Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240319-en
  • resource tags

    arch:x64arch:x86image:win7-20240319-enlocale:en-usos:windows7-x64system
  • submitted
    27/03/2024, 04:01

General

  • Target

    e0b7ab3127f73fc44af1af4362511e71.exe

  • Size

    166KB

  • MD5

    e0b7ab3127f73fc44af1af4362511e71

  • SHA1

    ce8ecbb24762f4c03b79a8020ccce06dc25414e4

  • SHA256

    47e3e5fbba12babd157f4fb1a8388088384f070847f5e86836898f52c8fc2afc

  • SHA512

    4b74979c59a50935f036e1852b7f6fe48e8159d0a45db202f5a356ca306c3ddebfd02de868583602667aecefd0042f3621dd38d332f5dcf0281d9ea852dc99bc

  • SSDEEP

    3072:ILe+aX3zvUzAMe5CZbJ/uKtGvF13q/POIekjNbf6JclSN2uAhRG9C+:3+aX3L2ARGFPR+kxmiWAI

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 43 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1232
      • C:\Users\Admin\AppData\Local\Temp\e0b7ab3127f73fc44af1af4362511e71.exe
        "C:\Users\Admin\AppData\Local\Temp\e0b7ab3127f73fc44af1af4362511e71.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2972
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1368
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            4⤵
              PID:1700
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c C:\Users\Admin\AppData\Local\Temp\$$a3949.bat
            3⤵
            • Deletes itself
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:3028
            • C:\Users\Admin\AppData\Local\Temp\e0b7ab3127f73fc44af1af4362511e71.exe
              "C:\Users\Admin\AppData\Local\Temp\e0b7ab3127f73fc44af1af4362511e71.exe"
              4⤵
              • Executes dropped EXE
              PID:2592
          • C:\Windows\Logo1_.exe
            C:\Windows\Logo1_.exe
            3⤵
            • Executes dropped EXE
            • Enumerates connected drives
            • Drops file in Program Files directory
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:2560
            • C:\Windows\SysWOW64\net.exe
              net stop "Kingsoft AntiVirus Service"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:2640
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                5⤵
                  PID:2420
              • C:\Windows\SysWOW64\net.exe
                net stop "Kingsoft AntiVirus Service"
                4⤵
                • Suspicious use of WriteProcessMemory
                PID:2720
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                  5⤵
                    PID:2824

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

            Filesize

            258KB

            MD5

            36ce325665e80730a87fe419e620ec5a

            SHA1

            c16e07644e07cb2ec85c197f2b25fbf85885b719

            SHA256

            7b8bf83836c593486dc9d1feb32ccebae4282b1f0caaffa89956d48473978c42

            SHA512

            d8bfe548e7f96a8caf19cdb4bd4d10b46c0dc83e35d5a0cd2244c223d47dcb9d2b9fe7929fc73e2a45f2e4f0aa5b73721548d9d6c726ecc6cc3034a7f7807cdd

          • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

            Filesize

            478KB

            MD5

            13689a976739ee578cca7c130b7fef1a

            SHA1

            fc996cec103246b14384ca0d44f6dda9263e8287

            SHA256

            b834be980b6259818c6bab3ea0c7dce63605f3ffdc3609c7d8969f08e149a22a

            SHA512

            ea0bdbc66ab6b830721433d7f85db4ae4e8c05afa3b72e13553f331b669b1ffe3917fad2426b6f5b21b674a7e1d88474633143c82825a6ea57b7e16778c8654f

          • C:\Users\Admin\AppData\Local\Temp\$$a3949.bat

            Filesize

            530B

            MD5

            08bf07c37e8313273fec2d06166b6f2d

            SHA1

            a8aad71d62224d6a7a7fd38c55927530d9017bac

            SHA256

            b43fba4c0b9dbd53f2814a692fcdbd60280ab5a1e3b92d1efdb898884ac5e110

            SHA512

            4ec94b3a99eb7a7fcd8ec956d854df925cdc17cf4e42797afc1f0ef88dd18a6ec67bc6513f61c23165e85ea6ec42c998275b2735851c16d4e96f77604bb0be51

          • C:\Users\Admin\AppData\Local\Temp\e0b7ab3127f73fc44af1af4362511e71.exe.exe

            Filesize

            133KB

            MD5

            199f5eceb89ea8d47752c7d93282aaca

            SHA1

            89bc3c28445228994d2fe2927ed7a58e90d88f6a

            SHA256

            857fdaa2bd8d84efe9ebeda9b8577c30da8cff4e2f7db80b06a07c89c22e6da7

            SHA512

            ae21d78626787f6c07e20473b157548e705d39c05e2167647506c81ca3857c1fda53e959956dec30d61eade5a26b09cad03b2ffa3615ce982fe1412c1d416949

          • C:\Windows\Logo1_.exe

            Filesize

            33KB

            MD5

            882fb7fca0106ebde62148a324a99e18

            SHA1

            22c2ed58751ee35ca2b96342c5c42894501e3ec5

            SHA256

            d36e1c820e2e2390f17125140b2d19e092b2a75ba12d7816ec4acec15c3a2dcf

            SHA512

            e92448eb03243d31f04daff133b1db922bfe1ee9a1721bb5afd8c67a426617865e51daa7378ae883598084bf286472cce5288e9ed3210169a01497c1c0064c27

          • F:\$RECYCLE.BIN\S-1-5-21-2610426812-2871295383-373749122-1000\_desktop.ini

            Filesize

            9B

            MD5

            f290d5b34b77b963189d043630703b29

            SHA1

            f3dbfaa00f863d39575c7adf50bddbf02900d6b3

            SHA256

            4c76a275d94e486451f7797077242c8636df44e88643a2208b0a876c4ad5433b

            SHA512

            b4ffa173d60592b9219d188bd7eb4d96e0543e4c5350b903d96e0afea437f71753a520ac4397df2a39df8b84a9230f51c959995f8e436bcac4ff3567e9b35ef9

          • memory/1232-30-0x0000000002AF0000-0x0000000002AF1000-memory.dmp

            Filesize

            4KB

          • memory/2560-1905-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB

          • memory/2560-34-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB

          • memory/2560-19-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB

          • memory/2560-4100-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB

          • memory/2592-26-0x0000000000400000-0x0000000000425000-memory.dmp

            Filesize

            148KB

          • memory/2972-20-0x00000000003B0000-0x00000000003EF000-memory.dmp

            Filesize

            252KB

          • memory/2972-0-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB

          • memory/2972-16-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB

          • memory/2972-15-0x00000000003B0000-0x00000000003EF000-memory.dmp

            Filesize

            252KB