Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    163s
  • max time network
    172s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/10/2023, 17:18

General

  • Target

    182f83b9d943d4c7a5a80cc457035405270e23644616baf0def200995446c3ee.exe

  • Size

    50KB

  • MD5

    04b91c8721fd1d2ae1d20328d0787628

  • SHA1

    a29a19c768ed04890c3394b179b063e0c8193e1e

  • SHA256

    182f83b9d943d4c7a5a80cc457035405270e23644616baf0def200995446c3ee

  • SHA512

    7cf1872a0c5b17de367ab37fe4be0523f69492ac7616639d492a0e84fc925a00ed153d5d1f12428cde9d7bc57ad7864a18c42568271a6eb8a545a71487e25bb7

  • SSDEEP

    768:1Hcp1ODKAaDMG8H92RwZNQSwcfymNBg+g61GoLjdzbXjQLiaeB949rwXkAwQ6Ufn:YfgLdQAQfcfymN/ZXkWS9rwXkjUfn

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3164
      • C:\Users\Admin\AppData\Local\Temp\182f83b9d943d4c7a5a80cc457035405270e23644616baf0def200995446c3ee.exe
        "C:\Users\Admin\AppData\Local\Temp\182f83b9d943d4c7a5a80cc457035405270e23644616baf0def200995446c3ee.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:2452
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a751B.bat
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1348
          • C:\Users\Admin\AppData\Local\Temp\182f83b9d943d4c7a5a80cc457035405270e23644616baf0def200995446c3ee.exe
            "C:\Users\Admin\AppData\Local\Temp\182f83b9d943d4c7a5a80cc457035405270e23644616baf0def200995446c3ee.exe"
            4⤵
            • Executes dropped EXE
            PID:5016
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:4632
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2092
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:544

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files\7-Zip\7z.exe

        Filesize

        484KB

        MD5

        677de80fbcca8d6cf4ba539133d37539

        SHA1

        725696c6efff345c1a72fc368dc4926e77532263

        SHA256

        527bd74317d720b2e0ad0d390ffe2f01d3ebf5d7e35bf6a674e3dd0c8b521dd2

        SHA512

        b1881a72d0d6d3815a2c7ce20ba7b4db6d44ca4423192ce7cfc39b9c023c66a62f168780cc907012f166072fd195694b494c7b288463bd55a77f4820fe726d50

      • C:\Users\Admin\AppData\Local\Temp\$$a751B.bat

        Filesize

        722B

        MD5

        65f0763d2f018bcd74345ee89bad82e2

        SHA1

        3eb19ac7e39fce5612a08f07f917b9a321ce6844

        SHA256

        12c8f4dd4a7a39682ac7c01c88bd0346ab301b5acaed793fadc42829a7ad2793

        SHA512

        22579ab47431f5d375fdce75b83646d3482cfa456fa879ea76fc9db38786529e50506ec7a8b572e135d7ddd715abc61bb4d473fdd2678268631cf6b3c3f34de7

      • C:\Users\Admin\AppData\Local\Temp\182f83b9d943d4c7a5a80cc457035405270e23644616baf0def200995446c3ee.exe

        Filesize

        23KB

        MD5

        a5c496552546b7e79d6228a3a419bf5d

        SHA1

        b29303a2d03d483baa2d5735df359c00aa9aed60

        SHA256

        2d0b45fa608dd8336722d85be930bb0d271fc407230a6f5082fdb3b058f67119

        SHA512

        c5d4973387ef18bfaaaf9ccf47fd0cbc485940fb77c59a4212bcf33c5cfc6b969d13bd34c3b7f5199925a7e40b19b4a3ae19cff5559c057fa106414c83775713

      • C:\Users\Admin\AppData\Local\Temp\182f83b9d943d4c7a5a80cc457035405270e23644616baf0def200995446c3ee.exe.exe

        Filesize

        23KB

        MD5

        a5c496552546b7e79d6228a3a419bf5d

        SHA1

        b29303a2d03d483baa2d5735df359c00aa9aed60

        SHA256

        2d0b45fa608dd8336722d85be930bb0d271fc407230a6f5082fdb3b058f67119

        SHA512

        c5d4973387ef18bfaaaf9ccf47fd0cbc485940fb77c59a4212bcf33c5cfc6b969d13bd34c3b7f5199925a7e40b19b4a3ae19cff5559c057fa106414c83775713

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        fdd504678a404fbffc560cd95a4363ff

        SHA1

        0e8a87142acaeadfe96f00ea117c05758b0514cc

        SHA256

        4b396f3b3d76cd75e64a47eb652ab93d6239a197fd9b32c66619d6a8ffbdc2da

        SHA512

        c6e5b506c5988072cbee535f18c89fec46fad599adff83a13ecb819bc157391a527eb5336c9c03392174a6ab345b699602fe9ecb0139a2a10a053f557ccc769f

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        fdd504678a404fbffc560cd95a4363ff

        SHA1

        0e8a87142acaeadfe96f00ea117c05758b0514cc

        SHA256

        4b396f3b3d76cd75e64a47eb652ab93d6239a197fd9b32c66619d6a8ffbdc2da

        SHA512

        c6e5b506c5988072cbee535f18c89fec46fad599adff83a13ecb819bc157391a527eb5336c9c03392174a6ab345b699602fe9ecb0139a2a10a053f557ccc769f

      • C:\Windows\rundl132.exe

        Filesize

        26KB

        MD5

        fdd504678a404fbffc560cd95a4363ff

        SHA1

        0e8a87142acaeadfe96f00ea117c05758b0514cc

        SHA256

        4b396f3b3d76cd75e64a47eb652ab93d6239a197fd9b32c66619d6a8ffbdc2da

        SHA512

        c6e5b506c5988072cbee535f18c89fec46fad599adff83a13ecb819bc157391a527eb5336c9c03392174a6ab345b699602fe9ecb0139a2a10a053f557ccc769f

      • F:\$RECYCLE.BIN\S-1-5-21-1574508946-349927670-1185736483-1000\_desktop.ini

        Filesize

        10B

        MD5

        743754b59d55d26c081d8f839a3662c8

        SHA1

        8e88e3bda53f58b9122f6f9c9a5f23f80e7be6c7

        SHA256

        bbb0f1aae4572c821fac1d6b7890df67d9f4a7576af30e70925192dded063e8b

        SHA512

        1e8d9e5e1651bd2aaef969713d949cc4ddab58c53d0be31392d660aedeb621a0f968196e4938d2ba75e40ebdb7557cee23bf5587877268cb087fdd09a8abba1b

      • memory/2452-6-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2452-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4632-39-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4632-28-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4632-34-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4632-20-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4632-43-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4632-9-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4632-127-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4632-191-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4632-436-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4632-584-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB