Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    101s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/06/2024, 22:37

General

  • Target

    767470a0f78dadfdbb45957c392e2c8c0144f739a30472d2afa449538692bff0.exe

  • Size

    5.7MB

  • MD5

    7615fb659700e7717f77b88e28113e89

  • SHA1

    bc2527db48050f702355397cd999dc889a54902b

  • SHA256

    767470a0f78dadfdbb45957c392e2c8c0144f739a30472d2afa449538692bff0

  • SHA512

    a180bc395e4317c88df3b7b839f1eb47369ba417fdc65e638c093498b0a175aa3940372375b6e01f409d653e4dc401ec3b0f205b4cf864323c9bfb86db883399

  • SSDEEP

    49152:QPv94AEsKU8ggw1g+1CART5eBiyKS3EI3wybn20DCYIHvc8ixuZm9+fWsw6dTPBm:uKUgTH2M2m9UMpu1QfLczqssnKSh

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3392
      • C:\Users\Admin\AppData\Local\Temp\767470a0f78dadfdbb45957c392e2c8c0144f739a30472d2afa449538692bff0.exe
        "C:\Users\Admin\AppData\Local\Temp\767470a0f78dadfdbb45957c392e2c8c0144f739a30472d2afa449538692bff0.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:2832
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a3C0F.bat
          3⤵
            PID:1356
            • C:\Users\Admin\AppData\Local\Temp\767470a0f78dadfdbb45957c392e2c8c0144f739a30472d2afa449538692bff0.exe
              "C:\Users\Admin\AppData\Local\Temp\767470a0f78dadfdbb45957c392e2c8c0144f739a30472d2afa449538692bff0.exe"
              4⤵
              • Executes dropped EXE
              PID:3488
          • C:\Windows\Logo1_.exe
            C:\Windows\Logo1_.exe
            3⤵
            • Executes dropped EXE
            • Enumerates connected drives
            • Drops file in Program Files directory
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:2552
            • C:\Windows\SysWOW64\net.exe
              net stop "Kingsoft AntiVirus Service"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:4528
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                5⤵
                  PID:5108

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

          Filesize

          252KB

          MD5

          07dfea84a37074ab4aeee668afefc263

          SHA1

          2a735d75fa11191ddec37aad6552ada029bb286d

          SHA256

          bc8f1ef7ad9dd42375c3841bc745155326fe7b04e5f7b258feb078a9e58a48b6

          SHA512

          c594c418adfff394998bd107c9c168f9dd3fbd21d2e6b24309005d126a695e4fc17fb88fb43a9a6a31197ba26e8779518e40ac360a5b7dfe53a232a4bf19076c

        • C:\Program Files\7-Zip\7z.exe

          Filesize

          571KB

          MD5

          bae4ba22a9fff8e7e85ac00978133d50

          SHA1

          b5ea591c5d2f0a2dfb42ac4a6bc966a18cedd1c5

          SHA256

          9f7a491718ec44ea84d2f10ef9913fbb36f6e822e03a649df6646d123610e0a8

          SHA512

          121584d5a640d4e9ddde6ba4f42b7998a770f0b55aab697e3781d54326976fdc0ac7023bb7de70e584cd0cdadbbbd921621bb529face932daa57ac86744a7797

        • C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe

          Filesize

          637KB

          MD5

          9cba1e86016b20490fff38fb45ff4963

          SHA1

          378720d36869d50d06e9ffeef87488fbc2a8c8f7

          SHA256

          a22e6d0f5c7d44fefc2204e0f7c7b048e1684f6cf249ba98c006bbf791c22d19

          SHA512

          2f3737d29ea3925d10ea5c717786425f6434be732974586328f03691a35cd1539828e3301685749e5c4135b8094f15b87fb9659915de63678a25749e2f8f5765

        • C:\Users\Admin\AppData\Local\Temp\$$a3C0F.bat

          Filesize

          722B

          MD5

          dc92c5fb8fe822603da962f8fd8d2515

          SHA1

          0cd837230de463b09e6214a041f2426d8a9537fa

          SHA256

          65fdea42c48d70cfd5b3ba49263486ac221b0585802d1c794332f895f9557dbc

          SHA512

          13ac42dc4a8437595f051c929cd53216dfa2642ca37bc06b88ce08261c7c34ff634f3f53b8ecd0283aafeae3399cc29c117c03f3caf384cf9bafa664abebde1b

        • C:\Users\Admin\AppData\Local\Temp\767470a0f78dadfdbb45957c392e2c8c0144f739a30472d2afa449538692bff0.exe.exe

          Filesize

          5.7MB

          MD5

          c596c3539f619ec76f36741933da5bed

          SHA1

          b3243f0ee893528f0ccd71700ca9970def6670b5

          SHA256

          bb9f95d1b280c1ec9ae27cf564bbb1b485e2d721d44b3288a9a43c07517e38de

          SHA512

          e6e9bd571f8a74b0d2f1a88f9c90fbf10a2150cda55cd4ad6f9a37e0c4a957a175ecb8adf17822331e6cb83bac6fec5bdc2fc87fdb5bc2bfa46ad7dac4df31d2

        • C:\Windows\Logo1_.exe

          Filesize

          27KB

          MD5

          e7022dfd7727b47fccc1c511a84e8c53

          SHA1

          9e258e645aa3df99b556e98bbe7390308014fbe9

          SHA256

          cffb794dcc2ef8b81c440fe0bc09f3172040e73d1ac9ef9e3a108ebb822a89e4

          SHA512

          69cb26c5dc0f6f4dd7d0ad32d921799bdba0cedfe063246a6c526872c9f211267e3e5989fcaa1f35ea19d4b06dd44f9d3d032db5b28f9a69581558d3eb2ebac9

        • F:\$RECYCLE.BIN\S-1-5-21-2080292272-204036150-2159171770-1000\_desktop.ini

          Filesize

          9B

          MD5

          4f2460b507685f7d7bfe6393f335f1c9

          SHA1

          378d42f114b1515872e58de6662373af31ab8c7b

          SHA256

          47a22297ce31d17b0f37251ce63cf2eb146700451caab6dd0aa710d2526c8e42

          SHA512

          75dcca6b81ac47511b847a5c35be4bddbee425436f7bfd1347115e18b84f52a16a5c517bda0a5f5d0a1f2541aab80d764932d8018538cb112fa3b6c9977e95eb

        • memory/2552-27-0x0000000000400000-0x0000000000435000-memory.dmp

          Filesize

          212KB

        • memory/2552-33-0x0000000000400000-0x0000000000435000-memory.dmp

          Filesize

          212KB

        • memory/2552-37-0x0000000000400000-0x0000000000435000-memory.dmp

          Filesize

          212KB

        • memory/2552-20-0x0000000000400000-0x0000000000435000-memory.dmp

          Filesize

          212KB

        • memory/2552-45-0x0000000000400000-0x0000000000435000-memory.dmp

          Filesize

          212KB

        • memory/2552-1232-0x0000000000400000-0x0000000000435000-memory.dmp

          Filesize

          212KB

        • memory/2552-4787-0x0000000000400000-0x0000000000435000-memory.dmp

          Filesize

          212KB

        • memory/2552-13-0x0000000000400000-0x0000000000435000-memory.dmp

          Filesize

          212KB

        • memory/2552-5226-0x0000000000400000-0x0000000000435000-memory.dmp

          Filesize

          212KB

        • memory/2832-0-0x0000000000400000-0x0000000000435000-memory.dmp

          Filesize

          212KB

        • memory/2832-10-0x0000000000400000-0x0000000000435000-memory.dmp

          Filesize

          212KB