Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    18/04/2024, 05:02

General

  • Target

    612082e89ff3931365f179e90d8ac4ee1cc70e0b0773be5239621f46a9aefff5.exe

  • Size

    99KB

  • MD5

    5d4d3142a3aad5b1f95c4fb8daa20fbf

  • SHA1

    91b52711e120e1ba1789aae6fcb48e837870c4d0

  • SHA256

    612082e89ff3931365f179e90d8ac4ee1cc70e0b0773be5239621f46a9aefff5

  • SHA512

    a12fc823412c876c3e5a777e39207ad2266a7da76e597601f0a268151ebc6ebaa99551301102b42b140644cc72414db7cfa8a9329c220cc3b3b0a40fa3917bad

  • SSDEEP

    1536:zLfgLdQAQfcfymNOeRLagGxBalspwrQozDQ4rRh2G2WW5ntaF6Kkv9+4PIX5XPS7:zLftffjmNVcxBalsWfThs06n+D5Xq

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1208
      • C:\Users\Admin\AppData\Local\Temp\612082e89ff3931365f179e90d8ac4ee1cc70e0b0773be5239621f46a9aefff5.exe
        "C:\Users\Admin\AppData\Local\Temp\612082e89ff3931365f179e90d8ac4ee1cc70e0b0773be5239621f46a9aefff5.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:2212
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\$$a1D70.bat
          3⤵
          • Deletes itself
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:2624
          • C:\Users\Admin\AppData\Local\Temp\612082e89ff3931365f179e90d8ac4ee1cc70e0b0773be5239621f46a9aefff5.exe
            "C:\Users\Admin\AppData\Local\Temp\612082e89ff3931365f179e90d8ac4ee1cc70e0b0773be5239621f46a9aefff5.exe"
            4⤵
            • Executes dropped EXE
            PID:2832
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:3004
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2668
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:2572

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        251KB

        MD5

        bdd08c2b14bc84bdb0bb437b6dbcf72f

        SHA1

        529a6a7c8beaa8b3074c6377b17bdb17fb848b54

        SHA256

        e5137cfd43e6bbd5e2044cc56e6d08b4441423481a9f5be2efdf8b2d4261047e

        SHA512

        7b2d923586038a4b0a4069d8c0d18b93ec39e363e6428f032df50a5091ec0617e921316bffcb70709d1e16d32b928d9c83cc3d831b57c641fb6497e1ae876fca

      • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

        Filesize

        471KB

        MD5

        4cfdb20b04aa239d6f9e83084d5d0a77

        SHA1

        f22863e04cc1fd4435f785993ede165bd8245ac6

        SHA256

        30ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9

        SHA512

        35b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86

      • C:\Users\Admin\AppData\Local\Temp\$$a1D70.bat

        Filesize

        722B

        MD5

        cc03b6b6a845c71bc700a7fe334824ba

        SHA1

        17f163929f79a0b17a786f862343112ca307cccd

        SHA256

        d29440b9a53575700845fbe47426ed61a93bb7e78bdefbbb792862fd3baeda9e

        SHA512

        f2207177ad4ff3e191c1ad3e2a3e981a7428b2f6017c7d1baf82fffebc8afb38d58854c6f0460258e86daf340a2543d38a53bb2bc7e44e74a880c655de1330ea

      • C:\Users\Admin\AppData\Local\Temp\612082e89ff3931365f179e90d8ac4ee1cc70e0b0773be5239621f46a9aefff5.exe.exe

        Filesize

        73KB

        MD5

        ff4f229bc63a0e9a7583b39663d9c59b

        SHA1

        94f6ad0c737a4d519586bfb9e2838779e32dbd39

        SHA256

        39a3f52f90c4f35121720da8a8e8b5734d5582ca683b6ea67d17527ccf965947

        SHA512

        377e95042ebf2e6ae2790143bfc562670f1fa523aef04e15fb8ff39ddddf2efecec9fbe6dbe7b9c22577cae8dfd5d58be0579ac72e7d39077fe57fc11925ec73

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        512efa11327090c7e4e592a32ad9a28c

        SHA1

        d6821ff811143ff9cb7027ef991e9582f4ffc7d5

        SHA256

        e135aefb131eeff159bb49e808679a6b837a183fae3e5c0b32d6f237ccddc7ef

        SHA512

        074cb80f5835408e074f336ad7fd6ab4cd87e7614d389453c7ab0a753aa9f3aa2e56e9c0f4d50a1070fce1632f55aefc60a45bab97dd2cd480201cd10b81345b

      • F:\$RECYCLE.BIN\S-1-5-21-1298544033-3225604241-2703760938-1000\_desktop.ini

        Filesize

        9B

        MD5

        72b7e38c6ba037d117f32b55c07b1a9c

        SHA1

        35e2435e512e17ca2be885e17d75913f06b90361

        SHA256

        e9719e3c653627668046bac84b77097bfb0cd018d68465c17130ed31d6d6eca6

        SHA512

        2bebd814b81ad2dc547802d42891d833caaad81d004758ec4373f9c7af2971eb822f0a559d2d5d4fca499912fea95e25bab22e92cb0c149d6a4c692eee6ee46a

      • memory/1208-29-0x0000000002F60000-0x0000000002F61000-memory.dmp

        Filesize

        4KB

      • memory/2212-39-0x0000000000220000-0x0000000000254000-memory.dmp

        Filesize

        208KB

      • memory/2212-16-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2212-17-0x0000000000220000-0x0000000000254000-memory.dmp

        Filesize

        208KB

      • memory/2212-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3004-38-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3004-45-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3004-91-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3004-97-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3004-512-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3004-1850-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3004-31-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3004-3310-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3004-21-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB