Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/02/2024, 22:22

General

  • Target

    adde0c7d43f4b198ac9a875a34df4e0a4e9b16f7fffdb5d0d72b2339c0a81331.exe

  • Size

    3.3MB

  • MD5

    7a077ab20849b6cc5c9182f89f579d2f

  • SHA1

    bdfbd17751abf641a8c2a349c8387fd829d8e7ce

  • SHA256

    adde0c7d43f4b198ac9a875a34df4e0a4e9b16f7fffdb5d0d72b2339c0a81331

  • SHA512

    f6a0bdd22098ea3a5f78704736cdfb132e177da0e3bc68b4030a630cc8782d92e091088cde186c39751811e270d514a4f0404b2660b776e6415c7851e8c07a62

  • SSDEEP

    98304:ZnQwzmQe7A3gATZ0HTEUj2bTmLQHZ7Jg6ZVeFVvnAfZBd:ZQ4uIULL6VyVvnAf

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3436
      • C:\Users\Admin\AppData\Local\Temp\adde0c7d43f4b198ac9a875a34df4e0a4e9b16f7fffdb5d0d72b2339c0a81331.exe
        "C:\Users\Admin\AppData\Local\Temp\adde0c7d43f4b198ac9a875a34df4e0a4e9b16f7fffdb5d0d72b2339c0a81331.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:4232
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a5A36.bat
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3892
          • C:\Users\Admin\AppData\Local\Temp\adde0c7d43f4b198ac9a875a34df4e0a4e9b16f7fffdb5d0d72b2339c0a81331.exe
            "C:\Users\Admin\AppData\Local\Temp\adde0c7d43f4b198ac9a875a34df4e0a4e9b16f7fffdb5d0d72b2339c0a81331.exe"
            4⤵
            • Executes dropped EXE
            PID:2096
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1708
    • C:\Windows\SysWOW64\net.exe
      net stop "Kingsoft AntiVirus Service"
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:3032
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
        2⤵
          PID:1488

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        251KB

        MD5

        7ef2913fc272a57a19fcf8462455aa97

        SHA1

        f39caed4f4bad2eaa6c7830771c42227bc1831f4

        SHA256

        e8629b61eb536fd383d308f941b792af2be1744c87bcadb83e5bce5b35e1394a

        SHA512

        6af4857c1b41f65fb826f81beca5df0f68b314c865813ece879dd32f353a7adbe4d2f9ca0c3af2e447338e74fd45e3669ded0c21f1c99f3d9641b389d03d1c02

      • C:\Program Files\7-Zip\7z.exe

        Filesize

        570KB

        MD5

        c6105dcd0bea25a20bc055f582b9ffd1

        SHA1

        8c0f8584be913f06a39443a60f32edd80eaf740b

        SHA256

        021a02646fa073494f1df66ebb42cd9b72549ca53396e13797a6dddb65cc2b1a

        SHA512

        dacbcacb68bd5bfe795561493f1a9921fded748e1a29887b3551c520719af2d3c6d5a207d594b0a8a509f4c93c3994990020e71a8ef04cb199153320b138763e

      • C:\Users\Admin\AppData\Local\Temp\$$a5A36.bat

        Filesize

        722B

        MD5

        9d0ef63f1a098bb82ff0389a0c4cca64

        SHA1

        c78e0231f0270c7d5688e39e84e5c5ee339ef610

        SHA256

        f8f95184825141c8c6397f50e930ea563ca124e7e2fcd208a5553491c413c77a

        SHA512

        123b4143eade9ae0a6c4d8f84a69173434fdf635da45eebd30576c09aeea00ef50a7da626506c747a3333bb07eb405b7795ad1afb7f916c6fff6742da7996408

      • C:\Users\Admin\AppData\Local\Temp\adde0c7d43f4b198ac9a875a34df4e0a4e9b16f7fffdb5d0d72b2339c0a81331.exe.exe

        Filesize

        3.3MB

        MD5

        d212ca9a75494cf665901f63f4d9b422

        SHA1

        88be01da898259b61f3a5a92496b5967ef3b57e5

        SHA256

        6401ce76a781fa0e430f55b49f4b35e34c8ab5c92f7e3d28655a13ba89a5a598

        SHA512

        ff5d14f6a53d6569f1d56c5019bbf4ca67b90ae80ce34d7013732edd49062643e6b47c42f3118af4e79ecb133763a85fe66d522f7d9a4203d8da894dc21e683e

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        0901dc82d2fca942701b9f12bc1fd530

        SHA1

        6913b4c6a6ce2c7e162e986fe74cb5c135af37ac

        SHA256

        3bb60e8cfe0ffd2e771c2382401f634b2194d8883a42716bc46cf132ac163150

        SHA512

        9b1913e0641f72b7d1e9f8066266a50f1c4ee5ec0ea7432ece057f6db8636d9eaa507d5137f796015d27511563a75093890bd4b5d54d3c1dac750eab658a6c41

      • F:\$RECYCLE.BIN\S-1-5-21-2097088205-1470669305-146258644-1000\_desktop.ini

        Filesize

        9B

        MD5

        b347a774e254ac3f0d6aaea35544ac50

        SHA1

        7f332d15a7648f7a698b3068a428811361f4e9ab

        SHA256

        1ebd1b85bb264260df3d9fb0a2062b29199c7b6137dcc98486874c1d257c73cd

        SHA512

        ce8615c90c8794f0aefeb0c6ce5da126732695e6be36b5e625f3a073d55c6f8cd88ca465b07e2c0e87355b5baad887a3f0b26c4eb262484a83d35565e72ba138

      • memory/1708-32-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1708-19-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1708-26-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1708-37-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1708-41-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1708-12-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1708-408-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1708-1165-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1708-4283-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1708-4717-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4232-9-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4232-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB