Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    01/05/2024, 18:14

General

  • Target

    eb5864695d1454702d0bd1c69607bf5ce80fb8650e02350c1cef8dcea1565389.exe

  • Size

    711KB

  • MD5

    a4c9273285b71241d7773f5dcb5974b6

  • SHA1

    c0be46e8031968a721d9c0e46a50ec806d7cbeae

  • SHA256

    eb5864695d1454702d0bd1c69607bf5ce80fb8650e02350c1cef8dcea1565389

  • SHA512

    060aa3e936c36f1bb99e86c8f7e307b20c872a8e9b6e40db7e7bc5d9a255f01fab4bbadb49a8cb407a742dc992213553dbc36e27afbabe16a490a6360b8a6ab8

  • SSDEEP

    12288:4pKfC6Aj+TN5uixZN+8rKhUdTC/wE1ZD0Ca5ZIXV:4pGLOS2opPIXV

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Executes dropped EXE
    PID:1156
    • C:\Users\Admin\AppData\Local\Temp\eb5864695d1454702d0bd1c69607bf5ce80fb8650e02350c1cef8dcea1565389.exe
      "C:\Users\Admin\AppData\Local\Temp\eb5864695d1454702d0bd1c69607bf5ce80fb8650e02350c1cef8dcea1565389.exe"
      2⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:2156
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c C:\Users\Admin\AppData\Local\Temp\$$aEEF.bat
        3⤵
        • Deletes itself
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:3016
        • C:\Users\Admin\AppData\Local\Temp\eb5864695d1454702d0bd1c69607bf5ce80fb8650e02350c1cef8dcea1565389.exe
          "C:\Users\Admin\AppData\Local\Temp\eb5864695d1454702d0bd1c69607bf5ce80fb8650e02350c1cef8dcea1565389.exe"
          4⤵
          • Executes dropped EXE
          PID:2828
      • C:\Windows\Logo1_.exe
        C:\Windows\Logo1_.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2556
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2536
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            5⤵
              PID:2756

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

      Filesize

      252KB

      MD5

      3c69dc716a7557dbb70075c4a046836b

      SHA1

      ce9aa0d3e3b836162e903113f1d706b9dd32f346

      SHA256

      7ea22b53ceeca736388058d014370f11a9b6bae189768acc2c0cdeadcbf271cb

      SHA512

      5eeadfbf716853070a5894e3e0199291072ff40c97a1855f903939c2da58bfb679252e6a16f66b11b109f09ee518900f09a7d055d502067ebb7daee5581d0e95

    • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

      Filesize

      472KB

      MD5

      88eb1bca8c399bc3f46e99cdde2f047e

      SHA1

      55fafbceb011e1af2edced978686a90971bd95f2

      SHA256

      42fd78c05bc240d4ded16ac974f17c336f6ae3a1814d548021c48a942cc30428

      SHA512

      149d4de0c024e25a13a7bb17471e6f48391d4f26b1c8388672320eed1c255f84219ad7b72bbebc531ae558d5192dd4bb6d0dddd6c65a45300c8e8348a4fb3728

    • C:\Users\Admin\AppData\Local\Temp\$$aEEF.bat

      Filesize

      721B

      MD5

      bc2811f5ca22584b172f80c5c2461beb

      SHA1

      a4ca997053d345e2bf98e5f22882dd753220e965

      SHA256

      0375a9552de2fbd28909c6583896a0e148c21850a02aa760d84dfa3da3fd8677

      SHA512

      be73ca058d277ae5e8c884731b9e8476a6c48b95417a86bf21c01b37ebfcae9649c6f1748ecf447824b4ba951933edabf6578ce60aebef21ac0d85ca02ffed98

    • C:\Users\Admin\AppData\Local\Temp\eb5864695d1454702d0bd1c69607bf5ce80fb8650e02350c1cef8dcea1565389.exe.exe

      Filesize

      684KB

      MD5

      50f289df0c19484e970849aac4e6f977

      SHA1

      3dc77c8830836ab844975eb002149b66da2e10be

      SHA256

      b9b179b305c5268ad428b6ae59de10b4fe99cf0199bbc89b7017181905e97305

      SHA512

      877d852ea1062b90e2fd2f3c4dc7d05d9697e9a9b2929c830a770b62741f6a11e06de73275eb871113f11143faf1cb40d99f7c247862ffb778d26833ed5d7e38

    • C:\Windows\Logo1_.exe

      Filesize

      27KB

      MD5

      0d2afc52185c36893aa016ece9778d83

      SHA1

      4ceaeffd92c7f5abac141778640daa10bfe6c37d

      SHA256

      b73d7ec870f452f48c61bbd2e314df032cc8265e34f4f6b61d27ab8aef9097fa

      SHA512

      964b28cd5568a2c31a183e73d17c1ce39e35715442e1c6e63b1d9da54f087e176657eb7866d7f61fcf0b4a600c02bcd928d45667a6a4c64701e116ad59d5bbd3

    • F:\$RECYCLE.BIN\S-1-5-21-2297530677-1229052932-2803917579-1000\_desktop.ini

      Filesize

      8B

      MD5

      35a8ee2041a708d5071bff39818311c3

      SHA1

      31114ee16a39b8ada4130a94c1c36ed74a563d2a

      SHA256

      b2405b086204a9155a2dabf58717e53695089ece5d0af208cb960473ba350f8b

      SHA512

      f17fa8c794a47b0134ac4d8e83010e8dce1a0f2ab74a400c571d6470737e386f4eb1351be6c5b153dc063c49d333b69ddf67871d2e0ffb3c02d243be0015f1f0

    • memory/1156-30-0x0000000002E10000-0x0000000002E11000-memory.dmp

      Filesize

      4KB

    • memory/2156-16-0x0000000000400000-0x0000000000435000-memory.dmp

      Filesize

      212KB

    • memory/2156-0-0x0000000000400000-0x0000000000435000-memory.dmp

      Filesize

      212KB

    • memory/2556-17-0x0000000000400000-0x0000000000435000-memory.dmp

      Filesize

      212KB

    • memory/2556-45-0x0000000000400000-0x0000000000435000-memory.dmp

      Filesize

      212KB

    • memory/2556-91-0x0000000000400000-0x0000000000435000-memory.dmp

      Filesize

      212KB

    • memory/2556-97-0x0000000000400000-0x0000000000435000-memory.dmp

      Filesize

      212KB

    • memory/2556-656-0x0000000000400000-0x0000000000435000-memory.dmp

      Filesize

      212KB

    • memory/2556-1850-0x0000000000400000-0x0000000000435000-memory.dmp

      Filesize

      212KB

    • memory/2556-39-0x0000000000400000-0x0000000000435000-memory.dmp

      Filesize

      212KB

    • memory/2556-2501-0x0000000000400000-0x0000000000435000-memory.dmp

      Filesize

      212KB

    • memory/2556-3310-0x0000000000400000-0x0000000000435000-memory.dmp

      Filesize

      212KB

    • memory/2556-32-0x0000000000400000-0x0000000000435000-memory.dmp

      Filesize

      212KB