Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    153s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/10/2023, 01:17

General

  • Target

    563f1eda4f69c1a676bebedfa87318baf5bc297739dbfec687faea15590d9101.exe

  • Size

    56KB

  • MD5

    31d7fcd3d8dc83f7db128907718fa638

  • SHA1

    e598453491a2f82d0daa0635187c5e2b2d87bc79

  • SHA256

    563f1eda4f69c1a676bebedfa87318baf5bc297739dbfec687faea15590d9101

  • SHA512

    6a4f42a67bdf0984cd98843f6d710f730b80b8114140d5d12dd400a7c2e192437a2f8b0db397f27dec0d6b1fe5f545997088f4cbcfe8b9837720c980a484f1a4

  • SSDEEP

    1536:wsfgLdQAQfcfymNU/mMEjpOUuPvOk+hIjBPxw:wsftffjmNAmMEj8nOIRxw

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3236
      • C:\Users\Admin\AppData\Local\Temp\563f1eda4f69c1a676bebedfa87318baf5bc297739dbfec687faea15590d9101.exe
        "C:\Users\Admin\AppData\Local\Temp\563f1eda4f69c1a676bebedfa87318baf5bc297739dbfec687faea15590d9101.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:3728
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a9F9B.bat
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2684
          • C:\Users\Admin\AppData\Local\Temp\563f1eda4f69c1a676bebedfa87318baf5bc297739dbfec687faea15590d9101.exe
            "C:\Users\Admin\AppData\Local\Temp\563f1eda4f69c1a676bebedfa87318baf5bc297739dbfec687faea15590d9101.exe"
            4⤵
            • Executes dropped EXE
            PID:4676
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:4344
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:1032
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:3764

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files\7-Zip\7z.exe

        Filesize

        484KB

        MD5

        26ad1955e49c77461922b8167b40178b

        SHA1

        edad5fd8dc1b6d7c5075e293764fea4297a2e3e6

        SHA256

        8e2ecb63e3e5c25092fa0bd05abae885774fdbb58b5ec0b9ace93fd11b81f79d

        SHA512

        48dd7a625fa33b8da6f41980c0d09395a4e4d3a89e64b9c3657ce46abb1417344d5132ac4963ed1cb0ddc31483d283e00f021029a4d4400287ce3f25e1656c5e

      • C:\Users\Admin\AppData\Local\Temp\$$a9F9B.bat

        Filesize

        722B

        MD5

        456d95dbd06d54d1c8a3132f0e619199

        SHA1

        cca3f844625ad39bb460a9b88d13ecaa7a34c652

        SHA256

        193d8ff922b76ebb027b8db2459406646853f8be92b7b6bbfb0640c541e8eae8

        SHA512

        1f9a233863bea9b8af4c9b8cab83fdb7bf2be40fa2aa64d345b01ecbc18d284d277efe8c0bf3ee865b79503ee467dfc12bf4004c55c5d74dfa6c1e774451d94c

      • C:\Users\Admin\AppData\Local\Temp\563f1eda4f69c1a676bebedfa87318baf5bc297739dbfec687faea15590d9101.exe

        Filesize

        30KB

        MD5

        0bc6aea4a6e5f575bc2da604905a8114

        SHA1

        8c162fc24a2b2f14489ced504b2d73190f46672a

        SHA256

        9eaa64e0cfd2c7362c3e4d60e681c3326688523f50cb3ef7c8e874a62dcf6328

        SHA512

        ce596aa90205d7230c51765bece29823fd9fede174312c788fe1a8c69b8f1876199785c1df59f140033204d9ee78e39180853a5f8c00105acd1c56155b56b928

      • C:\Users\Admin\AppData\Local\Temp\563f1eda4f69c1a676bebedfa87318baf5bc297739dbfec687faea15590d9101.exe.exe

        Filesize

        30KB

        MD5

        0bc6aea4a6e5f575bc2da604905a8114

        SHA1

        8c162fc24a2b2f14489ced504b2d73190f46672a

        SHA256

        9eaa64e0cfd2c7362c3e4d60e681c3326688523f50cb3ef7c8e874a62dcf6328

        SHA512

        ce596aa90205d7230c51765bece29823fd9fede174312c788fe1a8c69b8f1876199785c1df59f140033204d9ee78e39180853a5f8c00105acd1c56155b56b928

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        4f6b7b7dd1e90f9968e5197d34085d7c

        SHA1

        e49e73e61aede77f897b3be38716b22a9ed86e37

        SHA256

        c203da2bf8f27304bf94615ee5c238a6fefed6c557aaf65869306f68955756bf

        SHA512

        4225a9c7c3cd1092ca2215fd915a1bd7cd5cc3f4bc8ffb83909f2a9a0b70b2b08281ae2b9f7302cbc5e4282d0ecf94654e4ce8538218b504fee05ff7b4834da2

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        4f6b7b7dd1e90f9968e5197d34085d7c

        SHA1

        e49e73e61aede77f897b3be38716b22a9ed86e37

        SHA256

        c203da2bf8f27304bf94615ee5c238a6fefed6c557aaf65869306f68955756bf

        SHA512

        4225a9c7c3cd1092ca2215fd915a1bd7cd5cc3f4bc8ffb83909f2a9a0b70b2b08281ae2b9f7302cbc5e4282d0ecf94654e4ce8538218b504fee05ff7b4834da2

      • C:\Windows\rundl132.exe

        Filesize

        26KB

        MD5

        4f6b7b7dd1e90f9968e5197d34085d7c

        SHA1

        e49e73e61aede77f897b3be38716b22a9ed86e37

        SHA256

        c203da2bf8f27304bf94615ee5c238a6fefed6c557aaf65869306f68955756bf

        SHA512

        4225a9c7c3cd1092ca2215fd915a1bd7cd5cc3f4bc8ffb83909f2a9a0b70b2b08281ae2b9f7302cbc5e4282d0ecf94654e4ce8538218b504fee05ff7b4834da2

      • F:\$RECYCLE.BIN\S-1-5-21-2344688013-2965468717-2034126-1000\_desktop.ini

        Filesize

        10B

        MD5

        b00c1a89b15effd3d1fb2de4fdc7bee5

        SHA1

        0c3a4f06bcd397d1d3a63ab2ca05e64cc7ae554d

        SHA256

        0767fccea7e57d6427b0a9b440f28687f4b835409c5dcdeb337a479009222cd9

        SHA512

        b50a3c1df331ecd7dbbd88c202c7b7b8fe6ece8df96249d88f40138952fb3c523f6f133a2d12daa2fd892643b53e4c19b39bcb16ef810f789c996e00bad03bc0

      • memory/3728-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3728-9-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4344-27-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4344-19-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4344-33-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4344-38-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4344-42-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4344-8-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4344-317-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4344-1279-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4344-1281-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB