Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    214s
  • max time network
    41s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2023, 17:46

General

  • Target

    038b96de10f5663905674f2c6f7b1166abe1eeebefcf19e7b11bb1f0d9e55045.exe

  • Size

    239KB

  • MD5

    31bddc60c9daeebd1efd4170d02a02a8

  • SHA1

    c68ffa75a7700406caa50131e785f622d354403c

  • SHA256

    038b96de10f5663905674f2c6f7b1166abe1eeebefcf19e7b11bb1f0d9e55045

  • SHA512

    fd40f3c18dc0a6493dae65c34626e4516d1fc012fd89840ffef7732ca590ce7c762233d59a128ebaaa00fb1490165b04a82429ec988f0ecd958d9691b32fe09f

  • SSDEEP

    3072:+bftffjmNbqcVz5fzsTl4dsOc6v2vTzwU+Pho86meq+FaSoB2+vSHrX:aVfjmNecT93PiY+Fa7BdvGX

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\038b96de10f5663905674f2c6f7b1166abe1eeebefcf19e7b11bb1f0d9e55045.exe
    "C:\Users\Admin\AppData\Local\Temp\038b96de10f5663905674f2c6f7b1166abe1eeebefcf19e7b11bb1f0d9e55045.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2700
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Users\Admin\AppData\Local\Temp\$$aC6E7.bat
      2⤵
      • Deletes itself
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2752
      • C:\Users\Admin\AppData\Local\Temp\038b96de10f5663905674f2c6f7b1166abe1eeebefcf19e7b11bb1f0d9e55045.exe
        "C:\Users\Admin\AppData\Local\Temp\038b96de10f5663905674f2c6f7b1166abe1eeebefcf19e7b11bb1f0d9e55045.exe"
        3⤵
        • Executes dropped EXE
        PID:2468
    • C:\Windows\Logo1_.exe
      C:\Windows\Logo1_.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2260
      • C:\Windows\SysWOW64\net.exe
        net stop "Kingsoft AntiVirus Service"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2640
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
          4⤵
            PID:2196
    • C:\Windows\Explorer.EXE
      C:\Windows\Explorer.EXE
      1⤵
        PID:1288

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        251KB

        MD5

        1c1a5bee45c70768bcd86beafa815132

        SHA1

        579be1a01e5f689eb22dd1fd4748d4598293847f

        SHA256

        4228377d6761fecdd75a9fb91add920e71d9626de3dabe31ae72bb5b39e2fbe9

        SHA512

        371e72711c0b16f946eb88ee4c69c51a44e10b29d74954da13894daf1a6ae6fec88a0682984bcf6b9b3b76243b143bd6d0dee382f31be3b799e11d52569f470e

      • C:\Users\Admin\AppData\Local\Temp\$$aC6E7.bat

        Filesize

        722B

        MD5

        6e65f8ce14736dded34192ad15474dfe

        SHA1

        de690e7ecded353330022302bfa8919851a110e2

        SHA256

        5ed9cbd16c22fafceffabd724ecff3982cbf4975dddcfc2b015630051b559d2a

        SHA512

        0f28ff687caf0c7ec01341923451e5c66ddb6b3ff1b1b6565fcfcb65ef4ae1690590ca4e0032b3cf901e9b7763b0650404cd7f4c25c948783739a7fd943006c4

      • C:\Users\Admin\AppData\Local\Temp\$$aC6E7.bat

        Filesize

        722B

        MD5

        6e65f8ce14736dded34192ad15474dfe

        SHA1

        de690e7ecded353330022302bfa8919851a110e2

        SHA256

        5ed9cbd16c22fafceffabd724ecff3982cbf4975dddcfc2b015630051b559d2a

        SHA512

        0f28ff687caf0c7ec01341923451e5c66ddb6b3ff1b1b6565fcfcb65ef4ae1690590ca4e0032b3cf901e9b7763b0650404cd7f4c25c948783739a7fd943006c4

      • C:\Users\Admin\AppData\Local\Temp\038b96de10f5663905674f2c6f7b1166abe1eeebefcf19e7b11bb1f0d9e55045.exe

        Filesize

        213KB

        MD5

        20d89d1781cde87db3a8b59da816efcc

        SHA1

        4f6670c4dcd8d978b21d1db91e081e609f5abcd0

        SHA256

        4653df6eb852f717ac03d5ecdfdd5e1e2c1ac70b012049f1188e0e7d5b5f8983

        SHA512

        7b03a2e2c5f94a3e6164e160e3346cf0e8247471c48858dad9747dc17c8bccd20caaf2ea9f15d7e6be3e633a01536caefdeff6b384c4448c861f1e5a5ff6cf0e

      • C:\Users\Admin\AppData\Local\Temp\038b96de10f5663905674f2c6f7b1166abe1eeebefcf19e7b11bb1f0d9e55045.exe.exe

        Filesize

        213KB

        MD5

        20d89d1781cde87db3a8b59da816efcc

        SHA1

        4f6670c4dcd8d978b21d1db91e081e609f5abcd0

        SHA256

        4653df6eb852f717ac03d5ecdfdd5e1e2c1ac70b012049f1188e0e7d5b5f8983

        SHA512

        7b03a2e2c5f94a3e6164e160e3346cf0e8247471c48858dad9747dc17c8bccd20caaf2ea9f15d7e6be3e633a01536caefdeff6b384c4448c861f1e5a5ff6cf0e

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        f7b0ab0aff6aad4bf0ccf0f3b127a9fd

        SHA1

        4a66a7d02be22cd152d1b1815e7c9a7bca03c909

        SHA256

        55b1084df5b436dbe01998c2eccceb74f9ef6dad3cbcade949e47d4b340a0365

        SHA512

        214b61c2e57148d152c7be4dc462d0ba617192b3dc6999b8edc0105ab897d286688f8b4ff1d4e0637a40f25f31d75bf83a75d12a392b6ef68d37d3cc8d0f0a92

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        f7b0ab0aff6aad4bf0ccf0f3b127a9fd

        SHA1

        4a66a7d02be22cd152d1b1815e7c9a7bca03c909

        SHA256

        55b1084df5b436dbe01998c2eccceb74f9ef6dad3cbcade949e47d4b340a0365

        SHA512

        214b61c2e57148d152c7be4dc462d0ba617192b3dc6999b8edc0105ab897d286688f8b4ff1d4e0637a40f25f31d75bf83a75d12a392b6ef68d37d3cc8d0f0a92

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        f7b0ab0aff6aad4bf0ccf0f3b127a9fd

        SHA1

        4a66a7d02be22cd152d1b1815e7c9a7bca03c909

        SHA256

        55b1084df5b436dbe01998c2eccceb74f9ef6dad3cbcade949e47d4b340a0365

        SHA512

        214b61c2e57148d152c7be4dc462d0ba617192b3dc6999b8edc0105ab897d286688f8b4ff1d4e0637a40f25f31d75bf83a75d12a392b6ef68d37d3cc8d0f0a92

      • C:\Windows\rundl132.exe

        Filesize

        26KB

        MD5

        f7b0ab0aff6aad4bf0ccf0f3b127a9fd

        SHA1

        4a66a7d02be22cd152d1b1815e7c9a7bca03c909

        SHA256

        55b1084df5b436dbe01998c2eccceb74f9ef6dad3cbcade949e47d4b340a0365

        SHA512

        214b61c2e57148d152c7be4dc462d0ba617192b3dc6999b8edc0105ab897d286688f8b4ff1d4e0637a40f25f31d75bf83a75d12a392b6ef68d37d3cc8d0f0a92

      • F:\$RECYCLE.BIN\S-1-5-21-607259312-1573743425-2763420908-1000\_desktop.ini

        Filesize

        10B

        MD5

        dbf19ca54500e964528b156763234c1d

        SHA1

        05376f86423aec8badf0adbc47887234ac83ef5a

        SHA256

        bfa0ad2e861e2369dc239edf8f62fbe1c4507d877ec2f76e46e48f1e68fdd5ae

        SHA512

        fb8ce1253ad6d3c1b7d970614dbc2d21574576336a490b54a8dc705a3d8637c0669747ba821fb2f4da14d7447dc24607aca988b0cd3bd9fc4d9d5988b4b631d0

      • \Users\Admin\AppData\Local\Temp\038b96de10f5663905674f2c6f7b1166abe1eeebefcf19e7b11bb1f0d9e55045.exe

        Filesize

        213KB

        MD5

        20d89d1781cde87db3a8b59da816efcc

        SHA1

        4f6670c4dcd8d978b21d1db91e081e609f5abcd0

        SHA256

        4653df6eb852f717ac03d5ecdfdd5e1e2c1ac70b012049f1188e0e7d5b5f8983

        SHA512

        7b03a2e2c5f94a3e6164e160e3346cf0e8247471c48858dad9747dc17c8bccd20caaf2ea9f15d7e6be3e633a01536caefdeff6b384c4448c861f1e5a5ff6cf0e

      • memory/1288-29-0x00000000020F0000-0x00000000020F1000-memory.dmp

        Filesize

        4KB

      • memory/2260-47-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2260-33-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2260-41-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2260-93-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2260-99-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2260-1851-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2260-3219-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2260-3312-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2700-17-0x00000000003C0000-0x00000000003F4000-memory.dmp

        Filesize

        208KB

      • memory/2700-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2700-16-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2700-12-0x00000000003C0000-0x00000000003F4000-memory.dmp

        Filesize

        208KB