Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    09/06/2024, 21:29

General

  • Target

    50c5972d36219683012d6eefed7eb0eab768ae360126c306cb0c6f06a1c6c428.exe

  • Size

    27KB

  • MD5

    cbdbc7d60b720cfc813f161630d878c4

  • SHA1

    b75692807260dddf761598401dfa77cdbe4e624f

  • SHA256

    50c5972d36219683012d6eefed7eb0eab768ae360126c306cb0c6f06a1c6c428

  • SHA512

    50198a6082003d28536e5b2d6c492150a53bcc2d1e05cfeb0a62f23e4ff6673639c4404d5a53f962e68d1a430f62fac1c49623372fcd662494e1c6903ebb2ca1

  • SSDEEP

    384:M1V1Gt5M0zhIV/DZ3KZp7JcTO4yf9KFL/KaUUqd3qR+FlYTj9QTN0wpD9p5Cs1:e16GVRu1yK9fMFLKaTxsujCT7pZpYW

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1204
      • C:\Users\Admin\AppData\Local\Temp\50c5972d36219683012d6eefed7eb0eab768ae360126c306cb0c6f06a1c6c428.exe
        "C:\Users\Admin\AppData\Local\Temp\50c5972d36219683012d6eefed7eb0eab768ae360126c306cb0c6f06a1c6c428.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:2220
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\$$a1E2B.bat
          3⤵
          • Deletes itself
          PID:2216
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:820
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2996
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:2724

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        252KB

        MD5

        748a0e32e05f79b6b28a1449ca994e9c

        SHA1

        ccbadff261eb0b43b1a37475cfe2cc0a6aa4cd44

        SHA256

        bac44cff3f0d81881f3f6c0c52010780db38ac8624137675eaac3ca754f751d8

        SHA512

        ec6cff2f98bf41b975cca26825a3243352e79d55963bc52f0bc6ffc7080ff153582db8e4ba9a77415f6288a699e9069a8d41247629602e5d2307095e6a80fcec

      • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

        Filesize

        472KB

        MD5

        88eb1bca8c399bc3f46e99cdde2f047e

        SHA1

        55fafbceb011e1af2edced978686a90971bd95f2

        SHA256

        42fd78c05bc240d4ded16ac974f17c336f6ae3a1814d548021c48a942cc30428

        SHA512

        149d4de0c024e25a13a7bb17471e6f48391d4f26b1c8388672320eed1c255f84219ad7b72bbebc531ae558d5192dd4bb6d0dddd6c65a45300c8e8348a4fb3728

      • C:\Users\Admin\AppData\Local\Temp\$$a1E2B.bat

        Filesize

        722B

        MD5

        6adcb625287e9e777833baf121a9061c

        SHA1

        90b594308342f26701374ca526d323e752f979e6

        SHA256

        3ccd237d5cab81c0d023aa6ed5fe943bef2439bec8233fa0c13c7bd5ee700122

        SHA512

        a97706d8c1bd2cd2da492fb0fce3bb5176255f021472e8cba8fc9137ccdb07b678a1d1317ead62241103d39ce84fcfbfc789b6b06b73da487bd12a042c8eddf5

      • C:\Users\Admin\AppData\Local\Temp\50c5972d36219683012d6eefed7eb0eab768ae360126c306cb0c6f06a1c6c428.exe.exe

        Filesize

        162B

        MD5

        380bbf4d7bdac05d2248b49c4188cd92

        SHA1

        ae83ef83ebe684eab30ab3ca431e4f84994fd60f

        SHA256

        b97278e320af9d3d990703fd1af322e7c4b568a92f6a736149c1648b2f07a7c2

        SHA512

        06fe7a78b558b7581b52f8d65a6a8a62338a429e550c91ad4ba5cc3f445da83ee86b99e5c7dfbd9bbfcc12895215d2a329756dc6b24ef8313f70658abc08db15

      • C:\Windows\Logo1_.exe

        Filesize

        27KB

        MD5

        a5ed9bcfc5b8743127cf35ee9d08642b

        SHA1

        1cc3de2dbebc3f89c115210f9cc968695e30f632

        SHA256

        7e5bc389d539856aeb50fcc7096108571807546a82e1967c29458552c2b86e1c

        SHA512

        2d4aba05b35dfc00ae7cd9a64adb3b6990d4d5e0b8e6c7b9843585427236340ecbf5102209fd91bf34fc6c7c68eab5b9679dde923661d73eaeecdc4cd334c54a

      • F:\$RECYCLE.BIN\S-1-5-21-268080393-3149932598-1824759070-1000\_desktop.ini

        Filesize

        8B

        MD5

        9bf5ad0e8bbf0ba1630c244358e5c6dd

        SHA1

        25918532222a7063195beeb76980b6ec9e59e19a

        SHA256

        551cc5b618f0fa78108dd2388d9136893adb10499e4836e9728f4e96530bf02f

        SHA512

        7fdce76bb191d4988d92e3d97ce8db4cae1b5c1f93198bffc4e863d324d814246353200d32ea730f83345fcb7ad82213c2bcd31351e905e473d9596bc7b43ad3

      • memory/820-1872-0x0000000000400000-0x0000000000435000-memory.dmp

        Filesize

        212KB

      • memory/820-95-0x0000000000400000-0x0000000000435000-memory.dmp

        Filesize

        212KB

      • memory/820-30-0x0000000000400000-0x0000000000435000-memory.dmp

        Filesize

        212KB

      • memory/820-3332-0x0000000000400000-0x0000000000435000-memory.dmp

        Filesize

        212KB

      • memory/820-37-0x0000000000400000-0x0000000000435000-memory.dmp

        Filesize

        212KB

      • memory/820-43-0x0000000000400000-0x0000000000435000-memory.dmp

        Filesize

        212KB

      • memory/820-89-0x0000000000400000-0x0000000000435000-memory.dmp

        Filesize

        212KB

      • memory/820-19-0x0000000000400000-0x0000000000435000-memory.dmp

        Filesize

        212KB

      • memory/820-536-0x0000000000400000-0x0000000000435000-memory.dmp

        Filesize

        212KB

      • memory/820-2097-0x0000000000400000-0x0000000000435000-memory.dmp

        Filesize

        212KB

      • memory/1204-28-0x0000000002E00000-0x0000000002E01000-memory.dmp

        Filesize

        4KB

      • memory/2220-0-0x0000000000400000-0x0000000000435000-memory.dmp

        Filesize

        212KB

      • memory/2220-17-0x0000000000400000-0x0000000000435000-memory.dmp

        Filesize

        212KB

      • memory/2220-12-0x0000000000440000-0x0000000000475000-memory.dmp

        Filesize

        212KB