a999e9db731f44dd8d9117a2f5011

          SHA512

          5b547acad6e9caf1bf05fe0c609c8f6dbd25812110e0f4cf8e2f5c4d20aed4944db656399034a3a7908bdfbe877c02b024ea6a606204960f7716e48e53ca497b

        • F:\$RECYCLE.BIN\S-1-5-21-2344688013-2965468717-2034126-1000\_desktop.ini

          Filesize

          10B

          MD5

          81570c50286369016cef7a9f904c4b04

          SHA1

          b5758b23667cb35cad0adb23371b830fcee4f4e5

          SHA256

          b882f41a5c84d248a75714eaf215a9e363a49361b6a14beedb921ee3dfdb46a1

          SHA512

          0e6c479b0252e24635810b7d030cc9b5b17603ee20ccf62812446b8d15884521c6c7be65dfc0090bb1502e859fae27c2a63b3e58be714021f473a88407982162

        • memory/4772-0-0x0000000000400000-0x000000000043E000-memory.dmp

          Filesize

          248KB

        • memory/4772-5-0x0000000000400000-0x000000000043E000-memory.dmp

          Filesize

          248KB

        • memory/4772-23-0x0000000000400000-0x000000000043E000-memory.dmp

          Filesize

          248KB

        • memory/4772-1646-0x0000000000400000-0x000000000043E000-memory.dmp

          Filesize

          248KB

        • memory/4772-1658-0x0000000000400000-0x000000000043E000-memory.dmp

          Filesize

          248KB

        • memory/4772-1661-0x0000000000400000-0x000000000043E000-memory.dmp

          Filesize

          248KB

        • memory/4772-1664-0x0000000000400000-0x000000000043E000-memory.dmp

          Filesize

          248KB

        • memory/4772-1666-0x0000000000400000-0x000000000043E000-memory.dmp

          Filesize

          248KB

        • memory/4772-1671-0x0000000000400000-0x000000000043E000-memory.dmp

          Filesize

          248KB

        • memory/4772-2645-0x0000000000400000-0x000000000043E000-memory.dmp

          Filesize

          248KB