Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    113s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/04/2024, 12:08

General

  • Target

    d44aae4258e4a38f14dc3a85f92af5d543c87ee1635fca63c4d4dbc0a5cc669c.exe

  • Size

    76KB

  • MD5

    e07b751df71c59e42caa061542fa043c

  • SHA1

    f2ef0ab1f49fd619212a5fdb8278d1e81ea1c137

  • SHA256

    d44aae4258e4a38f14dc3a85f92af5d543c87ee1635fca63c4d4dbc0a5cc669c

  • SHA512

    9a3b2d1cd357e6a3393bc626fea3ce01f0063c6ff09a37bee9bfa10d0c1770d6683e81a0c2d6b65efd66df3ce37ae00f2b20a30712c66248c50bfa0aeb938ea5

  • SSDEEP

    1536:Are+Zk7qzUJBC2KsgSMcJziXriw+d9bHrkT5gUHz7FxtJ:Are+aezUa6pBiXrBkfkT5xHzD

Score
7/10

Malware Config

Signatures

  • Drops startup file 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3388
      • C:\Users\Admin\AppData\Local\Temp\d44aae4258e4a38f14dc3a85f92af5d543c87ee1635fca63c4d4dbc0a5cc669c.exe
        "C:\Users\Admin\AppData\Local\Temp\d44aae4258e4a38f14dc3a85f92af5d543c87ee1635fca63c4d4dbc0a5cc669c.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2040
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:4404
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            4⤵
              PID:1552
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a3604.bat
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:4100
            • C:\Users\Admin\AppData\Local\Temp\d44aae4258e4a38f14dc3a85f92af5d543c87ee1635fca63c4d4dbc0a5cc669c.exe
              "C:\Users\Admin\AppData\Local\Temp\d44aae4258e4a38f14dc3a85f92af5d543c87ee1635fca63c4d4dbc0a5cc669c.exe"
              4⤵
              • Executes dropped EXE
              PID:2376
          • C:\Windows\Logo1_.exe
            C:\Windows\Logo1_.exe
            3⤵
            • Drops startup file
            • Executes dropped EXE
            • Enumerates connected drives
            • Drops file in Program Files directory
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:2196
            • C:\Windows\SysWOW64\net.exe
              net stop "Kingsoft AntiVirus Service"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:1196
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                5⤵
                  PID:64
              • C:\Windows\SysWOW64\net.exe
                net stop "Kingsoft AntiVirus Service"
                4⤵
                • Suspicious use of WriteProcessMemory
                PID:2980
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                  5⤵
                    PID:4788

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

            Filesize

            264KB

            MD5

            398a7064313570d5e852fb87febbf03f

            SHA1

            117d0ca007b73a8c7115f8880f54540e37ff7490

            SHA256

            30429016be8ea9e22585980572b4b2af1ddabb9cba93e9222a231f4d95353751

            SHA512

            e96c03db73e0b3d86b6a51fcc20f4b131116b1c2a649030b8f13d60d207944bd4ec1fe734c32e3f390d454dad3f6ad780ff52209c56852cc4456559102f01c80

          • C:\Program Files\7-Zip\7z.exe

            Filesize

            583KB

            MD5

            441b401c5191ddec15929d573dd9f886

            SHA1

            39b882580d7cdaac5467f5690376802328cd71ed

            SHA256

            f2ede70fc47f2c6d5a7c4c81fa5a0e9e2ea30ea8b3c8bf1faf5b41c284d8f011

            SHA512

            6de442770ea889cc400f5a5e0c243ef455965724ccf29ef3226102ff618af3697518d97ab56ce9ee08a7888edf11c14f2250edc2a0df244b76407cb95895d6b8

          • C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe

            Filesize

            649KB

            MD5

            482a73e91b0d994114ceb6e8e1c6709e

            SHA1

            921ba9e891d6451017854225fe3ad646e6fb1bbf

            SHA256

            5960ed0b6779000f4ce9209325bedc4962cf04c31927eca1f51d0923e37522f8

            SHA512

            73a05a5aaca7a3bf22ca1d522a793a857deb16db761838c77fc6cd1a10e5862d2270165198fdf2a2249bc4324507b89c9e2205e69275005a0e2c42572d79a27d

          • C:\Users\Admin\AppData\Local\Temp\$$a3604.bat

            Filesize

            722B

            MD5

            4ad7d863d817582ce2ad3d0c99cc4400

            SHA1

            e691d913feadc16307414f2e9a6cd1a60b4b4fbe

            SHA256

            8f3f64bdcea2e054165e5676c109334a0edf46e4ee11b970e540b810f64d1903

            SHA512

            04f3a63af2e88139fdfa8d10cd716bacbe3a2a4595fb4b4cb2f3029ef6ffe13f909c79c28eb4997c6a180d5d4a158e15bd70dc13de30a7069a05c7a808c5a8dd

          • C:\Users\Admin\AppData\Local\Temp\d44aae4258e4a38f14dc3a85f92af5d543c87ee1635fca63c4d4dbc0a5cc669c.exe.exe

            Filesize

            36KB

            MD5

            9f498971cbe636662f3d210747d619e1

            SHA1

            44b8e2732fa1e2f204fc70eaa1cb406616250085

            SHA256

            8adf6748981c3e7b62f5dbca992be6675574fffbce7673743f2d7fe787d56a41

            SHA512

            b73083c2f7b028d2946cb8f7b4fe2289fedaa4175364a2aac37db0aeff4602aede772ccc9eba7e6dcfcb7276e52604ca45d8021952201b5834485b48bca3dc93

          • C:\Windows\Logo1_.exe

            Filesize

            39KB

            MD5

            0209d825c40705a1752ceecc4fe453c6

            SHA1

            875b45703ab4a4f9b7b13c16277b235d43f075ef

            SHA256

            0fbeb3b115479ea9f34e86e511238d235b942922660740d37e9f249b4e3fdf1e

            SHA512

            b88b1ba93382a3a6fe4253a0c8fe69baa02a0c0dd74b2e6c79d7688f5c16be144676bb7bd3e061be96603148738845fddd05bbd4782d3abcb0bf495c1c96aa40

          • F:\$RECYCLE.BIN\S-1-5-21-1132431369-515282257-1998160155-1000\_desktop.ini

            Filesize

            9B

            MD5

            02ced53ce3f5b175c3bbec378047e7a7

            SHA1

            dafdf07efa697ec99b3d7b9f7512439a52ea618d

            SHA256

            485bb2341321a2837fd015a36963ea549c7c6f40985e165fd56c8a1e89b3f331

            SHA512

            669dde3ea8628704d40681a7f8974cf52985385c92a61a540c97c18c13eb4d451207ae171b2a56cd061cadbc90e672a84eb55111b1f5016846918d73fb075c99

          • memory/2040-8-0x0000000000400000-0x000000000043D000-memory.dmp

            Filesize

            244KB

          • memory/2040-0-0x0000000000400000-0x000000000043D000-memory.dmp

            Filesize

            244KB

          • memory/2196-17-0x0000000000400000-0x000000000043D000-memory.dmp

            Filesize

            244KB

          • memory/2196-5364-0x0000000000400000-0x000000000043D000-memory.dmp

            Filesize

            244KB

          • memory/2196-9-0x0000000000400000-0x000000000043D000-memory.dmp

            Filesize

            244KB

          • memory/2196-8693-0x0000000000400000-0x000000000043D000-memory.dmp

            Filesize

            244KB