Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    157s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/02/2024, 20:54

General

  • Target

    a5dfbb7f1866d2b15adee689cc4bdfcaccdb5f71611903cbf9936a969a528a86.exe

  • Size

    933KB

  • MD5

    b8f29f83d698c7c053f61e25ead1ce8d

  • SHA1

    7b27c1132ecb426d42058e7e41e6d336c994c2ff

  • SHA256

    a5dfbb7f1866d2b15adee689cc4bdfcaccdb5f71611903cbf9936a969a528a86

  • SHA512

    f49150e31ed34f4d1322bd8676574538ec9292b9e2b75484119bf723a73968410e9cc8fea2f92d9ffffef088997bb519c2cfc070145b7168c60a2e86094b77fa

  • SSDEEP

    24576:2JN9GENWyYHf2T9TWZxyy2bzuRlqxWYdMD:2X9ZWyEIJWmy2vuRlCeD

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3448
      • C:\Users\Admin\AppData\Local\Temp\a5dfbb7f1866d2b15adee689cc4bdfcaccdb5f71611903cbf9936a969a528a86.exe
        "C:\Users\Admin\AppData\Local\Temp\a5dfbb7f1866d2b15adee689cc4bdfcaccdb5f71611903cbf9936a969a528a86.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:2188
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aBCD8.bat
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3132
          • C:\Users\Admin\AppData\Local\Temp\a5dfbb7f1866d2b15adee689cc4bdfcaccdb5f71611903cbf9936a969a528a86.exe
            "C:\Users\Admin\AppData\Local\Temp\a5dfbb7f1866d2b15adee689cc4bdfcaccdb5f71611903cbf9936a969a528a86.exe"
            4⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:3592
            • C:\Users\Admin\AppData\Local\Temp\wps\~e57c023\Au_.exe
              "C:\Users\Admin\AppData\Local\Temp\wps\~e57c023\Au_.exe" /from="cmd.exe"
              5⤵
              • Checks computer location settings
              • Executes dropped EXE
              • Checks whether UAC is enabled
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious behavior: GetForegroundWindowSpam
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:5080
              • C:\Users\Admin\AppData\Local\Temp\wps\~e57c023\Au_.exe
                "C:\Users\Admin\AppData\Local\Temp\wps\~e57c023\Au_.exe" -downpower /from=cmd.exe -msgwndname=uninstallsend_message_E57C786
                6⤵
                • Executes dropped EXE
                PID:1680
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2892
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:3572
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:3304

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files\7-Zip\7z.exe

        Filesize

        570KB

        MD5

        0a160f7903b686eb61c24ee9e64bee27

        SHA1

        ce55b20785467bb1db067ffe3a585dce48ffd594

        SHA256

        0ba367be5f1f4591485d319506d8d59cae56a541e74649bd765ab2df6910c3d4

        SHA512

        6d233b4472bd351d2d991a28486d7883b2df233769edb451c352fe2bba71b7a97a75d48eab2fee7eb720103b08b14062e6444333a5934893130bf60d1875fb66

      • C:\Users\Admin\AppData\Local\Temp\$$aBCD8.bat

        Filesize

        722B

        MD5

        108b3964aa8fbe9bafd3d541f9968e63

        SHA1

        ef5d2ef07bac7daaadc98ec496b66c97f833b8ea

        SHA256

        d535a2ddad7f1906b67d0cc6129e080db4857199873408f620f6a21160e558da

        SHA512

        265343135f0b407f5f6c1b712d2406797eb6a2f8e4329b8355b70fc7f56a887972f2a5470c7d3f91f1f00066d9b40a2017827360a8b33471a630fcf14e12b8ac

      • C:\Users\Admin\AppData\Local\Temp\a5dfbb7f1866d2b15adee689cc4bdfcaccdb5f71611903cbf9936a969a528a86.exe.exe

        Filesize

        906KB

        MD5

        d7b8ea84af8f998b7f344889d2e112d9

        SHA1

        99b7c68d38ccc7a8c6cee171679100d316bbfcc0

        SHA256

        d2df31a05e5c1e1b9869270157eac5f475998d17defb961072d9e1dca5cdd70c

        SHA512

        bf479b26f7752159508090643e38ba99a9f506b59485e961f00befa4dced1cf59b4a00dddf89448caddb30e044258f68ee0253f1cc56b406de99ccd7c25f53b9

      • C:\Users\Admin\AppData\Local\Temp\wps\~e57c023\Au_.exe

        Filesize

        711KB

        MD5

        ff513c76d27352b3d9b8de6eea1257ca

        SHA1

        36da43ee3a8d0fa1262647a3f441d3bc5183b853

        SHA256

        7231178b98e5a13171c823cc531460e5de7f9bfa26d23859bb3481265c7b5793

        SHA512

        e1adba1606751fa42088487095a0d8f4b6a2843e7a4ecede14c874625d6cde3878c3a91cc27edf176b7edd5f8116aa7d666085f0d5abf034b099dbc30951d729

      • C:\Users\Admin\AppData\Local\tempuninstall.ini

        Filesize

        161B

        MD5

        0820124c60e4f985ccf7798177b8ab12

        SHA1

        bf9c3dca7e71d60381146e1f71aea41f93e165df

        SHA256

        daf958fe8a43090d39d07c9d31a0c5c5223cc340e54a1205046524af2703353f

        SHA512

        22caeeb292197fc94d80f49c5251cc6db2ced8569905a5a5b03dc30ed8c158fbb4aecd340daf896e9c043255d658a9b0b1aef6f56ef3150275c4a7dbb740fb28

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        3030179dc0c4ffbe720135ca0fd6a872

        SHA1

        dffac6c5ec0d5dc259018febe37645089a808d34

        SHA256

        f041faf839a587f7ca878c16c03e4ff64d6158e30548196c53cfbc2ad076515b

        SHA512

        b2017915ff651a5e23a2946cbfa50931725df05a2f6953d7f876cb58619c4be933464c905c0c4c83e1981973181f95d085b2e4ab77c271dab577d71829c4a1e8

      • F:\$RECYCLE.BIN\S-1-5-21-609813121-2907144057-1731107329-1000\_desktop.ini

        Filesize

        9B

        MD5

        20579de1c6702ea14f25df921a00274b

        SHA1

        fc7299007b5fb0580c7a3ef6ae0efd8aaf80a35f

        SHA256

        3eb24c26a19e67d7f499ccb30f78fc29bee126bafd13f41470223c1b8f2e1e4e

        SHA512

        e9a21ede4321b86e5d215d41321741f8db22b9eb92c1325026182c688311d5134041102a194d670abcbd182d2c91d5180ac9b7c9daaf9e41109a3b3d8e3c3d81

      • memory/1680-39-0x0000000002320000-0x0000000002321000-memory.dmp

        Filesize

        4KB

      • memory/2188-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2188-8-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2892-76-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2892-83-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2892-90-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2892-94-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2892-96-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2892-99-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2892-9-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2892-1233-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2892-2148-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2892-2245-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/5080-69-0x0000000003770000-0x0000000003771000-memory.dmp

        Filesize

        4KB

      • memory/5080-84-0x0000000003770000-0x0000000003771000-memory.dmp

        Filesize

        4KB