Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    11/06/2024, 10:38

General

  • Target

    ac912296175fb6c348fbeff7431934aa203f9e26ed0ce173f99936e7ec52eaa9.exe

  • Size

    713KB

  • MD5

    0a03306a319e23ac41497c15246f39bd

  • SHA1

    1b9e969bf0ef9b0ccfceddc55e586054c6c0ca1c

  • SHA256

    ac912296175fb6c348fbeff7431934aa203f9e26ed0ce173f99936e7ec52eaa9

  • SHA512

    f1ba471873b4c00679b070b0306ead80f532d79a2777de8b47df8173c68a9a762e7d11c2204c5f595a1784cf4b39ef6024fafa243930f5fefcb12729175a8172

  • SSDEEP

    12288:2fC6Aj+TN5uixZN+8rKhUdTC/wE1ZD0Ca5ZIXV:KLOS2opPIXV

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Executes dropped EXE
    PID:1276
    • C:\Users\Admin\AppData\Local\Temp\ac912296175fb6c348fbeff7431934aa203f9e26ed0ce173f99936e7ec52eaa9.exe
      "C:\Users\Admin\AppData\Local\Temp\ac912296175fb6c348fbeff7431934aa203f9e26ed0ce173f99936e7ec52eaa9.exe"
      2⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:1372
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c C:\Users\Admin\AppData\Local\Temp\$$a464.bat
        3⤵
        • Deletes itself
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:3012
        • C:\Users\Admin\AppData\Local\Temp\ac912296175fb6c348fbeff7431934aa203f9e26ed0ce173f99936e7ec52eaa9.exe
          "C:\Users\Admin\AppData\Local\Temp\ac912296175fb6c348fbeff7431934aa203f9e26ed0ce173f99936e7ec52eaa9.exe"
          4⤵
          • Executes dropped EXE
          PID:2596
      • C:\Windows\Logo1_.exe
        C:\Windows\Logo1_.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:3060
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2324
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            5⤵
              PID:2600

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

      Filesize

      254KB

      MD5

      e07b271414d7901d4be3fef46b6234ad

      SHA1

      383c79a26054fb1d00f931222e5f7fd7cdc2987b

      SHA256

      84bb3d64de9f9a1c3b1c2359204a1986fdbe17ef226274213bb17fbf0ca2198c

      SHA512

      d989a243a0c6e0f1fa1e562f49be1263fd2d7962f289d4a0108f046ef6f2cd87b262a4b2fbd4a94be3f9e39ac656b402f8d8aa40600db3ee02b24cf0d78e08e3

    • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

      Filesize

      474KB

      MD5

      6eabc463f8025a7e6e65f38cba22f126

      SHA1

      3e430ee5ec01c5509ed750b88d3473e7990dfe95

      SHA256

      cc8da3ecd355b519d81415d279ed037c725ba221bf323d250aa92ee2b2b88ca7

      SHA512

      c8fde7026ac8633403bbefee4b044457184388fb7343d8c46f5f7f272724227976bf485ea91da49e2a85dd0cfb73f260ac705d8007333dd3e5539fe5ed67e3ab

    • C:\Users\Admin\AppData\Local\Temp\$$a464.bat

      Filesize

      721B

      MD5

      fc102f86234e2cbf4c635d1073617a53

      SHA1

      553d34f03ab147964bd2dce22931edc00a07759d

      SHA256

      b564dbee2c0341803a99a1504cdbbfbfb6ac403ccdab10945864dfad53a57c9c

      SHA512

      ffe5688db51a9ddb4dd7b50e5ecea128af9eae0be5f49b29575a08bd767ce82fb1a93b6812f963c9efe3e62be5c501e982febda012ab777d063ab919513fb4f2

    • C:\Users\Admin\AppData\Local\Temp\ac912296175fb6c348fbeff7431934aa203f9e26ed0ce173f99936e7ec52eaa9.exe.exe

      Filesize

      684KB

      MD5

      50f289df0c19484e970849aac4e6f977

      SHA1

      3dc77c8830836ab844975eb002149b66da2e10be

      SHA256

      b9b179b305c5268ad428b6ae59de10b4fe99cf0199bbc89b7017181905e97305

      SHA512

      877d852ea1062b90e2fd2f3c4dc7d05d9697e9a9b2929c830a770b62741f6a11e06de73275eb871113f11143faf1cb40d99f7c247862ffb778d26833ed5d7e38

    • C:\Windows\Logo1_.exe

      Filesize

      29KB

      MD5

      9c93f08705742f729989246ec26c3dfa

      SHA1

      0b2a8d41f9b2e452aeae1f720f31814d667462ec

      SHA256

      f27ccbe73d56d0126cac6349b6ae5143af964c093c94570890cd38a01f200679

      SHA512

      f5dcb1ba3ea6191dd910fe0f781992d9344b42e2ea8034ab5775489a43971c613c995869f649d5de35656ec4b8e397de51e9e9eb0070ab8705ff14b46877ee2e

    • F:\$RECYCLE.BIN\S-1-5-21-3627615824-4061627003-3019543961-1000\_desktop.ini

      Filesize

      9B

      MD5

      3b22ce0fee2d1aaf2c66dcd142740e29

      SHA1

      94d542b4bb9854a9419753c38e6ffe747653d91c

      SHA256

      8284772f28954a109c16f1583e6e34e29f06673b34e04f268bda961b57ba9f79

      SHA512

      efd4900a49624170e51ea401f0845634f49484a49335845258dc3d41a12e2022bf413a6751fcbcfd1ec68cde506f3363beae57f20e8eaca8b214d28baa138c5b

    • memory/1276-32-0x0000000002610000-0x0000000002611000-memory.dmp

      Filesize

      4KB

    • memory/1372-0-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/1372-17-0x0000000000220000-0x0000000000256000-memory.dmp

      Filesize

      216KB

    • memory/1372-16-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/3060-43-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/3060-49-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/3060-95-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/3060-101-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/3060-546-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/3060-1854-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/3060-2029-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/3060-36-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/3060-3314-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/3060-19-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB