Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/11/2023, 20:03

General

  • Target

    5a9633f2184ffef3f696d2e6569f3cf2495b901850854e238ed2cb9cad956eca.exe

  • Size

    189KB

  • MD5

    db2d6311917f8ed73c52a9a877261d50

  • SHA1

    d494e922ae64b83200cdd3459bb32666727a5ea3

  • SHA256

    5a9633f2184ffef3f696d2e6569f3cf2495b901850854e238ed2cb9cad956eca

  • SHA512

    c850d9b202a559b8fc78e44c6302992e302a7f8e8a8357f490fc5187e270a801f0fcba95d1c63a8074b8dcf0e1fb80cc513b849bb3e77eb0ee15d1b94f42560a

  • SSDEEP

    3072:XftffjmNoxUJMcR/s6WeTdwzRTcP6+v8G/H4Z2GV9Zqob7ybmOHVb47DXfxcEfVF:PVfjmNDWTzRTcP6u/YZjFqhX27DZcET

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3120
      • C:\Users\Admin\AppData\Local\Temp\5a9633f2184ffef3f696d2e6569f3cf2495b901850854e238ed2cb9cad956eca.exe
        "C:\Users\Admin\AppData\Local\Temp\5a9633f2184ffef3f696d2e6569f3cf2495b901850854e238ed2cb9cad956eca.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:1724
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a77A1.bat
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1048
          • C:\Users\Admin\AppData\Local\Temp\5a9633f2184ffef3f696d2e6569f3cf2495b901850854e238ed2cb9cad956eca.exe
            "C:\Users\Admin\AppData\Local\Temp\5a9633f2184ffef3f696d2e6569f3cf2495b901850854e238ed2cb9cad956eca.exe"
            4⤵
            • Executes dropped EXE
            PID:1108
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:4824
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2508
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:3144

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        251KB

        MD5

        8492f566225e557f3908460cb8d51626

        SHA1

        f9712b88a4825f7869494e8d4c3a2ec560878b89

        SHA256

        1cbcf9daf8569840caad44f23bf4b61296f4b908472e08a5d9e425018002ee81

        SHA512

        6c6649c5464136e5929257abcc5c1fa61c0aae74d43d4332da19ff0aaa4cf683a5dc6d681d1806d8698a0bf7914200bfe14ed5009bc83c267ea2df06d6914874

      • C:\Program Files\7-Zip\7z.exe

        Filesize

        484KB

        MD5

        10486053ce3a4472595173ee8618c91e

        SHA1

        314192d35b19998f7c8f4905066f340ad2ef43af

        SHA256

        3fcf2511baa791e07a985a27bd2be372c64964d216611ebea153cc6c77c06e05

        SHA512

        5f699f70e8e92c164844becd9e57e4a45b2602db75534e0dbe9ed76e7d3fc0e079d9a93af4c42e4f0df1c0e33ddaa8104f91ca7e82bfd826d9cd44e41390662f

      • C:\Users\Admin\AppData\Local\Temp\$$a77A1.bat

        Filesize

        722B

        MD5

        28b239fc49df883e77ec37b4586daa13

        SHA1

        cff80f531f1012a36c0c8dc39f7195149bf115e3

        SHA256

        7340f031b33a203cd8e28a2aadc479e2f69d6d5178b775a5814b5c180a7684a6

        SHA512

        4f7af83a8b7282be7fc9a74d4f1adf55a8229eb7f98a94280ea3587a684661874a92f8c3a9473e1be3342aad1ce69569d8607ffd2dbe16c6b7408e55a4f44753

      • C:\Users\Admin\AppData\Local\Temp\5a9633f2184ffef3f696d2e6569f3cf2495b901850854e238ed2cb9cad956eca.exe

        Filesize

        162KB

        MD5

        c7575c57dd0b3e1d93b98f22281120ce

        SHA1

        6742c7a8f91bc1ad06908767b1bb01302f457bd3

        SHA256

        456be13b7bfd64a3046e06e6732880d99214669bc2c0d648e4ecffd83f9f75a5

        SHA512

        7186f700db928264bd98999732df0af1e14e4015c90658302612c166469e7a19432e3f23a2516c3be1449cf7b15cd6e957b187380598ce81bb29e719be58328b

      • C:\Users\Admin\AppData\Local\Temp\5a9633f2184ffef3f696d2e6569f3cf2495b901850854e238ed2cb9cad956eca.exe.exe

        Filesize

        162KB

        MD5

        c7575c57dd0b3e1d93b98f22281120ce

        SHA1

        6742c7a8f91bc1ad06908767b1bb01302f457bd3

        SHA256

        456be13b7bfd64a3046e06e6732880d99214669bc2c0d648e4ecffd83f9f75a5

        SHA512

        7186f700db928264bd98999732df0af1e14e4015c90658302612c166469e7a19432e3f23a2516c3be1449cf7b15cd6e957b187380598ce81bb29e719be58328b

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        a8cc9593630738ee6e1093a6d7be47ea

        SHA1

        45d401d61a84284452f75e1e028a40d81a9aeb1a

        SHA256

        c5cfbea5959f951bbd93dffc6b569e8c35e315c71ddf07ccbeb1fb3c3730f604

        SHA512

        f32485ad04863eb8819363c488747efc375ced09b30148874688dadfa292ed8dd89c819d420eb4d440fbf9bb6b4f8df29e86d858adc6efa37007edbeb70b62a8

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        a8cc9593630738ee6e1093a6d7be47ea

        SHA1

        45d401d61a84284452f75e1e028a40d81a9aeb1a

        SHA256

        c5cfbea5959f951bbd93dffc6b569e8c35e315c71ddf07ccbeb1fb3c3730f604

        SHA512

        f32485ad04863eb8819363c488747efc375ced09b30148874688dadfa292ed8dd89c819d420eb4d440fbf9bb6b4f8df29e86d858adc6efa37007edbeb70b62a8

      • C:\Windows\rundl132.exe

        Filesize

        26KB

        MD5

        a8cc9593630738ee6e1093a6d7be47ea

        SHA1

        45d401d61a84284452f75e1e028a40d81a9aeb1a

        SHA256

        c5cfbea5959f951bbd93dffc6b569e8c35e315c71ddf07ccbeb1fb3c3730f604

        SHA512

        f32485ad04863eb8819363c488747efc375ced09b30148874688dadfa292ed8dd89c819d420eb4d440fbf9bb6b4f8df29e86d858adc6efa37007edbeb70b62a8

      • F:\$RECYCLE.BIN\S-1-5-21-3350690463-3549324357-1323838019-1000\_desktop.ini

        Filesize

        10B

        MD5

        964ac8d4b418c88016736343238e671b

        SHA1

        bb68a3642be99aa9c113d48e397ad6578a3e9953

        SHA256

        930485019ca5a8337ebfc670ff859a8a828e8d23578a93af9ef0ec302cc4bc2f

        SHA512

        6e17b4086ac2efc6d57f97534b73f6a1465a75d213d0ddabf113c6b669b452ddac6ac43adeaabc3e67be53f1515fd9ff526f065d472d3f1f9a5fea16a6200846

      • memory/1724-8-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1724-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4824-12-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4824-28-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4824-33-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4824-37-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4824-42-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4824-26-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4824-487-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4824-1084-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4824-19-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4824-4646-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB