Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/06/2024, 22:48

General

  • Target

    f137fca8e6bc39ce6245dd4dbc0fa4d0c009112e97745e4b8ca566306151081c.exe

  • Size

    573KB

  • MD5

    aaee7926f1d4dedfae7ccaea011220ed

  • SHA1

    6962a9c655a8825f1758266a3ef73ac91dec0ed0

  • SHA256

    f137fca8e6bc39ce6245dd4dbc0fa4d0c009112e97745e4b8ca566306151081c

  • SHA512

    66628592bd6d2df624c0922d1c61b996a113d5e19d626b7c0b7270cdf72e3b419969dbb3c8409b8f11e7a71aad6d193c82a75a390af721948958adfb9d99974b

  • SSDEEP

    6144:4uJpE7cV3iwbAFRWAbd4nf0H05yqE6Hl0ChW0+ksllAXBu0lWGWUJJQ4t0BHQQfu:s7a3iwbihym2g7XO3LWUQfh4Co

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3452
      • C:\Users\Admin\AppData\Local\Temp\f137fca8e6bc39ce6245dd4dbc0fa4d0c009112e97745e4b8ca566306151081c.exe
        "C:\Users\Admin\AppData\Local\Temp\f137fca8e6bc39ce6245dd4dbc0fa4d0c009112e97745e4b8ca566306151081c.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:1020
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a32C8.bat
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1536
          • C:\Users\Admin\AppData\Local\Temp\f137fca8e6bc39ce6245dd4dbc0fa4d0c009112e97745e4b8ca566306151081c.exe
            "C:\Users\Admin\AppData\Local\Temp\f137fca8e6bc39ce6245dd4dbc0fa4d0c009112e97745e4b8ca566306151081c.exe"
            4⤵
            • Executes dropped EXE
            PID:4616
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:636
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:1568
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:4880

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        254KB

        MD5

        eaafac1d54759eb89af2aeaddcaf0828

        SHA1

        78f325b16ce3e651e1c7eb7c871f72a4bfd620cb

        SHA256

        b781177dade8538ec18a7988488fc8932e049d95823910c9615e22550ef00882

        SHA512

        82d9128cd9bf34f636dd76ac5fb0d02d2d5b50be03914c2d42db107cf51d3318effe50013ead12be81190abae9336ce813b07bf800c3bd82b0967cfde6acde64

      • C:\Program Files\7-Zip\7z.exe

        Filesize

        573KB

        MD5

        aaee7926f1d4dedfae7ccaea011220ed

        SHA1

        6962a9c655a8825f1758266a3ef73ac91dec0ed0

        SHA256

        f137fca8e6bc39ce6245dd4dbc0fa4d0c009112e97745e4b8ca566306151081c

        SHA512

        66628592bd6d2df624c0922d1c61b996a113d5e19d626b7c0b7270cdf72e3b419969dbb3c8409b8f11e7a71aad6d193c82a75a390af721948958adfb9d99974b

      • C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe

        Filesize

        639KB

        MD5

        ad5a7e5eb1a1cdd791957e07c93748ae

        SHA1

        6e4f8c5f4d791327e11d0d68ca6f514554af8481

        SHA256

        cfee92d916fbbb95d8282c3264d3708ad1ddfdd9db4daaf00e0c96a22854c4dc

        SHA512

        a8acd191aec48dac8d5808a93ee973ea52793140e318b4d870fb10e4e8ba0756fe95654134dd1c175168375a0f7caebfd8a7d46a9b3dc71006f830b53dd9fefe

      • C:\Users\Admin\AppData\Local\Temp\$$a32C8.bat

        Filesize

        722B

        MD5

        f723bf6dd51abc90c57358460228aaeb

        SHA1

        07c5633f7d2f0ba5319ad830930b1afe40cddd3e

        SHA256

        7417cb425a8b3e53e4a055822dd38005be6e535a2253396dac7d5636a5c1bc46

        SHA512

        1a44f90800421b3430e1fd569e4fc09abc30b2e3bb7223fd1da6d78dd64bc986a977f6691a9a6e7bfcdfaaf3d339f226889b25b432e6a41dd691024d7c85e396

      • C:\Users\Admin\AppData\Local\Temp\f137fca8e6bc39ce6245dd4dbc0fa4d0c009112e97745e4b8ca566306151081c.exe.exe

        Filesize

        544KB

        MD5

        9a1dd1d96481d61934dcc2d568971d06

        SHA1

        f136ef9bf8bd2fc753292fb5b7cf173a22675fb3

        SHA256

        8cebb25e240db3b6986fcaed6bc0b900fa09dad763a56fb71273529266c5c525

        SHA512

        7ac1581f8a29e778ba1a1220670796c47fa5b838417f8f635e2cb1998a01515cff3ee57045dacb78a8ec70d43754b970743aba600379fe6d9481958d32d8a5aa

      • C:\Windows\Logo1_.exe

        Filesize

        29KB

        MD5

        4b4afa60ab9612db0737ab7239b8f929

        SHA1

        5f0778a55394d8b9d597e5fc31ac44fa97476add

        SHA256

        4ca725a5704a86df766dcff486f19f1edff6e13b5f15f7dc3c96173a80fccbe5

        SHA512

        11830a5968678ec86f6d39e77dc192fb0dc334ce97959ac076adeb3c27e339c328aeda64f6e3f185433a489e5dd8ea64adafc636c13b7ed93c4a73a4c0c736e8

      • F:\$RECYCLE.BIN\S-1-5-21-200405930-3877336739-3533750831-1000\_desktop.ini

        Filesize

        9B

        MD5

        1f206a052c160fd77308863abd810887

        SHA1

        3b27ec1dc4b51fb7f1793a9ca9bb0d2e53e60eb1

        SHA256

        45129bd309ca763a88c6bf438896e82b939d6491036658c4512c57f8353938c1

        SHA512

        bd7857c146b01a49d34d4eb84053353eeb586bee6916426179305d5e2360559adea4040fe2184a3a803943ff4e6526cc38c665f9a808355619628868d53fbed5

      • memory/636-27-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/636-33-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/636-37-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/636-20-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/636-1237-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/636-8-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/636-4966-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/636-5405-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/1020-3-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/1020-10-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB