Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/01/2024, 19:40

General

  • Target

    15cec831b12a0713a14a38c3d8a1a067adb86e538fb599296a09c8dc5bc8b364.exe

  • Size

    530KB

  • MD5

    17b18fad091a105b7adc27ad2545bbdc

  • SHA1

    13f8144b240ca6df7847b86d610b07bc811bb40b

  • SHA256

    15cec831b12a0713a14a38c3d8a1a067adb86e538fb599296a09c8dc5bc8b364

  • SHA512

    42881a8068d3d74acbd29ac36fe33ad2179ce1cd1ddc7fe76154e06d5b39c86dbbbb8f27ae0659220555a559aa8d2e367a60b01744b0d3e25e0b0a1bec69f74d

  • SSDEEP

    12288:w7+oqb61gjjtmevCClxPZyH2WaGWcZywmITc5kOCexlBGu8dKOU5:w75q+1KhmOgH26WcZywmITc5kOCexlBD

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\15cec831b12a0713a14a38c3d8a1a067adb86e538fb599296a09c8dc5bc8b364.exe
    "C:\Users\Admin\AppData\Local\Temp\15cec831b12a0713a14a38c3d8a1a067adb86e538fb599296a09c8dc5bc8b364.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:4092
    • C:\Windows\Logo1_.exe
      C:\Windows\Logo1_.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4776
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a5350.bat
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2112
  • C:\Windows\SysWOW64\net.exe
    net stop "Kingsoft AntiVirus Service"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3792
    • C:\Windows\SysWOW64\net1.exe
      C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
      2⤵
        PID:4556
    • C:\Users\Admin\AppData\Local\Temp\15cec831b12a0713a14a38c3d8a1a067adb86e538fb599296a09c8dc5bc8b364.exe
      "C:\Users\Admin\AppData\Local\Temp\15cec831b12a0713a14a38c3d8a1a067adb86e538fb599296a09c8dc5bc8b364.exe"
      1⤵
      • Executes dropped EXE
      PID:2420
    • C:\Windows\Explorer.EXE
      C:\Windows\Explorer.EXE
      1⤵
        PID:3404

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        251KB

        MD5

        c65bcc4201f7f618a8ce6de5677fa65a

        SHA1

        2992b7d62355470ced5ed4bc5a640f2cf8978278

        SHA256

        d460b00e491d72836b5f489a1c506f03077eda1ceaf7f0fb07bbe6c66c0e0962

        SHA512

        d2b45731d044e91583ef3bde0e33f0c6131ba2145a9211aa866c61cde5d07de2522e3f8713adcc40d5e897789b62eb891f275c2c074c47ceb3934a8fbf2c74cc

      • C:\Program Files\InitializeSync.exe

        Filesize

        346KB

        MD5

        d9b9b3063977f4ae7a527eaf07729d1e

        SHA1

        2015733a03983ddd9e3cdbd96a62b743ebdfd360

        SHA256

        ae424ae7c34858cf832153baefe37454a9af548b15b9a039a7b0fde2169f9c91

        SHA512

        c8b995ccfc22d8cffef594e0956ae02489fea753ee325f32c4ca98d88544fed567554a85654bd3486b4be47705b178757ed62cf404670c321b2fae9973721794

      • C:\ProgramData\Package Cache\{61087a79-ac85-455c-934d-1fa22cc64f36}\vcredist_x86.exe

        Filesize

        481KB

        MD5

        1db5b390daa2d070657fbdb4f5d2cc55

        SHA1

        77e633e49df484b827080753514cc376749b0ceb

        SHA256

        d5fbaf5c0d8e313d4dad23b28cac4256c5dbed6ab3b0d797e2971f30c5e095ad

        SHA512

        68aa0152f5aae79a146c1813915fd16ec5454b285bd1781370923f97d6c147d53684192f7f4161e5c1a340959ec432ecaac127b0abe7d08f70c387e08ee4f617

      • C:\Users\Admin\AppData\Local\Temp\$$a5350.bat

        Filesize

        722B

        MD5

        1f5071ab7c25146b764c75b48afc34b1

        SHA1

        e4c72052eb053a01c8ef355ec79e68b01a912575

        SHA256

        bd80dc3c1d07a0bf06f975f782d5f185eb2c3621ae272974a739b7a635f1d1dc

        SHA512

        ee5eec7abc5cbc9e95ccb52516c7063f54e5ee60a47eede374b398d0a1808f67932da8a4b82609ce764ea1573c44b456f59ea0d35418d4058e765ded4d0fb580

      • C:\Users\Admin\AppData\Local\Temp\15cec831b12a0713a14a38c3d8a1a067adb86e538fb599296a09c8dc5bc8b364.exe

        Filesize

        57KB

        MD5

        a95151cf7ee2a332b592da49728cdfa7

        SHA1

        83ab52e98b685455733644007e3abe5ed37cca16

        SHA256

        b7d52c503048ea4713ada662469994aa8698f05e67abf66ef9a3479d7cbbcc26

        SHA512

        67e593af62cf56119a4e8f117664a9a4867faee722553e88c3fe66047ad6239c992ea607ab5c6e92891e5d817368c4be8ab6970db24d5b22e05b60e7f330401d

      • C:\Users\Admin\AppData\Local\Temp\15cec831b12a0713a14a38c3d8a1a067adb86e538fb599296a09c8dc5bc8b364.exe.exe

        Filesize

        74KB

        MD5

        3288de45c18e4b91793724b044cd34ef

        SHA1

        963146966c52c5cce7880fbb0e0d104352e2e849

        SHA256

        fcd7e5b0b148569173e56048884c481b3e7bf8db1ab4f80ed7da615f98711c93

        SHA512

        58fad6f8e5b82c1366df83a128b141fe5260d4fb4050992135e6c5481feed0f327d0d3e6890531feb509533f42a02a8a0f56da45ac07e1e8ad34078014e1451c

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        736bfccf89b0055bacacf13bc37b50ce

        SHA1

        dabc333f28e954f49aa80a3b0531160ae5bdec82

        SHA256

        6fa3aa279929eee03df371ace16a751b2184da323b9c72ab97bb36c947aa12c3

        SHA512

        a7af014c4f8d3af22c2fe20fbd50a6c52d17d77adf0e59365e67c98fbdbd4890a96d2b010e42728bb33f92ab468e1ec50449fb97c10c3204ac13c49d9ef8d578

      • F:\$RECYCLE.BIN\S-1-5-21-3803511929-1339359695-2191195476-1000\_desktop.ini

        Filesize

        9B

        MD5

        43bfb8ec11aeaf165dc2b4ae60ab3be3

        SHA1

        cb410a309b1a56ae5fdda61d68b9d41e1e4d8128

        SHA256

        edb9cece5d0056ab9be898bb317a3712b9d0db010a9455c6e265c6b5e85774a0

        SHA512

        2f192df131177ea8f969aaa1883fafe9e463eca96c31ca48b506ed94d7d86e06dc88885df587c46efe61a366b97dd79aa56f8c6fb1bfd7759894132db3a8dfa5

      • memory/4092-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4092-8-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4776-26-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4776-33-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4776-37-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4776-41-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4776-19-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4776-1005-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4776-1168-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4776-4719-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4776-12-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB