Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/08/2024, 18:04

General

  • Target

    acbb97a69cb3a2e91bdf8419c3bc17d2324c64ca1d3abdae46d2092b8461be19.exe

  • Size

    26KB

  • MD5

    99f0fc02c36fcf6a20f2d4a1458a98ec

  • SHA1

    29ed1d40f3861d9feb481c656efeff8544923a60

  • SHA256

    acbb97a69cb3a2e91bdf8419c3bc17d2324c64ca1d3abdae46d2092b8461be19

  • SHA512

    b27054906827e87bf9928c8f5addcc49f0e585220c0a80dfa1cd2bbeff3be6150cf10b8cef31e32e2fd5868dd5b72e67cd9629302f2493ddf2229065c4bf912f

  • SSDEEP

    768:g1ODKAaDMG8H92RwZNQSw+IlJIJJREIOAEeF1:yfgLdQAQfhJIJ0IO61

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3516
      • C:\Users\Admin\AppData\Local\Temp\acbb97a69cb3a2e91bdf8419c3bc17d2324c64ca1d3abdae46d2092b8461be19.exe
        "C:\Users\Admin\AppData\Local\Temp\acbb97a69cb3a2e91bdf8419c3bc17d2324c64ca1d3abdae46d2092b8461be19.exe"
        2⤵
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:4384
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:368
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            4⤵
            • System Location Discovery: System Language Discovery
            PID:1188

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleUpdateCore.exe

      Filesize

      244KB

      MD5

      0258ef2c233a51a16266a4fe7fd171b2

      SHA1

      40a8b8f31d16dab2b1d0e80a1dd366ca8add6236

      SHA256

      c51c97fd8e20b709a1b68c5b25ae47f850457cb77e779fe76b23a985a0a1f298

      SHA512

      4065675ae9cc2c28fa401adcba16d62d24c1c001c344061a049c077387cdfd66172ecd0e119d2687b15d4d1eab359ca67db067ff59e89d3bdba8e5eed759a9e3

    • C:\Program Files\dotnet\dotnet.exe

      Filesize

      170KB

      MD5

      b77ad33b477cef3b424e4e9e65753ea9

      SHA1

      5330533f566e9d147722bd5e785a9e6f16f594b1

      SHA256

      778b8e8bbe41a9a6f168aa318453876d2abce2e122399e1e5ee8ec89099702e3

      SHA512

      f3e3b7b5c1ab37daf78c11ccfa97596409c35720c770ba0d12e2b2c27eae34ec98917ba45ee4fc68ea1659b9987e8f62c538584243d0d51d1b8312263541d3bf

    • C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe

      Filesize

      636KB

      MD5

      d82ffc872aed7c85cf936dcdcc2e6372

      SHA1

      50ca56cb4a429ce1532afaa2732f61833fc2b54f

      SHA256

      a487733710d946abff1a93a23ae6bbafd6c0800bc78e4d5e3cac36e2a14ddace

      SHA512

      0b0031418275c6be01f7757111058cd5bd3e5f4862e0631e2e28c5e7ffbb271446abdc2a88a7953ae55112799bc4a051becc2b14491e0d1760e336498665cc8b

    • F:\$RECYCLE.BIN\S-1-5-21-2718105630-359604950-2820636825-1000\_desktop.ini

      Filesize

      8B

      MD5

      fcbaf0a2c3988ef775359f94d545ab42

      SHA1

      174ccd98ff87b8e6f46eebc493f379beafeb3b08

      SHA256

      895aaa8dac57f2bb76ddc8c2681e0480bf57dbf3f62cda3840cb448b8615612f

      SHA512

      7c81b6445708b1c482599bfb808e90462d6111e885691dd947d9cdf95ba028d580b20027575814a310a81f310261b649792b65153ce43063da063b5005561d20

    • memory/4384-0-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/4384-5-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/4384-12-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/4384-19-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/4384-22-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/4384-1219-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/4384-4777-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/4384-5222-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB