Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    151s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/11/2023, 16:37

General

  • Target

    9fc5f5f6bcb78091cc54e6857dacd4270bed00771040ebe0c236a15866507a07.exe

  • Size

    585KB

  • MD5

    6de4dc36a48a6bbb75f008697a6becc1

  • SHA1

    7abf7e6762b9ef2db74ce8a69e3ea2c3be63c567

  • SHA256

    9fc5f5f6bcb78091cc54e6857dacd4270bed00771040ebe0c236a15866507a07

  • SHA512

    780bdabbbff0870ccfce07f45563cfdeca35d3522c4beefcc378c900bc0d5d9e19be07d535e8ad377a0ef859cd45c454077cce5855f56acd1dc2b826b9a63abc

  • SSDEEP

    12288:fYNsM2JDT5oGuNJ3+kqW86JwclTx/nGAUx0xRpbgye4hdTXlUXJdDstj:fo6KRpsvq5KLstj

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3176
      • C:\Users\Admin\AppData\Local\Temp\9fc5f5f6bcb78091cc54e6857dacd4270bed00771040ebe0c236a15866507a07.exe
        "C:\Users\Admin\AppData\Local\Temp\9fc5f5f6bcb78091cc54e6857dacd4270bed00771040ebe0c236a15866507a07.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:4156
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aDFA2.bat
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1696
          • C:\Users\Admin\AppData\Local\Temp\9fc5f5f6bcb78091cc54e6857dacd4270bed00771040ebe0c236a15866507a07.exe
            "C:\Users\Admin\AppData\Local\Temp\9fc5f5f6bcb78091cc54e6857dacd4270bed00771040ebe0c236a15866507a07.exe"
            4⤵
            • Executes dropped EXE
            PID:3192
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:4752
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:4344
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:1392

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        254KB

        MD5

        568f17750238ab463c745953a303648a

        SHA1

        25e9de37d6edb52c584c442e4f93a0448b4b37d4

        SHA256

        5351b82387339c78b116a077f2ba633da2a6fef86a165d92bfe28c2c3770ac81

        SHA512

        9034bc060e8155e07009d2142830f03b29c50525232fa1719038eae4fc742d460c5dad7b7fdd6957264c338072fbe71193a23d994510dc809ae240023b9f1ed3

      • C:\Program Files\7-Zip\7z.exe

        Filesize

        487KB

        MD5

        bf1bbfb3abc86e299017bcb5474595bf

        SHA1

        def80689c4abc742c6dcf47e68f362ec0efd1681

        SHA256

        a89f39f3f9ac3f8397818e9052f9c8cc2a74810b5c7cb6c313f4c91c898a7236

        SHA512

        063e46c0c3898e51c5ce35c67a079e9431ef356a8c4d532b9e8a5e8f4b4c2224fc067b5b40a3d3cebc3933345d45e93ea59782d8b887a41d1d1c7881bb00bd97

      • C:\Users\Admin\AppData\Local\Temp\$$aDFA2.bat

        Filesize

        722B

        MD5

        7239344ae59448779f057df16e7184c6

        SHA1

        5eedd8d245f4dc6bfeaea277ca45510e2e0d9f81

        SHA256

        dc3ac17c9a70819e941b739db0c7d4ae16179d4ba8320d376139008549a742d6

        SHA512

        28ab6ed0c9532a8bd3fe3ca15404ac89e5d29033cd79b593e757430dbee12c1305dd8b94e5c5f641ac746857a1f64b479ec34ffdf6a2d93d65ff64bcc42e0ad4

      • C:\Users\Admin\AppData\Local\Temp\9fc5f5f6bcb78091cc54e6857dacd4270bed00771040ebe0c236a15866507a07.exe

        Filesize

        556KB

        MD5

        1011236b2cbd03b55a8b31ac429355f2

        SHA1

        fe255c9f9d40f654000dc64d3b8877758b4c73ca

        SHA256

        7c74e8d992dd08770fed30a50c94c5a968c1c83be883df03e4452e74ea9ae66a

        SHA512

        8b205690c4b068a170a7cb21a12ca35b323845f080038f4d84788b5a5973698abdc7141801737462e99df7ce5902cff3e56e62d2e600844b19d1c24eef94f953

      • C:\Users\Admin\AppData\Local\Temp\9fc5f5f6bcb78091cc54e6857dacd4270bed00771040ebe0c236a15866507a07.exe.exe

        Filesize

        556KB

        MD5

        1011236b2cbd03b55a8b31ac429355f2

        SHA1

        fe255c9f9d40f654000dc64d3b8877758b4c73ca

        SHA256

        7c74e8d992dd08770fed30a50c94c5a968c1c83be883df03e4452e74ea9ae66a

        SHA512

        8b205690c4b068a170a7cb21a12ca35b323845f080038f4d84788b5a5973698abdc7141801737462e99df7ce5902cff3e56e62d2e600844b19d1c24eef94f953

      • C:\Windows\Logo1_.exe

        Filesize

        29KB

        MD5

        886eb3bf6157b45d4a041e1e32608c70

        SHA1

        f476a007366ac0349789b0e803ec46be523f457a

        SHA256

        a0e9eac517b54fe732db8bf9ceeb76c64a43e2e53bfd18b5a4ab0f8475f3873b

        SHA512

        6e978385b23d3054695eaf2209e92591a667ccbde747f69cb63ae28f2db3a362d136bf16afb41ceb8eb304161cc698853f9cb825a26cc683e9a693d07c190fca

      • C:\Windows\Logo1_.exe

        Filesize

        29KB

        MD5

        886eb3bf6157b45d4a041e1e32608c70

        SHA1

        f476a007366ac0349789b0e803ec46be523f457a

        SHA256

        a0e9eac517b54fe732db8bf9ceeb76c64a43e2e53bfd18b5a4ab0f8475f3873b

        SHA512

        6e978385b23d3054695eaf2209e92591a667ccbde747f69cb63ae28f2db3a362d136bf16afb41ceb8eb304161cc698853f9cb825a26cc683e9a693d07c190fca

      • C:\Windows\rundl132.exe

        Filesize

        29KB

        MD5

        886eb3bf6157b45d4a041e1e32608c70

        SHA1

        f476a007366ac0349789b0e803ec46be523f457a

        SHA256

        a0e9eac517b54fe732db8bf9ceeb76c64a43e2e53bfd18b5a4ab0f8475f3873b

        SHA512

        6e978385b23d3054695eaf2209e92591a667ccbde747f69cb63ae28f2db3a362d136bf16afb41ceb8eb304161cc698853f9cb825a26cc683e9a693d07c190fca

      • F:\$RECYCLE.BIN\S-1-5-21-2231940048-779848787-2990559741-1000\_desktop.ini

        Filesize

        10B

        MD5

        7af371ae7aad351d505f1b26382de243

        SHA1

        0a19bf0a1ccfb902a03b3da68bdd289190e62f5f

        SHA256

        4fcc643d52dbc25dd57a011e27cbb0503711cf1a2ad1610a4f9e7b9f17c5bc1b

        SHA512

        1127b9c88de9e2d58f7a512dd52c31bb9d96b0543f13e4cfff59ca2b73e60307538dd9bcd1c480e6d260fe45b44208a5554a5a60e8c2e3da8385b2cdd0e77d3e

      • memory/4156-0-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/4156-8-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/4752-39-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/4752-32-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/4752-37-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/4752-26-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/4752-9-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/4752-563-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/4752-1084-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/4752-3842-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/4752-19-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/4752-4636-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB