Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/06/2024, 23:19

General

  • Target

    28d83eb8bb7619d599db8361ca8917c6cb490bf57b33cdc43145f8b0447e7f12.exe

  • Size

    40KB

  • MD5

    1d2b84f8d068e0a06b3059d67370677a

  • SHA1

    0ff4cc5d331b9a3e2b19ddd299237d93e6e5ba6d

  • SHA256

    28d83eb8bb7619d599db8361ca8917c6cb490bf57b33cdc43145f8b0447e7f12

  • SHA512

    d463518b851a5fda69565627f0d1887ffc086fdc43f08696b799184cb57657e54ea479f5c5118da6ae5ec9e5b3eb1e606a2ed5a290bf48fa503fea3cb7f2f500

  • SSDEEP

    768:pHFc16GVRu1yK9fMnJG2V9dHS8ANlEMi2jpv8vC:pHw3SHuJV9NUNlj958K

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Program crash 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3460
      • C:\Users\Admin\AppData\Local\Temp\28d83eb8bb7619d599db8361ca8917c6cb490bf57b33cdc43145f8b0447e7f12.exe
        "C:\Users\Admin\AppData\Local\Temp\28d83eb8bb7619d599db8361ca8917c6cb490bf57b33cdc43145f8b0447e7f12.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:4896
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a377B.bat
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:4380
          • C:\Users\Admin\AppData\Local\Temp\28d83eb8bb7619d599db8361ca8917c6cb490bf57b33cdc43145f8b0447e7f12.exe
            "C:\Users\Admin\AppData\Local\Temp\28d83eb8bb7619d599db8361ca8917c6cb490bf57b33cdc43145f8b0447e7f12.exe"
            4⤵
            • Executes dropped EXE
            PID:1012
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1012 -s 776
              5⤵
              • Program crash
              PID:4220
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2356
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2452
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:1136
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1012 -ip 1012
        1⤵
          PID:4160

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

          Filesize

          254KB

          MD5

          6414be365a33e0066dae1212f40e01de

          SHA1

          aa0f1095a9086fdaa4e76a1502458b0a62df6aea

          SHA256

          05fc90a578a5395b12f2493d2d81faebdd07884b9ce4338a1d9486dd4dcae695

          SHA512

          e5503bb8469ad664b0aa840af0f0cb83f43fe8be79bd5c8b89879d50ad3b208b2b714ceee59dbd2be8881db0ee3c36e2f4063180459cbf70f2202aae770f02ac

        • C:\Program Files\UnlockWatch.exe

          Filesize

          1.4MB

          MD5

          6ed89dff96166252928ec948614017ca

          SHA1

          6d6c4943fb32744d10422a319432892075dc224d

          SHA256

          22dcbe4633218b23a3eeea6b9e86acf994f0bfca8c60207306280b7704168ef1

          SHA512

          64f8f119fe0dabf4f4e3061b2807843b65fab5a25aee89bd7e0e7891526c4f61d4db207d595999221b2bfc9f4d0f52e8e316008e0994c8dc43b300f7dbdda9fc

        • C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe

          Filesize

          639KB

          MD5

          c8d281da4c32df16eef470c27c8cb459

          SHA1

          00efc9f6844bfaa37c264b6452c6a7356638ab10

          SHA256

          058c81e5a07f2c6c33cf28dff71d07ad8f179046108d945159957e891bfd9c62

          SHA512

          e3c79e19f620068f668d4ebaa5097f1a95a30dabb8dce75f3787171dddbea9f684fc7ce8d1011a398f38084d7af96dd1ff9a02d25906aab9b13861b8363d24bb

        • C:\Users\Admin\AppData\Local\Temp\$$a377B.bat

          Filesize

          722B

          MD5

          753c37caecd8a175616cb1a7a5e9ea55

          SHA1

          70d6b411c8a53f28aa206873d071510e77b37524

          SHA256

          2c1d3f33c93ba26fda6d72fab58a7de8b5e9d34478cd6fa8754dd35020385309

          SHA512

          12055ab5f11138e850c600d8ae278c0136407aabf29b770535b482efc50a05b03e3bcda4546239266b4c9a31186c943f22f81f3d7be5107621703826af766989

        • C:\Users\Admin\AppData\Local\Temp\28d83eb8bb7619d599db8361ca8917c6cb490bf57b33cdc43145f8b0447e7f12.exe.exe

          Filesize

          11KB

          MD5

          02be6d33b1edbc61c79882d3f556bd8a

          SHA1

          8d0afa78893ae5f04e505db0d76d0d50cf34e7da

          SHA256

          4c9f9b9de2ffeea9ccc6524d05ea5b78a14c1642cecc189fe40e7a57a6c294b3

          SHA512

          39949d9a14a17d7cf31aa222a6547be7663673872d5091a77c64b0cd863e399dcdfbff70443bc9a2c2dccc658a998afc5189469723bb5f4c8adeecab47b07967

        • C:\Windows\Logo1_.exe

          Filesize

          29KB

          MD5

          30b1ef69af461b95b4bc841004fc6dc3

          SHA1

          bd5a8b12a9a9708221f725478049463fef2cd8f0

          SHA256

          921368914fba3c4a879328622ab4d117b7d3211e6ed61853a2c455abb3ce09b7

          SHA512

          554b72cc0dede3023082e221045a361060db9d4181be32e924724c95ea273396c8d58962f1d50718cba9ee83247f0ca6d0143f3401fed5267fdb804bc52df009

        • F:\$RECYCLE.BIN\S-1-5-21-2447855248-390457009-3660902674-1000\_desktop.ini

          Filesize

          9B

          MD5

          03c36dbecb7f35761f80ba5fc5566da6

          SHA1

          159b7733006187467bda251a1bbb278c141dceb6

          SHA256

          85a53f5b976fb1c26ce14c31e93c1f68997d2d8b09ab9aa2b7e0d32b8e50ec3b

          SHA512

          fe573085d2abef34adcede2f89b1c2810875ab00ef9ba27a1d95ed1dbe93e182fc53d981901a0b8048dd4eb5fdc852b8f0e0c3a0e1a404cbbe70e13a7a14104a

        • memory/1012-19-0x000000007480E000-0x000000007480F000-memory.dmp

          Filesize

          4KB

        • memory/1012-20-0x00000000003B0000-0x00000000003B8000-memory.dmp

          Filesize

          32KB

        • memory/2356-29-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/2356-35-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/2356-39-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/2356-22-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/2356-75-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/2356-1235-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/2356-4790-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/2356-9-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/2356-5229-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/4896-0-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/4896-11-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB