Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    152s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/04/2024, 15:40

General

  • Target

    586012dba559469fda356535fd81ce78494d5a4acc329b12672bea9a00c6e70b.exe

  • Size

    2.1MB

  • MD5

    ffcedb1564362366242f115173246db9

  • SHA1

    b2a8994fe972a6d34259b4621a277cef0052f454

  • SHA256

    586012dba559469fda356535fd81ce78494d5a4acc329b12672bea9a00c6e70b

  • SHA512

    956134f7e804c7734d46ad55288bcdfb5704805140dcc581e052a9ae18f08b45abc8d8a4788aac673cb4c444b541210cf836b5079df9770a90981e4fe513059d

  • SSDEEP

    24576:v75vNmH62Yl/oEGONDz4HlkZWmQBeAAtrpbr9flSvic2OwBVyuK380vF8yYsIDyb:v7ccwAjNlSvEzV638A8yYsIDDYIHa

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3360
      • C:\Users\Admin\AppData\Local\Temp\586012dba559469fda356535fd81ce78494d5a4acc329b12672bea9a00c6e70b.exe
        "C:\Users\Admin\AppData\Local\Temp\586012dba559469fda356535fd81ce78494d5a4acc329b12672bea9a00c6e70b.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:372
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aBC3.bat
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2220
          • C:\Users\Admin\AppData\Local\Temp\586012dba559469fda356535fd81ce78494d5a4acc329b12672bea9a00c6e70b.exe
            "C:\Users\Admin\AppData\Local\Temp\586012dba559469fda356535fd81ce78494d5a4acc329b12672bea9a00c6e70b.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:1192
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:3776
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:4204
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:4928
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3704 --field-trial-handle=2252,i,16022092570067181109,3235558581947505669,262144 --variations-seed-version /prefetch:8
        1⤵
          PID:4040

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files\7-Zip\7z.exe

          Filesize

          570KB

          MD5

          cbecfee419b914df6a9084955b74157b

          SHA1

          3b93b7e37f0e5e7065018fd174203123e59ad10e

          SHA256

          25f471c47b0238ac0dfc350462e5d01b58033d615dfa0003efbf59541c831804

          SHA512

          7c9232504794fb0805aa17a277ef7f7d221a91e6ba9dd8276e3a3210216b6dc51e3fb39a0be610e4045c57d6cba0ec522e3d394bda2de82669db0cb77e02882a

        • C:\Users\Admin\AppData\Local\Temp\$$aBC3.bat

          Filesize

          721B

          MD5

          fa5c7d019af021387a1c806cefa316f5

          SHA1

          8ce992f93dbcf8f3735850bc3aab6a2aac7b2005

          SHA256

          a4924d450ff17ce9a4dd24819996379a45a70e50fb1a365725440c4448d50686

          SHA512

          4a3708d048184a912f3fab2bc028142e4ed910b582104c82b74f42abd131c45d31606907caa0f5867ba9f4972c6a5c08ff75e3b259aaf4e01467c6c916a3365a

        • C:\Users\Admin\AppData\Local\Temp\586012dba559469fda356535fd81ce78494d5a4acc329b12672bea9a00c6e70b.exe.exe

          Filesize

          2.0MB

          MD5

          4f8b3fa38737846375f10515b4074086

          SHA1

          dd59d585d2b330e4477b8481cdaa58ab83b0492d

          SHA256

          0d269d4ae961058923c9b6550f80699fe3a0cecdb36fceaefff61cd346427b43

          SHA512

          b460a0cc85b5e775b5f02006fd4248b95bf49b396e2a765d756c9d7d9336186fae5a97fd8c9f4270ff6dcd7523906523a7c692c2ffa324e42b5b565e25bfb432

        • C:\Windows\Logo1_.exe

          Filesize

          26KB

          MD5

          f9c87eae816e0f847b1c17f4d8ae3f99

          SHA1

          23cd46f320bdebc1deaaf7d069faaa2947fda6ca

          SHA256

          4b63a9866b6afe3d75e3d99981a32aea75ea3e7c8f1a90074f25a15f39412372

          SHA512

          e43f774952f21a191f1d1ba1c2518eeb8bfd2357757aab984577c93bf43c41f229e72383fa110ad0b2907f8fb557354db16bf93e0631fb897dc65926aabb3018

        • F:\$RECYCLE.BIN\S-1-5-21-3808065738-1666277613-1125846146-1000\_desktop.ini

          Filesize

          9B

          MD5

          2be02af4dacf3254e321ffba77f0b1c6

          SHA1

          d8349307ec08d45f2db9c9735bde8f13e27a551d

          SHA256

          766fe9c47ca710d9a00c08965550ee7de9cba2d32d67e4901e8cec7e33151d16

          SHA512

          57f61e1b939ed98e6db460ccdbc36a1460b727a99baac0e3b041666dedcef11fcd72a486d91ec7f0ee6e1aec40465719a6a5c22820c28be1066fe12fcd47ddd0

        • memory/372-10-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/372-0-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/1192-40-0x0000000000400000-0x0000000000613000-memory.dmp

          Filesize

          2.1MB

        • memory/1192-1196-0x0000000000400000-0x0000000000613000-memory.dmp

          Filesize

          2.1MB

        • memory/1192-1993-0x0000000000400000-0x0000000000613000-memory.dmp

          Filesize

          2.1MB

        • memory/1192-1198-0x0000000000400000-0x0000000000613000-memory.dmp

          Filesize

          2.1MB

        • memory/1192-29-0x0000000000400000-0x0000000000613000-memory.dmp

          Filesize

          2.1MB

        • memory/1192-30-0x0000000001660000-0x0000000001661000-memory.dmp

          Filesize

          4KB

        • memory/1192-32-0x0000000000400000-0x0000000000613000-memory.dmp

          Filesize

          2.1MB

        • memory/1192-83-0x0000000000400000-0x0000000000613000-memory.dmp

          Filesize

          2.1MB

        • memory/1192-38-0x0000000000400000-0x0000000000613000-memory.dmp

          Filesize

          2.1MB

        • memory/1192-18-0x0000000001660000-0x0000000001661000-memory.dmp

          Filesize

          4KB

        • memory/1192-1028-0x0000000000400000-0x0000000000613000-memory.dmp

          Filesize

          2.1MB

        • memory/1192-45-0x0000000000400000-0x0000000000613000-memory.dmp

          Filesize

          2.1MB

        • memory/1192-47-0x0000000000400000-0x0000000000613000-memory.dmp

          Filesize

          2.1MB

        • memory/1192-21-0x0000000000400000-0x0000000000613000-memory.dmp

          Filesize

          2.1MB

        • memory/1192-51-0x0000000000400000-0x0000000000613000-memory.dmp

          Filesize

          2.1MB

        • memory/1192-53-0x0000000000400000-0x0000000000613000-memory.dmp

          Filesize

          2.1MB

        • memory/3776-50-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/3776-82-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/3776-8-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/3776-1027-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/3776-44-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/3776-1195-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/3776-37-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/3776-28-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/3776-1992-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/3776-20-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB