Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    105s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/05/2024, 07:19

General

  • Target

    0194672de875d36b6d9f8bc56823a0163623f0335b94d0c4b0813f0d69fd7305.exe

  • Size

    5.7MB

  • MD5

    569b6ba8be8e12e4e5f76b729704fbf3

  • SHA1

    06bd76ec19c7721d815ac0e56009f67cabf0080d

  • SHA256

    0194672de875d36b6d9f8bc56823a0163623f0335b94d0c4b0813f0d69fd7305

  • SHA512

    dfa251687d19b02faadb634516927376cf17f9c79c23c6933d29085e69e6be2d3988a912d50d132d3a0449759b807de0c389a029dc26b8bfd013eda27235b174

  • SSDEEP

    49152:7KPv94AEsKU8ggw1g+1CART5eBiyKS3EI3wybn20DCYIHvc8ixuZm9+fWsw6dTPn:7sKUgTH2M2m9UMpu1QfLczqssnKSk

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 2 IoCs
  • Drops startup file 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3420
      • C:\Users\Admin\AppData\Local\Temp\0194672de875d36b6d9f8bc56823a0163623f0335b94d0c4b0813f0d69fd7305.exe
        "C:\Users\Admin\AppData\Local\Temp\0194672de875d36b6d9f8bc56823a0163623f0335b94d0c4b0813f0d69fd7305.exe"
        2⤵
        • Drops file in Drivers directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:8
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:4124
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            4⤵
              PID:2920
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a374C.bat
            3⤵
              PID:3008
              • C:\Users\Admin\AppData\Local\Temp\0194672de875d36b6d9f8bc56823a0163623f0335b94d0c4b0813f0d69fd7305.exe
                "C:\Users\Admin\AppData\Local\Temp\0194672de875d36b6d9f8bc56823a0163623f0335b94d0c4b0813f0d69fd7305.exe"
                4⤵
                • Executes dropped EXE
                PID:4828
            • C:\Windows\Logo1_.exe
              C:\Windows\Logo1_.exe
              3⤵
              • Drops file in Drivers directory
              • Drops startup file
              • Executes dropped EXE
              • Enumerates connected drives
              • Drops file in Program Files directory
              • Drops file in Windows directory
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:5056
              • C:\Windows\SysWOW64\net.exe
                net stop "Kingsoft AntiVirus Service"
                4⤵
                • Suspicious use of WriteProcessMemory
                PID:740
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                  5⤵
                    PID:908
                • C:\Windows\SysWOW64\net.exe
                  net stop "Kingsoft AntiVirus Service"
                  4⤵
                  • Suspicious use of WriteProcessMemory
                  PID:2900
                  • C:\Windows\SysWOW64\net1.exe
                    C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                    5⤵
                      PID:116

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

              Filesize

              258KB

              MD5

              3048e9960b26e794efcfd7c8dc837662

              SHA1

              258fa57ecf54672ab08e11114ad150ac14b1df68

              SHA256

              94c6fea3fa36d73ee929a20d4c0f650a5df5e1cf3dafb150382225e72aaf349f

              SHA512

              edc0b09e1163bf01bb59a4b09a69d82fd515410ffa4a192b05491f84eff0c9fa92dc19a548fefc995ec5170f12d6768195c438ad59961b312aab4b2c5cd8a95a

            • C:\Program Files\7-Zip\7z.exe

              Filesize

              577KB

              MD5

              338d6170dde10ae0de9efa87abfa3796

              SHA1

              cfc58e79ac542e26e5928f6f01f02317c3e09b86

              SHA256

              142a19ef6eb222295456403347456943415a2e9c42fb3cf823531aaf283204f1

              SHA512

              8b5ca88a707d2ff4edf53e41ff6979a1d91d6150c9fa0b07214d3b71d9b2efb7a6bd3a4d226ed20ab029eca2cb6b641947ea44299d2741c5cba605f8b08c2612

            • C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe

              Filesize

              644KB

              MD5

              3908c6f85096d094870328fabaebbe66

              SHA1

              9106bf68a43f77be7cb02afe73fe299b60961153

              SHA256

              864b33d1d5b355ef42f7911c58ec7b33a902815bfbd69d73e7f304ce49ae7ef7

              SHA512

              8ace41dd303c4a5a8caad76e99d3445f7a8e992bd0d74a5ab3e6afd5c5f2d2b52fbf8160d37dd412d9db4d8db018c62b0576975275dd0367dd19397c8b3463b1

            • C:\Users\Admin\AppData\Local\Temp\$$a374C.bat

              Filesize

              722B

              MD5

              6d3f3fbebe1d2dca288cecd862ce23df

              SHA1

              2857dc02b74ff9f41ccc5be38582b3c73d1b1b96

              SHA256

              de690a5798651bdfb7f9ba01499f419f8f859a6792e822d9d83dc4c0f910ea86

              SHA512

              d89e1a02d3827ce8163b1f9113726a84d66b72381be894dfede82d024cf5ada72977dfcef3687e32a30f029e7e7bf5790e5c83eeb86f4414c19f62cbfa2f61c3

            • C:\Users\Admin\AppData\Local\Temp\0194672de875d36b6d9f8bc56823a0163623f0335b94d0c4b0813f0d69fd7305.exe.exe

              Filesize

              5.7MB

              MD5

              ba18e99b3e17adb5b029eaebc457dd89

              SHA1

              ec0458f3c00d35b323f08d4e1cc2e72899429c38

              SHA256

              f5ee36de8edf9be2ac2752b219cfdcb7ca1677071b8e116cb876306e9f1b6628

              SHA512

              1f41929e6f5b555b60c411c7810cbf14e3af26100df5ac4533ec3739a278c1b925687284660efb4868e3741305098e2737836229efc9fe46c97a6057c10e677c

            • C:\Windows\Logo1_.exe

              Filesize

              33KB

              MD5

              2a9224a2c7ff6663b5816467b80de064

              SHA1

              b39f76a521d3b30052ea3533b2b27b61dfbe03d1

              SHA256

              98f83bf4cbd3fca43aa6128dc963be1b76c6224f971eacee1ba9af2d547f70e7

              SHA512

              dee725ddfdcc0ce80c55ca1dc839ef71d98faa73fab3a5f45063fa328eb558724983cab281f0f3e6e1bdd640d957e8d69a6c5ffec7c8c6f16dd695bcd90ac3ba

            • C:\Windows\system32\drivers\etc\hosts

              Filesize

              842B

              MD5

              6f4adf207ef402d9ef40c6aa52ffd245

              SHA1

              4b05b495619c643f02e278dede8f5b1392555a57

              SHA256

              d9704dab05e988be3e5e7b7c020bb9814906d11bb9c31ad80d4ed1316f6bc94e

              SHA512

              a6306bd200a26ea78192ae5b00cc49cfab3fba025fe7233709a4e62db0f9ed60030dce22b34afe57aad86a098c9a8c44e080cedc43227cb87ef4690baec35b47

            • F:\$RECYCLE.BIN\S-1-5-21-711569230-3659488422-571408806-1000\_desktop.ini

              Filesize

              9B

              MD5

              db64fea40b8b0f0d620ef2ecc6eadbca

              SHA1

              51736590bfbfbac961899ddcc9be998bfeabd3d5

              SHA256

              946d3f6b9ecc2fa53895526caf79e41850ad594f22a240d93f8bb7eb286d70f8

              SHA512

              b70e24f5930090ac0c9a584f3810d41af8de5562c6b78f6979ea97c929edc18d57bedb9af335d19307aa0db00004aa5a4e553f24ac884365d8bd899d6f3258c0

            • memory/8-0-0x0000000000400000-0x000000000043E000-memory.dmp

              Filesize

              248KB

            • memory/8-11-0x0000000000400000-0x000000000043E000-memory.dmp

              Filesize

              248KB

            • memory/5056-20-0x0000000000400000-0x000000000043E000-memory.dmp

              Filesize

              248KB

            • memory/5056-3470-0x0000000000400000-0x000000000043E000-memory.dmp

              Filesize

              248KB

            • memory/5056-12-0x0000000000400000-0x000000000043E000-memory.dmp

              Filesize

              248KB

            • memory/5056-8662-0x0000000000400000-0x000000000043E000-memory.dmp

              Filesize

              248KB