Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    22/04/2024, 21:19 UTC

General

  • Target

    814f3b407e405fa49141fce100527e3f507c8f2151eade1811474dedb51e7fc9.exe

  • Size

    5.7MB

  • MD5

    c34e10dee5409f323017af08a3adb3b0

  • SHA1

    f69c0a1099d6e1c7df2d97022fbc374a9a234727

  • SHA256

    814f3b407e405fa49141fce100527e3f507c8f2151eade1811474dedb51e7fc9

  • SHA512

    0d8edf87c7601368b9d25dda9be0b81152ec8db86b5fd9297f5b85fb32d107262a69860524316a9e316399d9e04bbc930543a57c2eb385beaced6f614eba52ea

  • SSDEEP

    49152:sBBPv94AEsKU8ggw1g+1CART5eBiyKS3EI3wybn20DCYIHvc8ixuZm9+fWsw6dTP:s7KUgTH2M2m9UMpu1QfLczqssnKSk

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 43 IoCs
  • Suspicious use of WriteProcessMemory 34 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1064
      • C:\Users\Admin\AppData\Local\Temp\814f3b407e405fa49141fce100527e3f507c8f2151eade1811474dedb51e7fc9.exe
        "C:\Users\Admin\AppData\Local\Temp\814f3b407e405fa49141fce100527e3f507c8f2151eade1811474dedb51e7fc9.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2912
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2704
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            4⤵
              PID:2888
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c C:\Users\Admin\AppData\Local\Temp\$$a15A3.bat
            3⤵
            • Deletes itself
            • Loads dropped DLL
            PID:2540
            • C:\Users\Admin\AppData\Local\Temp\814f3b407e405fa49141fce100527e3f507c8f2151eade1811474dedb51e7fc9.exe
              "C:\Users\Admin\AppData\Local\Temp\814f3b407e405fa49141fce100527e3f507c8f2151eade1811474dedb51e7fc9.exe"
              4⤵
              • Executes dropped EXE
              PID:2500
          • C:\Windows\Logo1_.exe
            C:\Windows\Logo1_.exe
            3⤵
            • Executes dropped EXE
            • Enumerates connected drives
            • Drops file in Program Files directory
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:2616
            • C:\Windows\SysWOW64\net.exe
              net stop "Kingsoft AntiVirus Service"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:2720
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                5⤵
                  PID:2456
              • C:\Windows\SysWOW64\net.exe
                net stop "Kingsoft AntiVirus Service"
                4⤵
                • Suspicious use of WriteProcessMemory
                PID:2364
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                  5⤵
                    PID:2512

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

            Filesize

            484KB

            MD5

            ed07588854ba117151a141b0a96bda37

            SHA1

            78c58f4e85e9d9d4e39c230f1354e183f87bdd9e

            SHA256

            fb97be2678ad28fef1f9f5a651fe12123ebea998adbb7f96b7073612990aa7d8

            SHA512

            45487252c6da9155a3a017c5030425e80dc6fb44d88efd470179f4c9b5b7e91d0785be70d458c5c64247abf2763e514bf07989608f9307084306e65f3d76f579

          • C:\Users\Admin\AppData\Local\Temp\$$a15A3.bat

            Filesize

            722B

            MD5

            a43a292ccceed565220460c943bd6c1f

            SHA1

            37e8f2fa55214492d0d57290dc5ef9d870c6ca4f

            SHA256

            a2973c5c35748fe74853b9567b7bdf1dab8438feb4a2c8828db94ebea62434bc

            SHA512

            4a7bcb69eda44e5517589d38fd0f6b327d430c8483fc4bbb977eabd66a8dea305c3c86111558634f678795cc6e0ab1777e2902df5a6a91facb2360a8e3959ea5

          • C:\Users\Admin\AppData\Local\Temp\814f3b407e405fa49141fce100527e3f507c8f2151eade1811474dedb51e7fc9.exe.exe

            Filesize

            5.7MB

            MD5

            ba18e99b3e17adb5b029eaebc457dd89

            SHA1

            ec0458f3c00d35b323f08d4e1cc2e72899429c38

            SHA256

            f5ee36de8edf9be2ac2752b219cfdcb7ca1677071b8e116cb876306e9f1b6628

            SHA512

            1f41929e6f5b555b60c411c7810cbf14e3af26100df5ac4533ec3739a278c1b925687284660efb4868e3741305098e2737836229efc9fe46c97a6057c10e677c

          • C:\Windows\Logo1_.exe

            Filesize

            39KB

            MD5

            f4768631d279965f7060d71d3b9c858f

            SHA1

            2bccced94b3cc81ae22931489a3c8b57c2a6f8df

            SHA256

            c025ab0b3651689d4a9d3e4d8a428b219c887d9ca72532962b812bf4c091beaa

            SHA512

            bc8aabea17286c99265055794fad2831ab11d012d6835a9a2e6974722346c95a300a9610ee704c9b531b29680fdae19bdd1d0e60c889a7c2e2723779b88da891

          • F:\$RECYCLE.BIN\S-1-5-21-2721934792-624042501-2768869379-1000\_desktop.ini

            Filesize

            9B

            MD5

            a4e284afce5c2e93b509543e6064da82

            SHA1

            77a7ae3e38b05410dcf335f8abe1df4d7f0b141c

            SHA256

            f4460d1a85b2980fa2b8d329adda0fd330f8157d7afc2d7b1bad62453ff1dfe8

            SHA512

            8f2147ca54c96b0b05bf69a7919b5bf54b20036ba8336f6ba379c2abb0d31139a91d315130040ef1d06450dd624d8a8661396eb082407b8f7455be4d61351821

          • memory/1064-28-0x0000000002AD0000-0x0000000002AD1000-memory.dmp

            Filesize

            4KB

          • memory/2616-32-0x0000000000400000-0x000000000043D000-memory.dmp

            Filesize

            244KB

          • memory/2616-20-0x0000000000400000-0x000000000043D000-memory.dmp

            Filesize

            244KB

          • memory/2616-3319-0x0000000000400000-0x000000000043D000-memory.dmp

            Filesize

            244KB

          • memory/2616-4142-0x0000000000400000-0x000000000043D000-memory.dmp

            Filesize

            244KB

          • memory/2912-19-0x0000000000230000-0x000000000026D000-memory.dmp

            Filesize

            244KB

          • memory/2912-0-0x0000000000400000-0x000000000043D000-memory.dmp

            Filesize

            244KB

          • memory/2912-15-0x0000000000400000-0x000000000043D000-memory.dmp

            Filesize

            244KB

          • memory/2912-17-0x0000000000230000-0x000000000026D000-memory.dmp

            Filesize

            244KB

          We care about your privacy.

          This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.