Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240319-en
  • resource tags

    arch:x64arch:x86image:win7-20240319-enlocale:en-usos:windows7-x64system
  • submitted
    17/04/2024, 15:40

General

  • Target

    586012dba559469fda356535fd81ce78494d5a4acc329b12672bea9a00c6e70b.exe

  • Size

    2.1MB

  • MD5

    ffcedb1564362366242f115173246db9

  • SHA1

    b2a8994fe972a6d34259b4621a277cef0052f454

  • SHA256

    586012dba559469fda356535fd81ce78494d5a4acc329b12672bea9a00c6e70b

  • SHA512

    956134f7e804c7734d46ad55288bcdfb5704805140dcc581e052a9ae18f08b45abc8d8a4788aac673cb4c444b541210cf836b5079df9770a90981e4fe513059d

  • SSDEEP

    24576:v75vNmH62Yl/oEGONDz4HlkZWmQBeAAtrpbr9flSvic2OwBVyuK380vF8yYsIDyb:v7ccwAjNlSvEzV638A8yYsIDDYIHa

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1272
      • C:\Users\Admin\AppData\Local\Temp\586012dba559469fda356535fd81ce78494d5a4acc329b12672bea9a00c6e70b.exe
        "C:\Users\Admin\AppData\Local\Temp\586012dba559469fda356535fd81ce78494d5a4acc329b12672bea9a00c6e70b.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:1676
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\$$a3CE1.bat
          3⤵
          • Deletes itself
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:2216
          • C:\Users\Admin\AppData\Local\Temp\586012dba559469fda356535fd81ce78494d5a4acc329b12672bea9a00c6e70b.exe
            "C:\Users\Admin\AppData\Local\Temp\586012dba559469fda356535fd81ce78494d5a4acc329b12672bea9a00c6e70b.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of SetWindowsHookEx
            PID:2744
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2236
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2996
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:2576

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        251KB

        MD5

        c90bb0ae6fdeaa8a340b82eda2aee4c3

        SHA1

        7700508a3e208a8b3df97429e0f89be050b66ad6

        SHA256

        f2481f3a5a08145d2e8c5f4cb9c9b0c9f24a9f43a8b5bc1fe93f8c1c6311a6c8

        SHA512

        eb969dc19ba0f849df1bfe689a0ba61ffcfb66a287d07590b204e61bd1f44a5f09ad67f29e5ab977214cbd711177a65f44876f03c4c5e52f721c8d037c711971

      • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

        Filesize

        471KB

        MD5

        4cfdb20b04aa239d6f9e83084d5d0a77

        SHA1

        f22863e04cc1fd4435f785993ede165bd8245ac6

        SHA256

        30ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9

        SHA512

        35b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86

      • C:\Users\Admin\AppData\Local\Temp\$$a3CE1.bat

        Filesize

        722B

        MD5

        230e40f17e53af772132a3f4d37daab6

        SHA1

        e07ddabf24c13314c8a734fd056c06def4aa4222

        SHA256

        b1a3e5ab4ae5f90c416b27ec9bb71c2314b9b5654755a0c750ffa060e7517f5e

        SHA512

        bfd099ff9ac693b77ff0a0fc39a9a1d1f38b96d0bbb6d828493c740d97fa493ffd21d8259f01091e8ee91f339cc3ece2709765ae0296a9e936dd97783e541b46

      • C:\Users\Admin\AppData\Local\Temp\586012dba559469fda356535fd81ce78494d5a4acc329b12672bea9a00c6e70b.exe.exe

        Filesize

        2.0MB

        MD5

        4f8b3fa38737846375f10515b4074086

        SHA1

        dd59d585d2b330e4477b8481cdaa58ab83b0492d

        SHA256

        0d269d4ae961058923c9b6550f80699fe3a0cecdb36fceaefff61cd346427b43

        SHA512

        b460a0cc85b5e775b5f02006fd4248b95bf49b396e2a765d756c9d7d9336186fae5a97fd8c9f4270ff6dcd7523906523a7c692c2ffa324e42b5b565e25bfb432

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        f9c87eae816e0f847b1c17f4d8ae3f99

        SHA1

        23cd46f320bdebc1deaaf7d069faaa2947fda6ca

        SHA256

        4b63a9866b6afe3d75e3d99981a32aea75ea3e7c8f1a90074f25a15f39412372

        SHA512

        e43f774952f21a191f1d1ba1c2518eeb8bfd2357757aab984577c93bf43c41f229e72383fa110ad0b2907f8fb557354db16bf93e0631fb897dc65926aabb3018

      • F:\$RECYCLE.BIN\S-1-5-21-2610426812-2871295383-373749122-1000\_desktop.ini

        Filesize

        9B

        MD5

        2be02af4dacf3254e321ffba77f0b1c6

        SHA1

        d8349307ec08d45f2db9c9735bde8f13e27a551d

        SHA256

        766fe9c47ca710d9a00c08965550ee7de9cba2d32d67e4901e8cec7e33151d16

        SHA512

        57f61e1b939ed98e6db460ccdbc36a1460b727a99baac0e3b041666dedcef11fcd72a486d91ec7f0ee6e1aec40465719a6a5c22820c28be1066fe12fcd47ddd0

      • memory/1272-30-0x0000000002AA0000-0x0000000002AA1000-memory.dmp

        Filesize

        4KB

      • memory/1676-17-0x0000000000320000-0x0000000000354000-memory.dmp

        Filesize

        208KB

      • memory/1676-16-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1676-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2236-326-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2236-99-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2236-33-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2236-41-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2236-21-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2236-3341-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2236-1879-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2236-107-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2236-51-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2744-46-0x0000000000400000-0x0000000000613000-memory.dmp

        Filesize

        2.1MB

      • memory/2744-335-0x0000000000400000-0x0000000000613000-memory.dmp

        Filesize

        2.1MB

      • memory/2744-52-0x0000000000400000-0x0000000000613000-memory.dmp

        Filesize

        2.1MB

      • memory/2744-100-0x0000000000400000-0x0000000000613000-memory.dmp

        Filesize

        2.1MB

      • memory/2744-102-0x0000000000400000-0x0000000000613000-memory.dmp

        Filesize

        2.1MB

      • memory/2744-34-0x0000000000400000-0x0000000000613000-memory.dmp

        Filesize

        2.1MB

      • memory/2744-108-0x0000000000400000-0x0000000000613000-memory.dmp

        Filesize

        2.1MB

      • memory/2744-110-0x0000000000400000-0x0000000000613000-memory.dmp

        Filesize

        2.1MB

      • memory/2744-32-0x00000000040D0000-0x00000000040D1000-memory.dmp

        Filesize

        4KB

      • memory/2744-54-0x0000000000400000-0x0000000000613000-memory.dmp

        Filesize

        2.1MB

      • memory/2744-45-0x00000000040D0000-0x00000000040D1000-memory.dmp

        Filesize

        4KB

      • memory/2744-1880-0x0000000000400000-0x0000000000613000-memory.dmp

        Filesize

        2.1MB

      • memory/2744-1882-0x0000000000400000-0x0000000000613000-memory.dmp

        Filesize

        2.1MB

      • memory/2744-28-0x0000000000140000-0x0000000000141000-memory.dmp

        Filesize

        4KB

      • memory/2744-43-0x0000000000140000-0x0000000000141000-memory.dmp

        Filesize

        4KB

      • memory/2744-3342-0x0000000000400000-0x0000000000613000-memory.dmp

        Filesize

        2.1MB

      • memory/2744-3344-0x0000000000400000-0x0000000000613000-memory.dmp

        Filesize

        2.1MB

      • memory/2744-42-0x0000000000400000-0x0000000000613000-memory.dmp

        Filesize

        2.1MB