Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    24/12/2023, 16:26

General

  • Target

    RUSSKAYA-GOLAYA.exe

  • Size

    180KB

  • MD5

    fdc849111653249dd6ebe00d6d293760

  • SHA1

    ece8bcb2bd22dfbe218e8c9104d2813bc624ec31

  • SHA256

    538b9ff9b6e06025b93fa25ebbf7d06f7280813b97e826b7413981ae543d7429

  • SHA512

    83e22626e4c46324d2d0cc60a545e4341123aeca1d96c9d23925e441cda137bfbb3ff463acba3514a896d9fb8851ffdf63248f628fed14e0df07b3e013c64866

  • SSDEEP

    3072:TBAp5XhKpN4eOyVTGfhEClj8jTk+0hg/eSZZvLf6CNsPrXJ8WYQKaLl:+bXE9OiTGfhEClq9vGSZZvLCCNsPrXJh

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Drops file in Drivers directory 3 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\RUSSKAYA-GOLAYA.exe
    "C:\Users\Admin\AppData\Local\Temp\RUSSKAYA-GOLAYA.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:2664
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Program Files (x86)\primarily the African oil palm\Palm oil is an edible vegetable\palm\Crudepalmilutures.bat" "
      2⤵
      • Drops file in Drivers directory
      PID:2728
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\primarily the African oil palm\Palm oil is an edible vegetable\palm\yellowishfattyilobtained.vbs"
      2⤵
      • Drops file in Drivers directory
      PID:2592
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\primarily the African oil palm\Palm oil is an edible vegetable\palm\conservationistsandother.vbs"
      2⤵
      • Blocklisted process makes network request
      PID:1808

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\primarily the African oil palm\Palm oil is an edible vegetable\palm\Crudepalmilutures.bat

    Filesize

    618B

    MD5

    95df14b25a47ba59c8c55ae624260575

    SHA1

    680ff195daaed58014e59cf89d4626b4a68ab8a4

    SHA256

    97e108f9a7186f2c87c37410f8bd63adf51eff8320a1781bd2da47f761a35895

    SHA512

    50d923c6356acb1c210a34423f44ef18bd97ca755da39c191335d72e03d37d5220b997e061316485c341d48de1186c990280458306ebb59e9a16d5167ea60440

  • C:\Program Files (x86)\primarily the African oil palm\Palm oil is an edible vegetable\palm\Elaeioleiferandhemar.ipa

    Filesize

    74B

    MD5

    a53a5a1f903850e67c4009f69cab52df

    SHA1

    5b5c3a9ceb8d3d589bb547e4828ee5aa5ad2d251

    SHA256

    87b2b49c62d2b891333b6e211e81fe8c07259639baa20f2fecea09034f857924

    SHA512

    936b05b93daf666b808782b80a46fa85a7e1b43dae813759c9e5c0f80aae9769ee1d196c5be53528d9966de6c3f834aa8a06d1e4350efeb04e41eeac7f796875

  • C:\Program Files (x86)\primarily the African oil palm\Palm oil is an edible vegetable\palm\conservationistsandother.vbs

    Filesize

    493B

    MD5

    8431f160c6a617cb24571d81b5174dbc

    SHA1

    75efd043ba0c106de481e0f26e39c0ad8acdb74e

    SHA256

    e2f37d318f2009a54cf5a0ddbb20734506c96cfe8a7e3a30f89453b4814f0871

    SHA512

    82c963916389ae787fa5061ba9dcf36ebca785bab3850aa19070c21de2037b0f40f0b2e6888247755bd29920fa5fbf9e7ce1c80a59a249888e8ecdde836922ca

  • C:\Program Files (x86)\primarily the African oil palm\Palm oil is an edible vegetable\palm\yellowishfattyilobtained.vbs

    Filesize

    625B

    MD5

    ccfc768d46340bcfb9008809574ec464

    SHA1

    3d5b301a993eb1f5337829972f4c00cb416286fb

    SHA256

    aed09b8a54524d57146b6820d0b1bb4c0ee9c3ed63b9653b51cb989888335412

    SHA512

    cab7625f46269fb26431a978dbb37d71f5295fa3beef46aa38c6f6abf7ee97bdd4ceb726d7e2462df740bb12e4ba763a0cc232d3bf525934149deb895a715db4

  • C:\Windows\System32\drivers\etc\hosts

    Filesize

    1KB

    MD5

    b1a83c2c02778e64afacccb5ae10c5c7

    SHA1

    32dbbc35a592c7fcad91b2813353b24da801cb01

    SHA256

    c2755cb37781c6c43ef83788ba6f6afc2fdeddc54779135daf6493b099a5215e

    SHA512

    2e1390d764f539ce909f9e039c2419453f8ae051f284c384bd624f77151f087e8255750a00a051cad7f2629a8b1df7c7c13b9d51260a9620e32640abdac25e15

  • memory/2664-45-0x0000000000400000-0x0000000000432000-memory.dmp

    Filesize

    200KB