Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    154s
  • max time network
    160s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/07/2024, 18:25

General

  • Target

    5eac9f46a903bfb3f31fd5950814c6ee5f73cb2c5be31e719527e7fd4b22287e.exe

  • Size

    717KB

  • MD5

    cd5563fb7456d0d482c92584f91473ee

  • SHA1

    72d321a7d604bd7aeb8be1ebf081cb0c528fe869

  • SHA256

    5eac9f46a903bfb3f31fd5950814c6ee5f73cb2c5be31e719527e7fd4b22287e

  • SHA512

    ea4b622e020a0f72cc6bae973379de00ba7535091a6fbbf56068f3a26881e007656c00768074d06fa0a49eee4ae4290b2653b4f4042362329e5dc8b2f4931141

  • SSDEEP

    12288:rRfC6Aj+TN5uixZN+8rKhUdTC/wE1ZD0Ca5ZIXV:rRLOS2opPIXV

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3316
      • C:\Users\Admin\AppData\Local\Temp\5eac9f46a903bfb3f31fd5950814c6ee5f73cb2c5be31e719527e7fd4b22287e.exe
        "C:\Users\Admin\AppData\Local\Temp\5eac9f46a903bfb3f31fd5950814c6ee5f73cb2c5be31e719527e7fd4b22287e.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:5100
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:5072
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            4⤵
              PID:3600
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aE9D3.bat
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:3196
            • C:\Users\Admin\AppData\Local\Temp\5eac9f46a903bfb3f31fd5950814c6ee5f73cb2c5be31e719527e7fd4b22287e.exe
              "C:\Users\Admin\AppData\Local\Temp\5eac9f46a903bfb3f31fd5950814c6ee5f73cb2c5be31e719527e7fd4b22287e.exe"
              4⤵
              • Executes dropped EXE
              PID:4232
          • C:\Windows\Logo1_.exe
            C:\Windows\Logo1_.exe
            3⤵
            • Executes dropped EXE
            • Enumerates connected drives
            • Drops file in Program Files directory
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:2996
            • C:\Windows\SysWOW64\net.exe
              net stop "Kingsoft AntiVirus Service"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:4968
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                5⤵
                  PID:1412
              • C:\Windows\SysWOW64\net.exe
                net stop "Kingsoft AntiVirus Service"
                4⤵
                • Suspicious use of WriteProcessMemory
                PID:3268
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                  5⤵
                    PID:2948
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1340 --field-trial-handle=2244,i,11878111470816612087,2265290141962607370,262144 --variations-seed-version /prefetch:8
            1⤵
              PID:4744

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

              Filesize

              258KB

              MD5

              920aa02bc54d3ba29c445e3a171fc5ea

              SHA1

              1c58fd6fdfa1c582a442a34d4725d61a850b0363

              SHA256

              05867d8f2ececd59d608188da2ce1a18fa0bc388c4896778c1909e36039db537

              SHA512

              9d34fa3a6f4111d95c7086d31984dd6fdd606a50e567f4f75d798e5a8bebcfbe2952056cc23fcdd0d6e51780f7dd1dd41101a1f067bbbb7002710d59d40d0a3c

            • C:\Program Files\7-Zip\7z.exe

              Filesize

              577KB

              MD5

              a88c7111b1dcd2c404887960831c0c19

              SHA1

              1d18251a9a2129fa09c13e3527a5ad898b0a5b01

              SHA256

              244a9df1c66fdbae37b6cd91f44c13b64c67eb79ece9e666d74243d7d1ce5028

              SHA512

              c3b32bb60cea7fa9e88b05c47ec9da623fdcad9d8a6c8c58d9a2a47c40ae2b8fb3546c9058c52cbabebaaaec3dc4e3c899c986a8f707f3b5ea6302b45527a047

            • C:\ProgramData\Package Cache\{61087a79-ac85-455c-934d-1fa22cc64f36}\vcredist_x86.exe

              Filesize

              488KB

              MD5

              ee67e995cc720bdea9ad5bd16b0ff7bf

              SHA1

              8779525e9576a51cd6441b6c35e5e38690c94f34

              SHA256

              ef3bfd992ca033aacbe64d6a949a4dc94a3ee19fa7349298541faf08298b1d98

              SHA512

              e1aebdd145ea7415867ff44e71a8e3f730f2c8712ca3c79289cc00231fbdb7b03c000d069ac60eb5cd62eff6079cf4fd4595a6016a4c98ea19051767366e4524

            • C:\Users\Admin\AppData\Local\Temp\$$aE9D3.bat

              Filesize

              722B

              MD5

              2cab1cae2d98bd83eb4e3954ef814387

              SHA1

              90e22cc74ea43048b9cbd5c48520b00cf15fc17e

              SHA256

              d31cd079a5785975c6708a6587e63d2ab8113920a0484db323df6a6216a34ac1

              SHA512

              58cf799f0ef61ea6c78b6edb31dac11741fb8921eb32d62f0beb98a96493a1368145d4a3c9b0a7795fe1299c2708d5869b74acb7d104981c3d14622a8393eab2

            • C:\Users\Admin\AppData\Local\Temp\5eac9f46a903bfb3f31fd5950814c6ee5f73cb2c5be31e719527e7fd4b22287e.exe.exe

              Filesize

              684KB

              MD5

              50f289df0c19484e970849aac4e6f977

              SHA1

              3dc77c8830836ab844975eb002149b66da2e10be

              SHA256

              b9b179b305c5268ad428b6ae59de10b4fe99cf0199bbc89b7017181905e97305

              SHA512

              877d852ea1062b90e2fd2f3c4dc7d05d9697e9a9b2929c830a770b62741f6a11e06de73275eb871113f11143faf1cb40d99f7c247862ffb778d26833ed5d7e38

            • C:\Windows\Logo1_.exe

              Filesize

              33KB

              MD5

              933403c035bedeaf409ff1a3d7bb394f

              SHA1

              27765fb7a74adda8b6b4d740a79e83fca3301e79

              SHA256

              11a73da3698c3448e24744bdc72a155bb756676dcc7e03264d723ca91ce87a54

              SHA512

              36f17b6beb74f2d11cf74a211719c0ab5c09ad289055917168cdb1d3355cfdf2cd917f008e3c8b51d408d1f6dd1fdda692e50c6dcbeeaf4917adad7cc769b2d0

            • F:\$RECYCLE.BIN\S-1-5-21-3808065738-1666277613-1125846146-1000\_desktop.ini

              Filesize

              8B

              MD5

              87cbd7a2d7bdb443a36ecfb46e39db18

              SHA1

              12aac09be13003e857809ea9434c76126ac39bbf

              SHA256

              fe5e34894849bd441c429cfd17e62e06b828a82b04c9f0e7cadd884d78b326e1

              SHA512

              75b0b484285909c577f97dd2b748e8b6e905b2a37dc8a569519325e67cac8b8932fbbd52c754df787e2a6326a9ca575e5d37372a9635718a310c642457ed17e0

            • memory/2996-471-0x0000000000400000-0x0000000000440000-memory.dmp

              Filesize

              256KB

            • memory/2996-2585-0x0000000000400000-0x0000000000440000-memory.dmp

              Filesize

              256KB

            • memory/2996-85-0x0000000000400000-0x0000000000440000-memory.dmp

              Filesize

              256KB

            • memory/2996-6736-0x0000000000400000-0x0000000000440000-memory.dmp

              Filesize

              256KB

            • memory/2996-755-0x0000000000400000-0x0000000000440000-memory.dmp

              Filesize

              256KB

            • memory/2996-1522-0x0000000000400000-0x0000000000440000-memory.dmp

              Filesize

              256KB

            • memory/2996-1688-0x0000000000400000-0x0000000000440000-memory.dmp

              Filesize

              256KB

            • memory/2996-18-0x0000000000400000-0x0000000000440000-memory.dmp

              Filesize

              256KB

            • memory/2996-3976-0x0000000000400000-0x0000000000440000-memory.dmp

              Filesize

              256KB

            • memory/2996-11-0x0000000000400000-0x0000000000440000-memory.dmp

              Filesize

              256KB

            • memory/2996-4914-0x0000000000400000-0x0000000000440000-memory.dmp

              Filesize

              256KB

            • memory/2996-5617-0x0000000000400000-0x0000000000440000-memory.dmp

              Filesize

              256KB

            • memory/2996-5671-0x0000000000400000-0x0000000000440000-memory.dmp

              Filesize

              256KB

            • memory/5100-9-0x0000000000400000-0x0000000000440000-memory.dmp

              Filesize

              256KB

            • memory/5100-0-0x0000000000400000-0x0000000000440000-memory.dmp

              Filesize

              256KB