Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    30/10/2023, 15:26

General

  • Target

    fe4431fa5399ae196c0704ba9fd17c537c17fa10d3ab1f03de93b14187366289.exe

  • Size

    205KB

  • MD5

    8dfccea5352f1cbaa222be3a97295a04

  • SHA1

    9fa21ee3307dbf70beef9ea2591b1296911076e6

  • SHA256

    fe4431fa5399ae196c0704ba9fd17c537c17fa10d3ab1f03de93b14187366289

  • SHA512

    fd11aee0246f6456d1994bf56d4992ee9b45f33149b625afeee7dd0d505fbf9c8cea48eb3e6c9a7836bd1e8d055bdddcd1931b2ac5bf564ce036192a82d6dbb7

  • SSDEEP

    3072:KLe9e+ay7hlZQuV94G2mxtZZVl1dbzxtJB3Stk3MAsasMASY49b/EUe:a+ag3VlLbzxtJB3StqMBasMtF/9

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 43 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1248
      • C:\Users\Admin\AppData\Local\Temp\fe4431fa5399ae196c0704ba9fd17c537c17fa10d3ab1f03de93b14187366289.exe
        "C:\Users\Admin\AppData\Local\Temp\fe4431fa5399ae196c0704ba9fd17c537c17fa10d3ab1f03de93b14187366289.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2220
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2672
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            4⤵
              PID:3068
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c C:\Users\Admin\AppData\Local\Temp\$$a43E3.bat
            3⤵
            • Deletes itself
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:2736
            • C:\Users\Admin\AppData\Local\Temp\fe4431fa5399ae196c0704ba9fd17c537c17fa10d3ab1f03de93b14187366289.exe
              "C:\Users\Admin\AppData\Local\Temp\fe4431fa5399ae196c0704ba9fd17c537c17fa10d3ab1f03de93b14187366289.exe"
              4⤵
              • Executes dropped EXE
              PID:2620
          • C:\Windows\Logo1_.exe
            C:\Windows\Logo1_.exe
            3⤵
            • Executes dropped EXE
            • Enumerates connected drives
            • Drops file in Program Files directory
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:2808
            • C:\Windows\SysWOW64\net.exe
              net stop "Kingsoft AntiVirus Service"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:2748
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                5⤵
                  PID:2272
              • C:\Windows\SysWOW64\net.exe
                net stop "Kingsoft AntiVirus Service"
                4⤵
                • Suspicious use of WriteProcessMemory
                PID:2496
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                  5⤵
                    PID:2704

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

            Filesize

            258KB

            MD5

            51b4f29d8825bd236efcf815393c5456

            SHA1

            a2122d7e87d69d3a7695ff8f26a33fb8c388ad8e

            SHA256

            5a2621204f714473e1749c17a1dc19ae693009cbe68a25ddb0923df9b9d0d7ed

            SHA512

            0e11f9781f332255016567d599c444ed784ced58091d034547646273bdc5f21c71bc1e125ae138e30cbfa7202e557152f629a7700ecd8543aee75cbf84023220

          • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

            Filesize

            477KB

            MD5

            e51ebd598953336c3e9723c561316b29

            SHA1

            62c6d722e609183d949dc73731b453e7abb52c5a

            SHA256

            5e51232e5175d937e474c66b0e662b43a71432be7c5cbddc71615424385a62e2

            SHA512

            b42567b0a7114d28c6d400b835f7154fc8f6b0bac1ff6da79d66027cea550676e849614aaf4cc5002acfa123476246d68976f0396c24906009d09a72d79ae9ac

          • C:\Users\Admin\AppData\Local\Temp\$$a43E3.bat

            Filesize

            722B

            MD5

            1ab2ca367fac161250862f34eb39de2e

            SHA1

            c515e98f1aa56abd92bd6ba05ca19ee2a13d51a5

            SHA256

            4707b5d60dc88b9c36ed7408f5156f24eedc04750e58938c471c4cfd2fc40459

            SHA512

            1545a04b422fcd5e56143216e8b5c217825e323f1d5d2a36c48629a84aadd82a5a3bb4b1286bbf100814c6c1bbabc26374afb90fb10d53ac28681b578912a129

          • C:\Users\Admin\AppData\Local\Temp\$$a43E3.bat

            Filesize

            722B

            MD5

            1ab2ca367fac161250862f34eb39de2e

            SHA1

            c515e98f1aa56abd92bd6ba05ca19ee2a13d51a5

            SHA256

            4707b5d60dc88b9c36ed7408f5156f24eedc04750e58938c471c4cfd2fc40459

            SHA512

            1545a04b422fcd5e56143216e8b5c217825e323f1d5d2a36c48629a84aadd82a5a3bb4b1286bbf100814c6c1bbabc26374afb90fb10d53ac28681b578912a129

          • C:\Users\Admin\AppData\Local\Temp\fe4431fa5399ae196c0704ba9fd17c537c17fa10d3ab1f03de93b14187366289.exe

            Filesize

            172KB

            MD5

            39b89cf25d3f4c7a2f880e06b30b4f65

            SHA1

            3b1072078c39ab50f35f2fbabc35c2710b0a7cba

            SHA256

            cf785245b09cc9f4fce024ba1e76e822a0ddbc03a0463397b0f45a80980f4c07

            SHA512

            625b4be3fa64ccde093ad26e2bf92e53a821b337c6ca03f2c8faab4584127df9489fafae42254ffec1ba553f0275e166da99e3ec49cde2a719e97499b9340db4

          • C:\Users\Admin\AppData\Local\Temp\fe4431fa5399ae196c0704ba9fd17c537c17fa10d3ab1f03de93b14187366289.exe.exe

            Filesize

            172KB

            MD5

            39b89cf25d3f4c7a2f880e06b30b4f65

            SHA1

            3b1072078c39ab50f35f2fbabc35c2710b0a7cba

            SHA256

            cf785245b09cc9f4fce024ba1e76e822a0ddbc03a0463397b0f45a80980f4c07

            SHA512

            625b4be3fa64ccde093ad26e2bf92e53a821b337c6ca03f2c8faab4584127df9489fafae42254ffec1ba553f0275e166da99e3ec49cde2a719e97499b9340db4

          • C:\Windows\Logo1_.exe

            Filesize

            33KB

            MD5

            73a05d5388def9405415e6cd7390df4d

            SHA1

            2e10cc2222fc689c769b8b038d00ea26864a27df

            SHA256

            0ada5eed7317cc425ba228162d217403a47d541776b43326289ffcb6e1a2b62d

            SHA512

            8a022de23eb39987b0b881ead96fff79f5c707d7e82e4c3725c90930cf49020cda19f588604494ef1ba580be4f172f15b07baefd2f0ef52a6248c06f43f6fd4f

          • C:\Windows\Logo1_.exe

            Filesize

            33KB

            MD5

            73a05d5388def9405415e6cd7390df4d

            SHA1

            2e10cc2222fc689c769b8b038d00ea26864a27df

            SHA256

            0ada5eed7317cc425ba228162d217403a47d541776b43326289ffcb6e1a2b62d

            SHA512

            8a022de23eb39987b0b881ead96fff79f5c707d7e82e4c3725c90930cf49020cda19f588604494ef1ba580be4f172f15b07baefd2f0ef52a6248c06f43f6fd4f

          • C:\Windows\Logo1_.exe

            Filesize

            33KB

            MD5

            73a05d5388def9405415e6cd7390df4d

            SHA1

            2e10cc2222fc689c769b8b038d00ea26864a27df

            SHA256

            0ada5eed7317cc425ba228162d217403a47d541776b43326289ffcb6e1a2b62d

            SHA512

            8a022de23eb39987b0b881ead96fff79f5c707d7e82e4c3725c90930cf49020cda19f588604494ef1ba580be4f172f15b07baefd2f0ef52a6248c06f43f6fd4f

          • C:\Windows\rundl132.exe

            Filesize

            33KB

            MD5

            73a05d5388def9405415e6cd7390df4d

            SHA1

            2e10cc2222fc689c769b8b038d00ea26864a27df

            SHA256

            0ada5eed7317cc425ba228162d217403a47d541776b43326289ffcb6e1a2b62d

            SHA512

            8a022de23eb39987b0b881ead96fff79f5c707d7e82e4c3725c90930cf49020cda19f588604494ef1ba580be4f172f15b07baefd2f0ef52a6248c06f43f6fd4f

          • F:\$RECYCLE.BIN\S-1-5-21-2084844033-2744876406-2053742436-1000\_desktop.ini

            Filesize

            10B

            MD5

            66a297bdfb8bca17fc70dc7aade38f80

            SHA1

            c131517df089bd22d314c2ad490b391e599e409c

            SHA256

            20b72f923ff58cec359f33b5443b5bc5f5c638b719b6df50a73313c23a434ff7

            SHA512

            c329a6351d692301d88ed2e94afde11919aa2b11b851ae662eed9a8468a61e4e14d1cf0487baf4424047f76bfc1c66b7402794f787638e0bd0da01d03cc25509

          • \Users\Admin\AppData\Local\Temp\fe4431fa5399ae196c0704ba9fd17c537c17fa10d3ab1f03de93b14187366289.exe

            Filesize

            172KB

            MD5

            39b89cf25d3f4c7a2f880e06b30b4f65

            SHA1

            3b1072078c39ab50f35f2fbabc35c2710b0a7cba

            SHA256

            cf785245b09cc9f4fce024ba1e76e822a0ddbc03a0463397b0f45a80980f4c07

            SHA512

            625b4be3fa64ccde093ad26e2bf92e53a821b337c6ca03f2c8faab4584127df9489fafae42254ffec1ba553f0275e166da99e3ec49cde2a719e97499b9340db4

          • \Users\Admin\AppData\Local\Temp\fe4431fa5399ae196c0704ba9fd17c537c17fa10d3ab1f03de93b14187366289.exe

            Filesize

            172KB

            MD5

            39b89cf25d3f4c7a2f880e06b30b4f65

            SHA1

            3b1072078c39ab50f35f2fbabc35c2710b0a7cba

            SHA256

            cf785245b09cc9f4fce024ba1e76e822a0ddbc03a0463397b0f45a80980f4c07

            SHA512

            625b4be3fa64ccde093ad26e2bf92e53a821b337c6ca03f2c8faab4584127df9489fafae42254ffec1ba553f0275e166da99e3ec49cde2a719e97499b9340db4

          • memory/1248-28-0x0000000002AF0000-0x0000000002AF1000-memory.dmp

            Filesize

            4KB

          • memory/2220-16-0x0000000000270000-0x00000000002AF000-memory.dmp

            Filesize

            252KB

          • memory/2220-0-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB

          • memory/2220-18-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB

          • memory/2808-32-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB

          • memory/2808-19-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB

          • memory/2808-1634-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB

          • memory/2808-4088-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB