Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    23/02/2024, 18:40

General

  • Target

    130608a012b4f2a0530f03c514ee98970af2d8a5b59ce4df65131497f9a5a19b.exe

  • Size

    508KB

  • MD5

    4f928378218475436eb1dd16f6c61e5f

  • SHA1

    69f1ddc875ed2b943da2fac852772e4f95f66e1c

  • SHA256

    130608a012b4f2a0530f03c514ee98970af2d8a5b59ce4df65131497f9a5a19b

  • SHA512

    e13debaa71a2ebb4abfd4d19c55f132609e85aa53421691c22198fcffb78ffcdd06c8d2e0ba694acc08f0899b006ead63377ef36b646defda45cf73e8a1e8593

  • SSDEEP

    12288:G7++0rrQQkFFP4oOJmqpwjy9oQNDbOpxozwzgA:G7q/kf0w9QofoSgA

Score
8/10

Malware Config

Signatures

  • Manipulates Digital Signatures 1 TTPs 1 IoCs

    Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 11 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 6 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1244
      • C:\Users\Admin\AppData\Local\Temp\130608a012b4f2a0530f03c514ee98970af2d8a5b59ce4df65131497f9a5a19b.exe
        "C:\Users\Admin\AppData\Local\Temp\130608a012b4f2a0530f03c514ee98970af2d8a5b59ce4df65131497f9a5a19b.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:2352
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\$$a4DB3.bat
          3⤵
          • Deletes itself
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:3060
          • C:\Users\Admin\AppData\Local\Temp\130608a012b4f2a0530f03c514ee98970af2d8a5b59ce4df65131497f9a5a19b.exe
            "C:\Users\Admin\AppData\Local\Temp\130608a012b4f2a0530f03c514ee98970af2d8a5b59ce4df65131497f9a5a19b.exe"
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2988
            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ie6wzd.exe
              C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ie6wzd.exe /S:"C:\Users\Admin\AppData\Local\Temp\130608a012b4f2a0530f03c514ee98970af2d8a5b59ce4df65131497f9a5a19b.exe"
              5⤵
              • Manipulates Digital Signatures
              • Executes dropped EXE
              • Loads dropped DLL
              • Drops file in Windows directory
              PID:1796
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2968
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2720
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:2676

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        251KB

        MD5

        e17f1558896b0e5ccfcf63f8cee6844e

        SHA1

        14cc84a3e4ad72a68bd7d7e8c7e18d43386a404f

        SHA256

        7acb42694f825f21fd667d04f387742e16bfe62ca9fe2763cb90a8e0f3cc5214

        SHA512

        bcd88ff774ee00127ba1b494f480004c96a831dfe8c1cebd52283b03afa9a0ced583bf3eec0c2076b441710cfe5245f2d885c4b9ea7d2118f6f9f7e4682e9a19

      • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

        Filesize

        471KB

        MD5

        4cfdb20b04aa239d6f9e83084d5d0a77

        SHA1

        f22863e04cc1fd4435f785993ede165bd8245ac6

        SHA256

        30ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9

        SHA512

        35b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86

      • C:\Users\Admin\AppData\Local\Temp\$$a4DB3.bat

        Filesize

        722B

        MD5

        434c2317046839080a4cbbb0e08e83ff

        SHA1

        fcc52ee07aedcba646c46882e030a8756212d5b4

        SHA256

        c7ab5350e7641d8b28c19179bddbf30d8a6268189fe3d8cb1b145db60dfa05ad

        SHA512

        324e321d6e2ac79148dc23cef4d636a9d0d173aa1a5dc35ded0b2aa3527c481833d4ede521e96bebdb3aec5369769c3f9a475fa92a931e39be18b3fc5643fbc1

      • C:\Users\Admin\AppData\Local\Temp\130608a012b4f2a0530f03c514ee98970af2d8a5b59ce4df65131497f9a5a19b.exe.exe

        Filesize

        482KB

        MD5

        a17e555c4d2501ee5213b4291d82700a

        SHA1

        6dbd04161f0953383178eb0951f8b288223e0813

        SHA256

        d872478e227f665161940dd96ab1ea43799adf95b38aea7bfbf6af4781a1d091

        SHA512

        08b06c49e65195c6f544d33c213b132538dd5b2f3c823bfffafccfb36c9543e15b0cc9664fa5570f157a181c9f03acf9e58f28e18f28c9a1193fb1fcdd64b94e

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\GLOBE.ANI

        Filesize

        6KB

        MD5

        f3525c9c46c7f01433424e8aa4d0eb7e

        SHA1

        b0faf41ef1e211e73a3d8bb1f26df609e68e12f9

        SHA256

        0c713d5db713333de26a82230c9aa4adb28e4451363a8a37cbfcbb4c6aee84b5

        SHA512

        8df3ff17273fb60e6ce71128eab0cf1fcba69421f3622b443e210d43f6005e5b51523c68e81ac384f8c3202a6d023a592ec51d4238c8c1d0fb371ba335aa4522

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\IESetup.inf

        Filesize

        11KB

        MD5

        90967e30dcd802a520b72e01a7a13afc

        SHA1

        d21e7938dfa8d1be182e633a8a6fd6ef7dd84081

        SHA256

        7ceb01f567eb1583c4c064a0fe06dceb97d21704d6c28ffc023fbc2ab32f7357

        SHA512

        8d7dd0ef0e08415c6109746929e99505f752df07a7e86d5960400a15005358101c2537a493cada09bff4f0243a89918c3882fd8274467e0f024975441f85b809

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\advpack.dll

        Filesize

        89KB

        MD5

        5f643aa069a7dd09ac3102f515abfdbc

        SHA1

        7f93f5b03504071a7e6125a8b93a3d8b143621b1

        SHA256

        b027481de47026961ebe58a7e7fa3fb711fe5cf2bf053196af62f70f1979cdac

        SHA512

        d6b7b5732858a718334a64728a268432526093dd752951ed0cde2313e5c6495505d7cd76130831c4714d8def6ab47645df22938245f87880b3f1dcde2d0fb09b

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        dae2367df693aba4bfb4a9c6c3b933ad

        SHA1

        61a4bc9a889005b2880f4e96f0204e2be59a76ef

        SHA256

        7ce6003aef7da57e260e5123acc85287428c7cae84ef5073a1e09baf12220de6

        SHA512

        e3dfb5d7cfc67ee195c4f62e4b131e62a2cddef65cc7445d68270bffb931ad7924a9907329181ed67865420818fa2af6895a9ebf2236a3db746c3951a71f0c5c

      • F:\$RECYCLE.BIN\S-1-5-21-406356229-2805545415-1236085040-1000\_desktop.ini

        Filesize

        9B

        MD5

        d69146fa3f15be895e219a620fdd153b

        SHA1

        fa21485227046ccf2d7638b4236f749862dd4b64

        SHA256

        406651396485eef0c407fc8241aeaa805a311294cdf7abb18ca20e8540694652

        SHA512

        b0509216c0bd6ad432374c98f3fc2f2919d9353e4bccf510b20e0cbbf8a0fdf77ccdeff786df0305f83f22865794cc675537e51de5a1478fc8431999566701c0

      • \Users\Admin\AppData\Local\Temp\IXP000.TMP\ie6wzd.exe

        Filesize

        184KB

        MD5

        fe7c4f4f6e2c9fd0b3dd5308ac1e93b0

        SHA1

        2908ad1f27f580b450075feaf78e9a9ac69b6d52

        SHA256

        4c110e385f5245c3eb49864dd31a7663e81de6d7ea32a02265c264e5a29969f2

        SHA512

        82a9a4ac052c6c2efc1ee98802372e511943aaf0a9c6a5efa795bdd1beabac75eef46408449a72f2f78ef716a65de204f98e73778257879aaaa5c2ec7d649d44

      • memory/1244-86-0x00000000029D0000-0x00000000029D1000-memory.dmp

        Filesize

        4KB

      • memory/2352-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2352-16-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2352-12-0x0000000000220000-0x0000000000254000-memory.dmp

        Filesize

        208KB

      • memory/2968-18-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2968-135-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2968-181-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2968-187-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2968-320-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2968-1940-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2968-129-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2968-3400-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2968-122-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB