Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    13/11/2023, 16:37

General

  • Target

    9fc5f5f6bcb78091cc54e6857dacd4270bed00771040ebe0c236a15866507a07.exe

  • Size

    585KB

  • MD5

    6de4dc36a48a6bbb75f008697a6becc1

  • SHA1

    7abf7e6762b9ef2db74ce8a69e3ea2c3be63c567

  • SHA256

    9fc5f5f6bcb78091cc54e6857dacd4270bed00771040ebe0c236a15866507a07

  • SHA512

    780bdabbbff0870ccfce07f45563cfdeca35d3522c4beefcc378c900bc0d5d9e19be07d535e8ad377a0ef859cd45c454077cce5855f56acd1dc2b826b9a63abc

  • SSDEEP

    12288:fYNsM2JDT5oGuNJ3+kqW86JwclTx/nGAUx0xRpbgye4hdTXlUXJdDstj:fo6KRpsvq5KLstj

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1248
      • C:\Users\Admin\AppData\Local\Temp\9fc5f5f6bcb78091cc54e6857dacd4270bed00771040ebe0c236a15866507a07.exe
        "C:\Users\Admin\AppData\Local\Temp\9fc5f5f6bcb78091cc54e6857dacd4270bed00771040ebe0c236a15866507a07.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:2508
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\$$a3E0A.bat
          3⤵
          • Deletes itself
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:2416
          • C:\Users\Admin\AppData\Local\Temp\9fc5f5f6bcb78091cc54e6857dacd4270bed00771040ebe0c236a15866507a07.exe
            "C:\Users\Admin\AppData\Local\Temp\9fc5f5f6bcb78091cc54e6857dacd4270bed00771040ebe0c236a15866507a07.exe"
            4⤵
            • Executes dropped EXE
            PID:2852
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2288
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2844
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:2860

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        254KB

        MD5

        568f17750238ab463c745953a303648a

        SHA1

        25e9de37d6edb52c584c442e4f93a0448b4b37d4

        SHA256

        5351b82387339c78b116a077f2ba633da2a6fef86a165d92bfe28c2c3770ac81

        SHA512

        9034bc060e8155e07009d2142830f03b29c50525232fa1719038eae4fc742d460c5dad7b7fdd6957264c338072fbe71193a23d994510dc809ae240023b9f1ed3

      • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

        Filesize

        474KB

        MD5

        82d95ff3c368229d3ecd547bfc2e95e4

        SHA1

        05c2c8065f243260792924168f85c614057119e8

        SHA256

        5fd8262ebaf159fa1ba5a2b80dad6f98477d1f549a651fc1a327f0dd207f2fdb

        SHA512

        27815b93d6070f7026c23ceac6210a78e694616d6a6a2012369b271e2d2ec986438f80dd3a29db4c4419b08084cb5a5914af216177669b86d8e2ae7184691699

      • C:\Users\Admin\AppData\Local\Temp\$$a3E0A.bat

        Filesize

        722B

        MD5

        1310dc98b5909c90867856291a2a1305

        SHA1

        ce25137a831d17161a85b7e8c1290a5f4e2429a4

        SHA256

        d4c23edf28737aa0c7a6178d2a50d616a0c775117699663e7fdfb6989d95d7f5

        SHA512

        40c20f40f5bcf02ca660018338c0845e8cccfecea1b2b6794d1d44d9ad1bbb1894a907df2f2a645e72c4ca16af9f23f85d7591f74dafe64c38097b771a329927

      • C:\Users\Admin\AppData\Local\Temp\$$a3E0A.bat

        Filesize

        722B

        MD5

        1310dc98b5909c90867856291a2a1305

        SHA1

        ce25137a831d17161a85b7e8c1290a5f4e2429a4

        SHA256

        d4c23edf28737aa0c7a6178d2a50d616a0c775117699663e7fdfb6989d95d7f5

        SHA512

        40c20f40f5bcf02ca660018338c0845e8cccfecea1b2b6794d1d44d9ad1bbb1894a907df2f2a645e72c4ca16af9f23f85d7591f74dafe64c38097b771a329927

      • C:\Users\Admin\AppData\Local\Temp\9fc5f5f6bcb78091cc54e6857dacd4270bed00771040ebe0c236a15866507a07.exe

        Filesize

        556KB

        MD5

        1011236b2cbd03b55a8b31ac429355f2

        SHA1

        fe255c9f9d40f654000dc64d3b8877758b4c73ca

        SHA256

        7c74e8d992dd08770fed30a50c94c5a968c1c83be883df03e4452e74ea9ae66a

        SHA512

        8b205690c4b068a170a7cb21a12ca35b323845f080038f4d84788b5a5973698abdc7141801737462e99df7ce5902cff3e56e62d2e600844b19d1c24eef94f953

      • C:\Users\Admin\AppData\Local\Temp\9fc5f5f6bcb78091cc54e6857dacd4270bed00771040ebe0c236a15866507a07.exe.exe

        Filesize

        556KB

        MD5

        1011236b2cbd03b55a8b31ac429355f2

        SHA1

        fe255c9f9d40f654000dc64d3b8877758b4c73ca

        SHA256

        7c74e8d992dd08770fed30a50c94c5a968c1c83be883df03e4452e74ea9ae66a

        SHA512

        8b205690c4b068a170a7cb21a12ca35b323845f080038f4d84788b5a5973698abdc7141801737462e99df7ce5902cff3e56e62d2e600844b19d1c24eef94f953

      • C:\Windows\Logo1_.exe

        Filesize

        29KB

        MD5

        886eb3bf6157b45d4a041e1e32608c70

        SHA1

        f476a007366ac0349789b0e803ec46be523f457a

        SHA256

        a0e9eac517b54fe732db8bf9ceeb76c64a43e2e53bfd18b5a4ab0f8475f3873b

        SHA512

        6e978385b23d3054695eaf2209e92591a667ccbde747f69cb63ae28f2db3a362d136bf16afb41ceb8eb304161cc698853f9cb825a26cc683e9a693d07c190fca

      • C:\Windows\Logo1_.exe

        Filesize

        29KB

        MD5

        886eb3bf6157b45d4a041e1e32608c70

        SHA1

        f476a007366ac0349789b0e803ec46be523f457a

        SHA256

        a0e9eac517b54fe732db8bf9ceeb76c64a43e2e53bfd18b5a4ab0f8475f3873b

        SHA512

        6e978385b23d3054695eaf2209e92591a667ccbde747f69cb63ae28f2db3a362d136bf16afb41ceb8eb304161cc698853f9cb825a26cc683e9a693d07c190fca

      • C:\Windows\Logo1_.exe

        Filesize

        29KB

        MD5

        886eb3bf6157b45d4a041e1e32608c70

        SHA1

        f476a007366ac0349789b0e803ec46be523f457a

        SHA256

        a0e9eac517b54fe732db8bf9ceeb76c64a43e2e53bfd18b5a4ab0f8475f3873b

        SHA512

        6e978385b23d3054695eaf2209e92591a667ccbde747f69cb63ae28f2db3a362d136bf16afb41ceb8eb304161cc698853f9cb825a26cc683e9a693d07c190fca

      • C:\Windows\rundl132.exe

        Filesize

        29KB

        MD5

        886eb3bf6157b45d4a041e1e32608c70

        SHA1

        f476a007366ac0349789b0e803ec46be523f457a

        SHA256

        a0e9eac517b54fe732db8bf9ceeb76c64a43e2e53bfd18b5a4ab0f8475f3873b

        SHA512

        6e978385b23d3054695eaf2209e92591a667ccbde747f69cb63ae28f2db3a362d136bf16afb41ceb8eb304161cc698853f9cb825a26cc683e9a693d07c190fca

      • F:\$RECYCLE.BIN\S-1-5-21-2084844033-2744876406-2053742436-1000\_desktop.ini

        Filesize

        10B

        MD5

        7af371ae7aad351d505f1b26382de243

        SHA1

        0a19bf0a1ccfb902a03b3da68bdd289190e62f5f

        SHA256

        4fcc643d52dbc25dd57a011e27cbb0503711cf1a2ad1610a4f9e7b9f17c5bc1b

        SHA512

        1127b9c88de9e2d58f7a512dd52c31bb9d96b0543f13e4cfff59ca2b73e60307538dd9bcd1c480e6d260fe45b44208a5554a5a60e8c2e3da8385b2cdd0e77d3e

      • \Users\Admin\AppData\Local\Temp\9fc5f5f6bcb78091cc54e6857dacd4270bed00771040ebe0c236a15866507a07.exe

        Filesize

        556KB

        MD5

        1011236b2cbd03b55a8b31ac429355f2

        SHA1

        fe255c9f9d40f654000dc64d3b8877758b4c73ca

        SHA256

        7c74e8d992dd08770fed30a50c94c5a968c1c83be883df03e4452e74ea9ae66a

        SHA512

        8b205690c4b068a170a7cb21a12ca35b323845f080038f4d84788b5a5973698abdc7141801737462e99df7ce5902cff3e56e62d2e600844b19d1c24eef94f953

      • memory/1248-29-0x0000000002AF0000-0x0000000002AF1000-memory.dmp

        Filesize

        4KB

      • memory/2288-21-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2288-31-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2288-38-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2288-45-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2288-91-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2288-97-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2288-187-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2288-1850-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2288-3310-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2508-0-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2508-39-0x0000000000260000-0x0000000000296000-memory.dmp

        Filesize

        216KB

      • memory/2508-20-0x0000000000260000-0x0000000000296000-memory.dmp

        Filesize

        216KB

      • memory/2508-15-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB