Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    10/06/2024, 06:40

General

  • Target

    845dc68ff96b0274c2bc3297d4aa7f93a9b528db816882d6ae255f9cd05b8b78.exe

  • Size

    1.1MB

  • MD5

    9902df4359a173fb2d380c39a2eece7f

  • SHA1

    af77c090421a15e5015765127f53f16d575e48fe

  • SHA256

    845dc68ff96b0274c2bc3297d4aa7f93a9b528db816882d6ae255f9cd05b8b78

  • SHA512

    b7d345a682bab87d2bfcda5fe8f48db3aefd213cd34c08298a9a647f3664a202f642d10ce27bc206e000d349424fea5d280111f614f76b864361d44ceb572a8a

  • SSDEEP

    24576:G73brCwSmrVCPxMXhhoHSttm+FmRHFPwgxyYz7bZzr79:G7cxMroHWFgxyYz7Bh

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1092
      • C:\Users\Admin\AppData\Local\Temp\845dc68ff96b0274c2bc3297d4aa7f93a9b528db816882d6ae255f9cd05b8b78.exe
        "C:\Users\Admin\AppData\Local\Temp\845dc68ff96b0274c2bc3297d4aa7f93a9b528db816882d6ae255f9cd05b8b78.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:2824
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\$$a1268.bat
          3⤵
          • Deletes itself
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:1384
          • C:\Users\Admin\AppData\Local\Temp\845dc68ff96b0274c2bc3297d4aa7f93a9b528db816882d6ae255f9cd05b8b78.exe
            "C:\Users\Admin\AppData\Local\Temp\845dc68ff96b0274c2bc3297d4aa7f93a9b528db816882d6ae255f9cd05b8b78.exe"
            4⤵
            • Executes dropped EXE
            PID:2856
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1504
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2676
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:2604

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        251KB

        MD5

        a4ba015a708f68eb1aa8cdcaa692f088

        SHA1

        71a846a78fcb6bafc5ccbe372484e0ef81bc39fa

        SHA256

        fcdc3c1af76e1bbb58c5c1112fda5c82aa1aca8acdfc8e5377424dcb34ae4d53

        SHA512

        fdda3c5ae6474100bc0dd0dbc8b9af8874f18feb03f7fdfb8ff7f8d484de579e2ea5336c36b8c7ae8b959df00529b36e0c396984f29de07b442f7e311c9f5931

      • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

        Filesize

        471KB

        MD5

        28f6479e5c0b7a32e8ae773b9221a22a

        SHA1

        882e24734f4d42c4e0b95bb695c921ee66ae2042

        SHA256

        5ec41e0b29c00dd288859df2f583b0e771c11c01d8fd519fe2bd8921b3bed4f3

        SHA512

        d27c5c01bfe526652af0083bc17c4a3212fc00d594344b6a1a39999248623fba1ae14c79ec849c3567d1bf952cdf7e1e4fd5b22fde938227d89338529fb43685

      • C:\Users\Admin\AppData\Local\Temp\$$a1268.bat

        Filesize

        722B

        MD5

        1d39f2ec5f0e3082630516e2f4138eca

        SHA1

        def615a65bf2a088fadb9b13a69f4a81c36cf057

        SHA256

        b41fa5ca4e68d1157bd39a00ff1e29ef9a7f53fecd76a1524202c52a83c26804

        SHA512

        19843bbe30f02856d804c4e88be8a8330c305f7045b7100b097262cb0a5d43b9fa5b2f1291c50c53f1fb472a3004fdf3acfc11e96a2f2fc96cd3eaff8557ea57

      • C:\Users\Admin\AppData\Local\Temp\845dc68ff96b0274c2bc3297d4aa7f93a9b528db816882d6ae255f9cd05b8b78.exe.exe

        Filesize

        1.1MB

        MD5

        5da79eeea8fffd12b2b77db479eee6e1

        SHA1

        070dd08a345deb068adf817193e22973f0a37fd7

        SHA256

        d34c171aefa01500a3b2a59b05fdd622ec87888fd8b197ee6d0e815b98443f3f

        SHA512

        b743b0601eb5ccdcfa3a89e01f9e879b02a697a50eb2eb3844e07cfee613fda75a136486e2063612fdf2a338f8720ea07a689462f3da7eb9f48b0ab0f70558ce

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        571380a64267656a16012c245c5bb39c

        SHA1

        4844d47d75a4d1a4fe2416687bbd56eddfc503f8

        SHA256

        0a318cb72048dd748f91e258575dca665b94bc314cf3599745caa374c1967f23

        SHA512

        d9b18cb5a0956c6445f3028748fc9868cfdb9c5696f19fed065367cec40ecfd39a0278538144c5c149ff2687055ba2c886326fa387e04240af55aae0cb396a10

      • F:\$RECYCLE.BIN\S-1-5-21-2248906074-2862704502-246302768-1000\_desktop.ini

        Filesize

        9B

        MD5

        60b1ffe4d5892b7ae054738eec1fd425

        SHA1

        80d4e944617f4132b1c6917345b158f3693f35c8

        SHA256

        5e9944cc48c7ec641cf7b1b0125f47f26102c371a973612f0583f604bc3900d4

        SHA512

        7f5c200924dbb5531df997e6a35cb94f36b54f5651284b0d6404f0576301125ef72b410a170fca889d46c033063663cfc7791f9e4c3c30695af069053eee66cc

      • memory/1092-30-0x0000000002E20000-0x0000000002E21000-memory.dmp

        Filesize

        4KB

      • memory/1504-32-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1504-97-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1504-3310-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1504-2071-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1504-39-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1504-45-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1504-91-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1504-19-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1504-524-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1504-1850-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2824-17-0x00000000020D0000-0x0000000002104000-memory.dmp

        Filesize

        208KB

      • memory/2824-16-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2824-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2824-12-0x00000000020D0000-0x0000000002104000-memory.dmp

        Filesize

        208KB