Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    30/05/2024, 04:47

General

  • Target

    ee703982a8258bd7f378317b2e22f22911e656d0cb520604c7aa5bae476d511a.exe

  • Size

    179KB

  • MD5

    81325cd4b583dd573500319142c6ec53

  • SHA1

    2ca3d9cac674694e1366916117f9238b3576b4bb

  • SHA256

    ee703982a8258bd7f378317b2e22f22911e656d0cb520604c7aa5bae476d511a

  • SHA512

    c879f57aba2904a4a12037ef7939cc2a9c1ba3217179f6bdb505540fe2511b69b36638c2ac59b19233e952aa73e5472a200bc75873712a339a4a5888fabadb2a

  • SSDEEP

    3072:xAyLd0K/JdOydO/COH//kxBsg87jT14yBHlMCTok+sul:XLZ/JdnOTHkxOg87GyBH9j+5l

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ee703982a8258bd7f378317b2e22f22911e656d0cb520604c7aa5bae476d511a.exe
    "C:\Users\Admin\AppData\Local\Temp\ee703982a8258bd7f378317b2e22f22911e656d0cb520604c7aa5bae476d511a.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1808
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Users\Admin\AppData\Local\Temp\$$a15D2.bat
      2⤵
      • Deletes itself
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1856
      • C:\Users\Admin\AppData\Local\Temp\ee703982a8258bd7f378317b2e22f22911e656d0cb520604c7aa5bae476d511a.exe
        "C:\Users\Admin\AppData\Local\Temp\ee703982a8258bd7f378317b2e22f22911e656d0cb520604c7aa5bae476d511a.exe"
        3⤵
        • Executes dropped EXE
        PID:2676
    • C:\Windows\Logo1_.exe
      C:\Windows\Logo1_.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2272
      • C:\Windows\SysWOW64\net.exe
        net stop "Kingsoft AntiVirus Service"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2564
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
          4⤵
            PID:2588

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\$$a15D2.bat

      Filesize

      722B

      MD5

      03b5e508f8e3cce174e52b9a66e78625

      SHA1

      6c25f6b95f265bbca4de4d1fa0fea4dd8fd1ffa4

      SHA256

      0ba3ce75520b7c0cdf253e4eb47955b080397432235f36fc1c42c1eeaa381109

      SHA512

      73e9e468067ecbf433ace7c86c8f77ba30f80cb09853a2245f21094960bb6a6a8c58593f650b3640c30abb378848356901e02603dece1b9191ebcc6144dcf4e3

    • C:\Users\Admin\AppData\Local\Temp\ee703982a8258bd7f378317b2e22f22911e656d0cb520604c7aa5bae476d511a.exe.exe

      Filesize

      113KB

      MD5

      b777409e43897fbad31319874035055f

      SHA1

      fd279403092e23136b5c1afa1940d3c24816afd9

      SHA256

      cc1d59f183410a925944c92bb7e67c5f6985c158b0e9039172751ecd27874446

      SHA512

      5e7baf63f18024a7e040d50cfd35c26eaae38fb6472c5575c088c7f4121952422960622e5884f88c643c715322dbbbbde046aeabe0bb0d9774416aeec1fc5ae3

    • C:\Windows\Logo1_.exe

      Filesize

      66KB

      MD5

      bac152d659a8e5c8b297ee885a362ab7

      SHA1

      e35922075011a55e96a69695645985ed2e4d7336

      SHA256

      db778391e2816d919f43276cff95d64e544e28e8f4262a8722e9e904038af413

      SHA512

      ec5a747cd6602130886b0c04638eac550a8dc287368ff3fba6b526bd83f4f678b8ebc3d6482a0282aba720af556df91ae986cccef36c5b77465c4f0003c9a150

    • memory/1808-14-0x0000000000400000-0x0000000000424000-memory.dmp

      Filesize

      144KB

    • memory/2272-21-0x0000000000400000-0x0000000000424000-memory.dmp

      Filesize

      144KB

    • memory/2272-22-0x0000000000400000-0x0000000000424000-memory.dmp

      Filesize

      144KB

    • memory/2272-24-0x0000000000400000-0x0000000000424000-memory.dmp

      Filesize

      144KB

    • memory/2272-30-0x0000000000400000-0x0000000000424000-memory.dmp

      Filesize

      144KB

    • memory/2272-32-0x0000000000400000-0x0000000000424000-memory.dmp

      Filesize

      144KB

    • memory/2272-138-0x0000000000400000-0x0000000000424000-memory.dmp

      Filesize

      144KB

    • memory/2272-164-0x0000000000400000-0x0000000000424000-memory.dmp

      Filesize

      144KB

    • memory/2272-239-0x0000000000400000-0x0000000000424000-memory.dmp

      Filesize

      144KB