Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    14/10/2023, 01:17

General

  • Target

    563f1eda4f69c1a676bebedfa87318baf5bc297739dbfec687faea15590d9101.exe

  • Size

    56KB

  • MD5

    31d7fcd3d8dc83f7db128907718fa638

  • SHA1

    e598453491a2f82d0daa0635187c5e2b2d87bc79

  • SHA256

    563f1eda4f69c1a676bebedfa87318baf5bc297739dbfec687faea15590d9101

  • SHA512

    6a4f42a67bdf0984cd98843f6d710f730b80b8114140d5d12dd400a7c2e192437a2f8b0db397f27dec0d6b1fe5f545997088f4cbcfe8b9837720c980a484f1a4

  • SSDEEP

    1536:wsfgLdQAQfcfymNU/mMEjpOUuPvOk+hIjBPxw:wsftffjmNAmMEj8nOIRxw

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1400
      • C:\Users\Admin\AppData\Local\Temp\563f1eda4f69c1a676bebedfa87318baf5bc297739dbfec687faea15590d9101.exe
        "C:\Users\Admin\AppData\Local\Temp\563f1eda4f69c1a676bebedfa87318baf5bc297739dbfec687faea15590d9101.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:2984
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\$$a95E9.bat
          3⤵
          • Deletes itself
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:2484
          • C:\Users\Admin\AppData\Local\Temp\563f1eda4f69c1a676bebedfa87318baf5bc297739dbfec687faea15590d9101.exe
            "C:\Users\Admin\AppData\Local\Temp\563f1eda4f69c1a676bebedfa87318baf5bc297739dbfec687faea15590d9101.exe"
            4⤵
            • Executes dropped EXE
            PID:2760
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:3056
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2596
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:2332

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        251KB

        MD5

        3663c1381766ef643154f7248cee081a

        SHA1

        d3391539358af56ef7ac65a5b87886e45e9bc42c

        SHA256

        0471b2b82fb08307f138b69649e69dd51864d5650e13d0dafe67d37d91288c29

        SHA512

        c3ed0a5d8b9eaa02efd030d4191849f5aa999e1585a47af66e8497ab494141488e97ca39289b412919f33faf78016c4e875522232c8f67bde995d968ecc7f6f7

      • C:\Users\Admin\AppData\Local\Temp\$$a95E9.bat

        Filesize

        722B

        MD5

        36e91885a4749f0ce96ebe212c0e07d8

        SHA1

        d92e6f8517dc891c784c40eba54074a93ce8d7a6

        SHA256

        e4f2f41d3f9bc907201fc5390f10994b843e4fa228be8b5f2e00b27ac29182b3

        SHA512

        07268221f5dd399fe550655d72ff868fac3f2f3feef952054089d7984f2fcb698a75d1e88494f7fb5d4d39ad32b29d651ed24b6bdb4bed1a58a9be786364c407

      • C:\Users\Admin\AppData\Local\Temp\$$a95E9.bat

        Filesize

        722B

        MD5

        36e91885a4749f0ce96ebe212c0e07d8

        SHA1

        d92e6f8517dc891c784c40eba54074a93ce8d7a6

        SHA256

        e4f2f41d3f9bc907201fc5390f10994b843e4fa228be8b5f2e00b27ac29182b3

        SHA512

        07268221f5dd399fe550655d72ff868fac3f2f3feef952054089d7984f2fcb698a75d1e88494f7fb5d4d39ad32b29d651ed24b6bdb4bed1a58a9be786364c407

      • C:\Users\Admin\AppData\Local\Temp\563f1eda4f69c1a676bebedfa87318baf5bc297739dbfec687faea15590d9101.exe

        Filesize

        30KB

        MD5

        0bc6aea4a6e5f575bc2da604905a8114

        SHA1

        8c162fc24a2b2f14489ced504b2d73190f46672a

        SHA256

        9eaa64e0cfd2c7362c3e4d60e681c3326688523f50cb3ef7c8e874a62dcf6328

        SHA512

        ce596aa90205d7230c51765bece29823fd9fede174312c788fe1a8c69b8f1876199785c1df59f140033204d9ee78e39180853a5f8c00105acd1c56155b56b928

      • C:\Users\Admin\AppData\Local\Temp\563f1eda4f69c1a676bebedfa87318baf5bc297739dbfec687faea15590d9101.exe.exe

        Filesize

        30KB

        MD5

        0bc6aea4a6e5f575bc2da604905a8114

        SHA1

        8c162fc24a2b2f14489ced504b2d73190f46672a

        SHA256

        9eaa64e0cfd2c7362c3e4d60e681c3326688523f50cb3ef7c8e874a62dcf6328

        SHA512

        ce596aa90205d7230c51765bece29823fd9fede174312c788fe1a8c69b8f1876199785c1df59f140033204d9ee78e39180853a5f8c00105acd1c56155b56b928

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        4f6b7b7dd1e90f9968e5197d34085d7c

        SHA1

        e49e73e61aede77f897b3be38716b22a9ed86e37

        SHA256

        c203da2bf8f27304bf94615ee5c238a6fefed6c557aaf65869306f68955756bf

        SHA512

        4225a9c7c3cd1092ca2215fd915a1bd7cd5cc3f4bc8ffb83909f2a9a0b70b2b08281ae2b9f7302cbc5e4282d0ecf94654e4ce8538218b504fee05ff7b4834da2

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        4f6b7b7dd1e90f9968e5197d34085d7c

        SHA1

        e49e73e61aede77f897b3be38716b22a9ed86e37

        SHA256

        c203da2bf8f27304bf94615ee5c238a6fefed6c557aaf65869306f68955756bf

        SHA512

        4225a9c7c3cd1092ca2215fd915a1bd7cd5cc3f4bc8ffb83909f2a9a0b70b2b08281ae2b9f7302cbc5e4282d0ecf94654e4ce8538218b504fee05ff7b4834da2

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        4f6b7b7dd1e90f9968e5197d34085d7c

        SHA1

        e49e73e61aede77f897b3be38716b22a9ed86e37

        SHA256

        c203da2bf8f27304bf94615ee5c238a6fefed6c557aaf65869306f68955756bf

        SHA512

        4225a9c7c3cd1092ca2215fd915a1bd7cd5cc3f4bc8ffb83909f2a9a0b70b2b08281ae2b9f7302cbc5e4282d0ecf94654e4ce8538218b504fee05ff7b4834da2

      • C:\Windows\rundl132.exe

        Filesize

        26KB

        MD5

        4f6b7b7dd1e90f9968e5197d34085d7c

        SHA1

        e49e73e61aede77f897b3be38716b22a9ed86e37

        SHA256

        c203da2bf8f27304bf94615ee5c238a6fefed6c557aaf65869306f68955756bf

        SHA512

        4225a9c7c3cd1092ca2215fd915a1bd7cd5cc3f4bc8ffb83909f2a9a0b70b2b08281ae2b9f7302cbc5e4282d0ecf94654e4ce8538218b504fee05ff7b4834da2

      • F:\$RECYCLE.BIN\S-1-5-21-86725733-3001458681-3405935542-1000\_desktop.ini

        Filesize

        10B

        MD5

        b00c1a89b15effd3d1fb2de4fdc7bee5

        SHA1

        0c3a4f06bcd397d1d3a63ab2ca05e64cc7ae554d

        SHA256

        0767fccea7e57d6427b0a9b440f28687f4b835409c5dcdeb337a479009222cd9

        SHA512

        b50a3c1df331ecd7dbbd88c202c7b7b8fe6ece8df96249d88f40138952fb3c523f6f133a2d12daa2fd892643b53e4c19b39bcb16ef810f789c996e00bad03bc0

      • \Users\Admin\AppData\Local\Temp\563f1eda4f69c1a676bebedfa87318baf5bc297739dbfec687faea15590d9101.exe

        Filesize

        30KB

        MD5

        0bc6aea4a6e5f575bc2da604905a8114

        SHA1

        8c162fc24a2b2f14489ced504b2d73190f46672a

        SHA256

        9eaa64e0cfd2c7362c3e4d60e681c3326688523f50cb3ef7c8e874a62dcf6328

        SHA512

        ce596aa90205d7230c51765bece29823fd9fede174312c788fe1a8c69b8f1876199785c1df59f140033204d9ee78e39180853a5f8c00105acd1c56155b56b928

      • memory/1400-29-0x0000000002210000-0x0000000002211000-memory.dmp

        Filesize

        4KB

      • memory/2984-17-0x0000000000270000-0x00000000002A4000-memory.dmp

        Filesize

        208KB

      • memory/2984-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2984-15-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3056-21-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3056-41-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3056-47-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3056-94-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3056-100-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3056-153-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3056-1852-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3056-33-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3056-3312-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB