Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/05/2024, 07:18

General

  • Target

    8abfd403cc7f839963eaa085ba2bf55f3df5f482fb2c0896caf38bcd62120b99.exe

  • Size

    5.7MB

  • MD5

    54da90282e7b2fa9c1cf20fbbe3f0625

  • SHA1

    732614d5489d69df97b74e5a53c136a85f91b857

  • SHA256

    8abfd403cc7f839963eaa085ba2bf55f3df5f482fb2c0896caf38bcd62120b99

  • SHA512

    e8ca340b6458622bd2928e112a3f2e70a2c470725f9d43914d4560cb10abb7d6cfac9b3b0f78842a43389c781f34043980aa72da14cc8e9dc52b8f93782141ff

  • SSDEEP

    49152:0Pv94AEsKU8ggw1g+1CART5eBiyKS3EI3wybn20DCYIHvc8ixuZm9+fWsw6dTPBm:yKUgTH2M2m9UMpu1QfLczqssnKSh

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3412
      • C:\Users\Admin\AppData\Local\Temp\8abfd403cc7f839963eaa085ba2bf55f3df5f482fb2c0896caf38bcd62120b99.exe
        "C:\Users\Admin\AppData\Local\Temp\8abfd403cc7f839963eaa085ba2bf55f3df5f482fb2c0896caf38bcd62120b99.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:1500
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a45B4.bat
          3⤵
            PID:4564
            • C:\Users\Admin\AppData\Local\Temp\8abfd403cc7f839963eaa085ba2bf55f3df5f482fb2c0896caf38bcd62120b99.exe
              "C:\Users\Admin\AppData\Local\Temp\8abfd403cc7f839963eaa085ba2bf55f3df5f482fb2c0896caf38bcd62120b99.exe"
              4⤵
              • Executes dropped EXE
              PID:744
          • C:\Windows\Logo1_.exe
            C:\Windows\Logo1_.exe
            3⤵
            • Executes dropped EXE
            • Enumerates connected drives
            • Drops file in Program Files directory
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:4924
            • C:\Windows\SysWOW64\net.exe
              net stop "Kingsoft AntiVirus Service"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:2836
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                5⤵
                  PID:3692

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleUpdateCore.exe

          Filesize

          244KB

          MD5

          d5b80ef8970e86b79ea266783e9c94c0

          SHA1

          d4c48101fc1730d3d433e191dee9282f60e414ac

          SHA256

          4a62d2d207908ae0621d60dee06b3c94aedf73f629d54944825805f0954ff712

          SHA512

          c7c94792cea685976f33bdf9e019762d1d6ba23cbfa1755ad912378c4d364a7b3e08bdae88c4e813e7c9b7ed0c3d54e69b18dd8491627d21e9977c4d3bed863b

        • C:\Program Files\7-Zip\7z.exe

          Filesize

          571KB

          MD5

          d60b13f00afc796226eb341091a3ddb4

          SHA1

          7202c024ac30fbc95bbc3887b55c9ef28b04db23

          SHA256

          61340350ff59841f9ccd99ed64b5b673c4b686e36e8ebc4a6e8822ccfa7224e7

          SHA512

          aaed53ec799bab2c24d8f000afd2f5ad9e03b05b2c81d9a445068e3600724c7a33ad63fa51d87f71506b2829c9532f0160aa90215797ee2442c3c48d4fa2626a

        • C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe

          Filesize

          637KB

          MD5

          9cba1e86016b20490fff38fb45ff4963

          SHA1

          378720d36869d50d06e9ffeef87488fbc2a8c8f7

          SHA256

          a22e6d0f5c7d44fefc2204e0f7c7b048e1684f6cf249ba98c006bbf791c22d19

          SHA512

          2f3737d29ea3925d10ea5c717786425f6434be732974586328f03691a35cd1539828e3301685749e5c4135b8094f15b87fb9659915de63678a25749e2f8f5765

        • C:\Users\Admin\AppData\Local\Temp\$$a45B4.bat

          Filesize

          722B

          MD5

          bb4dd8d54a258090f4d409a11df8d184

          SHA1

          eaeb41f4ef2a350f0131365ebbb04a963406f2a9

          SHA256

          896e314f19f1cabf4448f94dca1b495a85f5f7bbb7562288ee2bb527160f4595

          SHA512

          0ab1a8a90e46834770f5d1cb6dead2afdbce82e91bf6a7d61946be3e7db058ad81cbb6e2ce4eeab90fc0b2ef5a9e9733bdaa7486589666c217048f8ffdae58fc

        • C:\Users\Admin\AppData\Local\Temp\8abfd403cc7f839963eaa085ba2bf55f3df5f482fb2c0896caf38bcd62120b99.exe.exe

          Filesize

          5.7MB

          MD5

          c596c3539f619ec76f36741933da5bed

          SHA1

          b3243f0ee893528f0ccd71700ca9970def6670b5

          SHA256

          bb9f95d1b280c1ec9ae27cf564bbb1b485e2d721d44b3288a9a43c07517e38de

          SHA512

          e6e9bd571f8a74b0d2f1a88f9c90fbf10a2150cda55cd4ad6f9a37e0c4a957a175ecb8adf17822331e6cb83bac6fec5bdc2fc87fdb5bc2bfa46ad7dac4df31d2

        • C:\Windows\Logo1_.exe

          Filesize

          27KB

          MD5

          151e98c05a995884a3f5fe2077409a99

          SHA1

          e7379083dd24f1dc62d41698f86a805db837e929

          SHA256

          e3cdf680322b8ce4451e5bac81f4403fabef6cc7c33d7ca23eb55564656e2413

          SHA512

          108ce79cd432c17c4bba84878e95f1d0c38ab8546356d4e2f75eba182a145449969b602b183158f56b8ff08a7c4cbc0811fb21e07268fe9a47eaeb442737105b

        • F:\$RECYCLE.BIN\S-1-5-21-3726321484-1950364574-433157660-1000\_desktop.ini

          Filesize

          8B

          MD5

          ec89b9cba2f5e7b9394fdd901d6c3977

          SHA1

          63b0db3abcd08b863a9a3944799b41efa264db40

          SHA256

          2b4efa4e113d3044c8e47f59a7b75225cc7736c2fa28f9e52949b9441f3d77ca

          SHA512

          901f7d44754e59fba0b1b90341927744f670463f4d18e2694617f74fe4e3f456e9088530bccc16e758fc67a23f91380a3655121ba911e8ff5173f3ac4cb0f1d2

        • memory/1500-13-0x0000000000400000-0x0000000000435000-memory.dmp

          Filesize

          212KB

        • memory/1500-0-0x0000000000400000-0x0000000000435000-memory.dmp

          Filesize

          212KB

        • memory/4924-27-0x0000000000400000-0x0000000000435000-memory.dmp

          Filesize

          212KB

        • memory/4924-37-0x0000000000400000-0x0000000000435000-memory.dmp

          Filesize

          212KB

        • memory/4924-33-0x0000000000400000-0x0000000000435000-memory.dmp

          Filesize

          212KB

        • memory/4924-78-0x0000000000400000-0x0000000000435000-memory.dmp

          Filesize

          212KB

        • memory/4924-1238-0x0000000000400000-0x0000000000435000-memory.dmp

          Filesize

          212KB

        • memory/4924-20-0x0000000000400000-0x0000000000435000-memory.dmp

          Filesize

          212KB

        • memory/4924-4801-0x0000000000400000-0x0000000000435000-memory.dmp

          Filesize

          212KB

        • memory/4924-12-0x0000000000400000-0x0000000000435000-memory.dmp

          Filesize

          212KB

        • memory/4924-5264-0x0000000000400000-0x0000000000435000-memory.dmp

          Filesize

          212KB