Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    151s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/04/2024, 20:59

General

  • Target

    e3500312be49cde8dce63a9dbae27b94a8d739b79b6ddf0a395f62e81c6870c2.exe

  • Size

    2.6MB

  • MD5

    55f2ac98ecaf89e0d3b770704951de97

  • SHA1

    a810a392ff8300b2299082fbc87a172948ce0ee7

  • SHA256

    e3500312be49cde8dce63a9dbae27b94a8d739b79b6ddf0a395f62e81c6870c2

  • SHA512

    c19c961b919685e8fc1373b7afcfaa65561234bc3ba29cae3d8c424c83f521e8bf6a2b9e4db6cc98737dbe56054a050a6559eb2354c809d134d64bceb344bef0

  • SSDEEP

    49152:/74QjRFxhHmPJhtG6ToOKK6j+BpriB55IKNdyVTvKSRr42/rTmJ7kgRgOP:UUFdKdBpriH5IkyVTCZ2OhkgT

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 37 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3372
      • C:\Users\Admin\AppData\Local\Temp\e3500312be49cde8dce63a9dbae27b94a8d739b79b6ddf0a395f62e81c6870c2.exe
        "C:\Users\Admin\AppData\Local\Temp\e3500312be49cde8dce63a9dbae27b94a8d739b79b6ddf0a395f62e81c6870c2.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:3456
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aF30B.bat
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3368
          • C:\Users\Admin\AppData\Local\Temp\e3500312be49cde8dce63a9dbae27b94a8d739b79b6ddf0a395f62e81c6870c2.exe
            "C:\Users\Admin\AppData\Local\Temp\e3500312be49cde8dce63a9dbae27b94a8d739b79b6ddf0a395f62e81c6870c2.exe"
            4⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:4980
            • C:\Program Files (x86)\Internet Explorer\iexplore.exe
              "C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://se.360.cn/
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:4816
              • C:\Program Files\Internet Explorer\IEXPLORE.EXE
                "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://se.360.cn/
                6⤵
                • Modifies Internet Explorer settings
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SetWindowsHookEx
                • Suspicious use of WriteProcessMemory
                PID:4384
                • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                  "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4384 CREDAT:17410 /prefetch:2
                  7⤵
                  • Modifies Internet Explorer settings
                  • Suspicious use of SetWindowsHookEx
                  PID:2100
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1360
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:3360
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:692
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4064 --field-trial-handle=2744,i,16362475727591565961,3676688664819797550,262144 --variations-seed-version /prefetch:8
        1⤵
          PID:5084

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

          Filesize

          251KB

          MD5

          3a4ae7d36a409e517a8b88e7c8884f43

          SHA1

          a1131b4bb058dc5d5200e265ab93a2e6f706691f

          SHA256

          0e03a0de5ba761adc588229fddca341da31f1c3e2a0d8787ffd2f04aa2c7375f

          SHA512

          73a23fefa570f033b9126abfee56bbc20ade32aa98e9887ea5cc81b54dc8349eeb79b1c35b10022e5560cf3055304be278762a3d62529204638c3c1cdbbb03eb

        • C:\Program Files\7-Zip\7z.exe

          Filesize

          570KB

          MD5

          abc39bb762c9fdd1df9c48340d1239ca

          SHA1

          af372f979fc9ca1c41de73510dfa05f3cd89f887

          SHA256

          1b722ae85b8c09e3a993db4b39131a4c4aba3bf86549b48e94f3f4e1f5d6c506

          SHA512

          3eff4ded8371184869f407a347765d0574281634f33ae99b96bc28c405fafe2f721c9969eba56a22815a4fce7a4fc478b32b1f16ce4be99e10d6d548f3a552e0

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

          Filesize

          471B

          MD5

          5886ebbb06bf5a12f0dc4ddef0815261

          SHA1

          7e1f7bafed4d483f4add5636aa87c589f6e4a92c

          SHA256

          79ce166b0137a3ad2c42f02a97b0e52d73032eb31c520e71405820250426c6c4

          SHA512

          2dd350196a0cc8e339065603a6459cd7704e413f95202a38a4b21c0c6fb85609c2b794e517675c270eb9881b73f11b000b647c539a129c301d38b16d6bdf73e1

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

          Filesize

          404B

          MD5

          573064140ea52a656d2ff2bb9592a248

          SHA1

          701f0d5af2bb465ab8d2dc0346e792e3d536540d

          SHA256

          32e7e6631826ee93e612306153b079f82197e3b646d7a5cc70c35d6bc19a149c

          SHA512

          3bb8bc9fbb13dca3727626f1aaf49929467b82113b05601d4c8e1785926d6dbb00ccd6daf4b8ea61f72bc5d933de6bc3cc3049d5f906e5715620873c9e510ee4

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\BHC2O5WS\suggestions[1].en-US

          Filesize

          17KB

          MD5

          5a34cb996293fde2cb7a4ac89587393a

          SHA1

          3c96c993500690d1a77873cd62bc639b3a10653f

          SHA256

          c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

          SHA512

          e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

        • C:\Users\Admin\AppData\Local\Temp\$$aF30B.bat

          Filesize

          722B

          MD5

          89f138fbc828f6210e823cf29161a4ee

          SHA1

          01e8501b739bd5107984cf27f0613190910de481

          SHA256

          b6f21ac4a67eba969c194c26bcbe1444d9fe29e55ec95d2b222288e2118b1ee2

          SHA512

          cbd6f66263b85d948726e3b52bb0fbd0574b88fc954b434be5c5b0d030fa3a0d418b629cc758496b198ad35cce6f2e31749e3db655c616a77ee7dc28d3fbb0d2

        • C:\Users\Admin\AppData\Local\Temp\e3500312be49cde8dce63a9dbae27b94a8d739b79b6ddf0a395f62e81c6870c2.exe.exe

          Filesize

          2.6MB

          MD5

          63283f1fbf548b531be48bdaa16fe426

          SHA1

          5e61729e95fdce9accf098cec41e9fef53d2075c

          SHA256

          04db7817d515dc7093293a76cb3971babdd70122d6b77cbaf9655c6fbf06b63e

          SHA512

          cf75aa9270ffa074acc2434309177e1ffa94650ca5a0e059a43292310a0d917ca169a35760d7cd5a0ecc2d4b2754c8238c24db271c39fd263b0308473d233e51

        • C:\Windows\Logo1_.exe

          Filesize

          26KB

          MD5

          6ff88aed67261a9080c1e62fd8bd0504

          SHA1

          14aed18f7ccd0e479389f111b63e79f2578001b1

          SHA256

          ee50a980fa1e7b2d29fc3adfa8acdeeda2cfd4937f4efe6346bfd9d0dac37a45

          SHA512

          4eac127c6e81a6c5c91b5276cd4a059c1fc3d78f8b5911d1c4b8fb77cb355d61f32b22c8230d55c6ac61f7ef52062dffe76f9b98dd0d18331e26a8c7eb070172

        • F:\$RECYCLE.BIN\S-1-5-21-3808065738-1666277613-1125846146-1000\_desktop.ini

          Filesize

          9B

          MD5

          2be02af4dacf3254e321ffba77f0b1c6

          SHA1

          d8349307ec08d45f2db9c9735bde8f13e27a551d

          SHA256

          766fe9c47ca710d9a00c08965550ee7de9cba2d32d67e4901e8cec7e33151d16

          SHA512

          57f61e1b939ed98e6db460ccdbc36a1460b727a99baac0e3b041666dedcef11fcd72a486d91ec7f0ee6e1aec40465719a6a5c22820c28be1066fe12fcd47ddd0

        • memory/1360-42-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/1360-52-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/1360-27-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/1360-69-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/1360-9-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/1360-211-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/1360-1208-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/1360-1997-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/1360-20-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/1360-4937-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/3456-0-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/3456-10-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB