Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/05/2024, 16:15

General

  • Target

    e59abe31b0d086dbb3eaf989bed1c6638d10772cf0733b828220e87ba51d390b.exe

  • Size

    797KB

  • MD5

    f35f37d1b74d94d33a751aacce2758b3

  • SHA1

    1f0401fc2400f9b571a0d794789b010a7ec9d5c7

  • SHA256

    e59abe31b0d086dbb3eaf989bed1c6638d10772cf0733b828220e87ba51d390b

  • SHA512

    fe932b7e6145f179a6596fe6fe48791c30294e7275ce63f499db7a8b4cea00be17ec6f2b42537edc80147a3edc6340a2edffe358666d87299dff0068f1bc38ae

  • SSDEEP

    12288:H7+e9rLQpfaUkAL1g4vJJxpsAu9hdZz/7re/fdo9WMhdfz0fYsKEbvCKlG:H7BrLFUkU1g4hJzQZz/ef7+zyKKs

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3344
      • C:\Users\Admin\AppData\Local\Temp\e59abe31b0d086dbb3eaf989bed1c6638d10772cf0733b828220e87ba51d390b.exe
        "C:\Users\Admin\AppData\Local\Temp\e59abe31b0d086dbb3eaf989bed1c6638d10772cf0733b828220e87ba51d390b.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:4472
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a4323.bat
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:4748
          • C:\Users\Admin\AppData\Local\Temp\e59abe31b0d086dbb3eaf989bed1c6638d10772cf0733b828220e87ba51d390b.exe
            "C:\Users\Admin\AppData\Local\Temp\e59abe31b0d086dbb3eaf989bed1c6638d10772cf0733b828220e87ba51d390b.exe"
            4⤵
            • Executes dropped EXE
            PID:2920
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:3028
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:3688
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:2036

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        251KB

        MD5

        10fccb391b46e22576a736c690ae86fd

        SHA1

        21afa059afff34817aa54c752331a5794c3cbccb

        SHA256

        ba1f1a20b68217c37fa865680f639db00a8af1a690b3cf9f385bdc69248919fa

        SHA512

        aaa174c985d7f0681b43e5747a9e9cef3519a3f63fcbcf519b0a0a14641baa7da9909fb9ff1a4f6d085b66f94c6af906a446f5bf27dbdaed939afbda000a5033

      • C:\Program Files\7-Zip\7z.exe

        Filesize

        570KB

        MD5

        ae79a8b0d9c05d49d1fef88dcb3dbd11

        SHA1

        0acf2d5cc86fda27577fb4d07b4b71887cc4848f

        SHA256

        2fd7dc5cea6d8707493f1a4aa7a00383a38100b1ae0b3ea24be1e7397d04c58a

        SHA512

        e1cc9ac1a8f78775b02fe69e205f85152f9a08bf1a8c34f139cfcf482b636b7a37e89d2b87bd82dbda0ac22581aa5f587890e829bfb5241873e442e57189eee7

      • C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe

        Filesize

        636KB

        MD5

        f638389e14512cee81c8946bc5d61887

        SHA1

        37ff6089fd3ce85bc01c57ea7035891ea503bfc1

        SHA256

        dc42d85ea65a264d578a0b8c3b6050e3e89600a350861b548bcecce1573fa674

        SHA512

        ead93646db61d647324aad152972b4ea3a440f57225a4e225327688b962f26e3eb0d18680457c8f14d9d5f0633b050700e9295863b14d21ffbd6086a0cdaa842

      • C:\Users\Admin\AppData\Local\Temp\$$a4323.bat

        Filesize

        722B

        MD5

        e972dec78660dd1a89a59e283a7279f9

        SHA1

        e13930be3d6efb8b30d953cd8bcc8478ad5fdd03

        SHA256

        11c76f0d7bdd61214aa02142c592490025759c144958793c16433c558981a2a7

        SHA512

        fbb56853e65437c7272c3ec286435941196e688a295d2bdec6a211bf9a3c9b22b50e82a233dddba16b205376a7a594ed29583a9fda155419bf5e5e3e0e31bc40

      • C:\Users\Admin\AppData\Local\Temp\e59abe31b0d086dbb3eaf989bed1c6638d10772cf0733b828220e87ba51d390b.exe.exe

        Filesize

        771KB

        MD5

        76ac599d68401f86b375936f136aa6b1

        SHA1

        ed9067aae50d0fec8af1c592d8e08bcb12039158

        SHA256

        3c40c2a1f8448c707e3b233c302fc25fda91bd02bfac86d7869135b72e5c24f3

        SHA512

        207eb613d6e5a3f42ad14d352ddde6ff3443935ecfeb9c2263f60ce62790b5f91be24e5fa8836458b52a664a270ab5b6cc88a54e0539b4cf2fed235b1480c9cb

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        7f27bae91113fe90205a6cf904da4a36

        SHA1

        f85b2bf9462a6695a9cbe98b22dd8df4d769957e

        SHA256

        a3cd685b3424c7db3cb51422aeba14ea98991e59b914e883746767e7a3f46221

        SHA512

        3d45a313fe9de1167e3755c46dfe6d2c9eacd55868e5790375550fafe84a35efc6ee3fe9d79d6a3f7c912965aaf2f0eb4a24b69006c8dff91358870d765c2fd5

      • F:\$RECYCLE.BIN\S-1-5-21-4018855536-2201274732-320770143-1000\_desktop.ini

        Filesize

        9B

        MD5

        4d28283e4d415600ffc2f8fda6d8c91e

        SHA1

        053dcb8d5d84b75459bc82d8740ee4684d680016

        SHA256

        b855effeaf01610130d3f38de35bc7f98bfc6643d98d4198af18534f048e8df7

        SHA512

        73a758cd5e5ac48d62dd89719be604214895e0cc9a10ff7464a6cf9161a37fd27d15dd2d2565f18198b381ac6442bcb36f38614df7b1176061a83616517a7edb

      • memory/2920-19-0x0000000000790000-0x0000000000791000-memory.dmp

        Filesize

        4KB

      • memory/2920-21-0x0000000000400000-0x00000000004CA000-memory.dmp

        Filesize

        808KB

      • memory/3028-29-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3028-35-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3028-39-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3028-22-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3028-344-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3028-1234-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3028-4799-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3028-11-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3028-5238-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4472-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4472-10-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB