Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    190s
  • max time network
    198s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/12/2023, 07:46

General

  • Target

    fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe

  • Size

    26KB

  • MD5

    bfbdfc7eb7233d2a5ca073ad8e5cd371

  • SHA1

    e6ada9aeebe98324457077c2c361c1379d6b8c3b

  • SHA256

    fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102

  • SHA512

    df3c51954f03f3d6b94acc96e3289fab1a22449d08e1bfff7b665bdbbb8eab2da9bacc61a57d82cce75496dfb1069cbae454df5b1109cb7d061c267ffd507d86

  • SSDEEP

    768:L1ODKAaDMG8H92RwZNQSwcfymNBg+g61GoL:hfgLdQAQfcfymN

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3376
      • C:\Users\Admin\AppData\Local\Temp\fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe
        "C:\Users\Admin\AppData\Local\Temp\fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe"
        2⤵
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:3076
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3268
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            4⤵
              PID:2288

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files\dotnet\dotnet.exe

        Filesize

        165KB

        MD5

        bf7879f1efde2456a29b1c28da9ac675

        SHA1

        1efb07a2ced73dbbc6ecba5d150e5e6815b96e3f

        SHA256

        f799043923d5b12e6d2f8d225dbc7a27ebe1f3cf8b0111ef5622c94fefe3638f

        SHA512

        682bfb159b06c7ef3f088e1e038fba66bbb6c7a8a45836a9fdc635f9b8883803ad52fca17d68aabe0d20ffb772c0ac935327dd60c806df96e4cfef3216035d16

      • F:\$RECYCLE.BIN\S-1-5-21-635608581-3370340891-292606865-1000\_desktop.ini

        Filesize

        10B

        MD5

        34c7bf8c1e8aa0e76a1cb36da6f3c07f

        SHA1

        93bff4db65fd067f94ca08ce2654a2675925b27d

        SHA256

        89ee7da24a1550d124e7ac206a8d49733f819c098eebf27b8c7f28e931a09f53

        SHA512

        ba8fa54ac2e6eafb524f14c7d286d9910afd808ec561c933af8b72a9cdb813e0e7777dc04a9dfdb6c985f27f123ac34a19782d6c0e734f8ab4e9860c9033139b

      • memory/3076-6-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3076-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3076-13-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3076-19-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3076-23-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3076-25-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3076-29-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3076-5-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3076-118-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3076-310-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3076-992-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB