Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/04/2024, 22:11

General

  • Target

    c00cca3e2742d435099826a21adc3944e5de7701a068bba9339f3acc61ac0c79.exe

  • Size

    26KB

  • MD5

    d4c1c1e7a7bb540a3ccc24994940320e

  • SHA1

    e5212546a62657b13530aee8d8608ba68e630e08

  • SHA256

    c00cca3e2742d435099826a21adc3944e5de7701a068bba9339f3acc61ac0c79

  • SHA512

    5b5bfeb351d4d8250f81db1f720fa1fea7b17ef06074f870a86948107b37eca5e8111126c37d1efafcb21d40ac0beaeda25b43b21af869659a5914b55a675328

  • SSDEEP

    768:Yo1ODKAaDMG8H92RwZNQSwcfymNBg+g61GoZw:vfgLdQAQfcfymN

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3496
      • C:\Users\Admin\AppData\Local\Temp\c00cca3e2742d435099826a21adc3944e5de7701a068bba9339f3acc61ac0c79.exe
        "C:\Users\Admin\AppData\Local\Temp\c00cca3e2742d435099826a21adc3944e5de7701a068bba9339f3acc61ac0c79.exe"
        2⤵
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:5060
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3604
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            4⤵
              PID:3468

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        251KB

        MD5

        9a0157099f583c025f870abcf927d8b9

        SHA1

        b81a4fce849acc1d5a410ab5a6d18b9360aa3b08

        SHA256

        0e8876d8c7bde1ad018d4e4cd0792ef1dc6748497a31bc7ca1c3b90eb86e02d8

        SHA512

        d18fbc97929575eebac14374dc5c886745cdb2de66d5d62a3145bf848aeb67f07a59fe80487945b376158cce2d53670e33c3dc61c17d8e475b148a975ef3343f

      • C:\Program Files\dotnet\dotnet.exe

        Filesize

        170KB

        MD5

        9b843d6a99de0c91f9eb43558e4fb226

        SHA1

        809032a8851fcfcee61e4390d3b626b4872f5e32

        SHA256

        e978440f6670cf03ae7d8b38993a1f391bd3703e1cd0135c54364c1ba6fc052b

        SHA512

        036b8a98b11c2f31a7ad33bfdf2ea682138bb19a5321e033e7db5503355d7490ad68b1861cd1cf94ca77259e4d4165d9e4128fca9b24953af9f4ac263195ae72

      • C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe

        Filesize

        636KB

        MD5

        53ee62011469b286a2a1b5658c86b9bf

        SHA1

        9bdac0b23b0a965947c780c6a6b48fc7122f9ade

        SHA256

        7125735e4e8595f1c17ff3235bc65dacabc2ec874b29ac7ba8eddd80ad10b3c0

        SHA512

        c9c24e578da0a38048e71548fac66465bcb624e971f745bba559e8c49fd621752e718d4c983a90a97277407bb23348ca109436e1eeebef030c3b599c712ff236

      • F:\$RECYCLE.BIN\S-1-5-21-355664440-2199602304-1223909400-1000\_desktop.ini

        Filesize

        9B

        MD5

        137c71ab33d39f41d1d0f506748620c6

        SHA1

        615708c800cedc2541589174e6e677e1563367b5

        SHA256

        f1a3a71540f6e454bf800af51e8e8085c233f7281852519bd8b0ae36071f13e0

        SHA512

        cb8e0ffac4c5606dec5cc9ccdb6ac981ed120efc64a4f4750ac59149280da5fb379c2af737bde3d9e23ca21c3ee3fa9e6c252dee9ef22102886e2390c9d504fc

      • memory/5060-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/5060-5-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/5060-12-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/5060-18-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/5060-22-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/5060-1212-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/5060-4778-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/5060-5217-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB