Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    151s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    16/03/2024, 01:57

General

  • Target

    889117f4914c78ec54461c5be58a001c498928987300745eef213ebd1a892607.exe

  • Size

    26KB

  • MD5

    e3eb1871a00de661e94d2d4179c64daf

  • SHA1

    65584609b0e91895e79896cf2bc314bb0793583a

  • SHA256

    889117f4914c78ec54461c5be58a001c498928987300745eef213ebd1a892607

  • SHA512

    dc1bcea3aa7cabee603ca13d540743e6d546f4e4c05047991bec1388c92769972203d107dd75abba96771b3bad45c788421d6b7346c5bdca4dee162cc49bd907

  • SSDEEP

    768:sS71ODKAaDMG8H92RwZNQSwcfymNBg+g61GoL:safgLdQAQfcfymN

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1260
      • C:\Users\Admin\AppData\Local\Temp\889117f4914c78ec54461c5be58a001c498928987300745eef213ebd1a892607.exe
        "C:\Users\Admin\AppData\Local\Temp\889117f4914c78ec54461c5be58a001c498928987300745eef213ebd1a892607.exe"
        2⤵
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2632
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2096
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            4⤵
              PID:2556

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        251KB

        MD5

        168681c876bdc301911ce24b47935282

        SHA1

        a8913de7eee059f1c465c56282ec2ef7a2abcc09

        SHA256

        41c1720cd5458ab7a50f91ab38e9a13bea2941eb09b9a248809f9fc4369976f9

        SHA512

        7fbb29dce92283c2d9a70f2915c6ce53c4e0668d33e0c4099d557c5ad345c186917e9459f05eb6b4b901f9bbf707f671e50f980991b39856d05d33b18aedcdcd

      • C:\Program Files\7-Zip\7zFM.exe

        Filesize

        956KB

        MD5

        9b9cfb2c321ee999ec5df797defe5b3f

        SHA1

        5ffb1641949933b893d1288706efb0e0f621536b

        SHA256

        aa21136c99a2d2d2b3220de17e8b651a5e5d8abaeaf0da8dd64ead529188bc80

        SHA512

        1445d3ae3a16037df160dc31a8b1327d76fe88abe6d3127915d1e5ee79eb5179e1b377e1e536afba399b1b1951d7a64ce2d30bf1a8405dc8d7ca0cc616c560e4

      • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

        Filesize

        471KB

        MD5

        4cfdb20b04aa239d6f9e83084d5d0a77

        SHA1

        f22863e04cc1fd4435f785993ede165bd8245ac6

        SHA256

        30ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9

        SHA512

        35b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86

      • F:\$RECYCLE.BIN\S-1-5-21-406356229-2805545415-1236085040-1000\_desktop.ini

        Filesize

        9B

        MD5

        cbff752523567179ac32a14f905e1944

        SHA1

        446aa136e2ec27c083df7dd49d0252f1c0243bde

        SHA256

        eb7756d2a0d4fe754f1fe3d1d30c92a3f7ac52252b13cd171fd7ce553d760371

        SHA512

        9131c53463d7ce35aa85fbd70b312fdbc04c7c649fae0f6a762758e8e39ee863bdf84a6d23d1879814f69a6d4c4fe38501235c2e557b68309d560f06c18e9eff

      • memory/1260-5-0x0000000002970000-0x0000000002971000-memory.dmp

        Filesize

        4KB

      • memory/2632-66-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2632-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2632-72-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2632-20-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2632-116-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2632-1825-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2632-14-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2632-3285-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2632-7-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB