Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    07/09/2024, 12:33

General

  • Target

    Virus.Injector.ATA_virussign.com_71d804c8cf876e65e93d58c79177c313.exe

  • Size

    562KB

  • MD5

    71d804c8cf876e65e93d58c79177c313

  • SHA1

    41f12a009ee03714125acf9ef810d00d0d663e57

  • SHA256

    51ed0ccf2ee16871ab39c8631be12f3f077c5bd9b62eb4951b3695e238c2468e

  • SHA512

    0f45ed09d3c57a28b6dd58d542fdc5ebce02a734125d2ed53f433135a338b2563d56054d4f00632367cc8aa710b51ee9fbb6756cbeb3f8db705d9145b3c2800f

  • SSDEEP

    12288:I+aUc9iJafmm2VYK+UNo0RweQfoAxHv9sN4A4H9J618UtQ43iUa:IBgVm2VZQwy9E1Vf3M

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Drops startup file 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 43 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1192
      • C:\Users\Admin\AppData\Local\Temp\Virus.Injector.ATA_virussign.com_71d804c8cf876e65e93d58c79177c313.exe
        "C:\Users\Admin\AppData\Local\Temp\Virus.Injector.ATA_virussign.com_71d804c8cf876e65e93d58c79177c313.exe"
        2⤵
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2876
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2872
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            4⤵
            • System Location Discovery: System Language Discovery
            PID:3028
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\$$a96F2.bat
          3⤵
          • Deletes itself
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2708
          • C:\Users\Admin\AppData\Local\Temp\Virus.Injector.ATA_virussign.com_71d804c8cf876e65e93d58c79177c313.exe
            "C:\Users\Admin\AppData\Local\Temp\Virus.Injector.ATA_virussign.com_71d804c8cf876e65e93d58c79177c313.exe"
            4⤵
            • Executes dropped EXE
            PID:2860
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Drops startup file
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2696
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2672
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
              • System Location Discovery: System Language Discovery
              PID:2692
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:1452
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
              • System Location Discovery: System Language Discovery
              PID:2552

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

      Filesize

      258KB

      MD5

      c3edc0f096e5b0e8e5756f988af26b69

      SHA1

      3ff38578d6d90758e3485f6cd8792bedf925dbe5

      SHA256

      a47a6432c68488361e77f6b2ffe00f6a389bbefa612999d647342af6e5d9ebb1

      SHA512

      d4fa7452579befb4eb563c29e41474c45b515a3ac896db2282669ebd43a0cdcf3965fb4f18c5b78372ac1f9f4be27f81521b5ee6e278cee9cf4d7a373ae32197

    • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

      Filesize

      477KB

      MD5

      c32f3ae2a93a21a604cd493d86b40278

      SHA1

      4428387f1a1dd12ff5607459bcf4d89cd8ed80fe

      SHA256

      b84bbbbc007c88ca79ea94b2cf92e7a3093c8de3a8ce4b70b6f4d0a9480595a8

      SHA512

      5e7bb3318deebf7663fc4b9c3b20ce75986e32cbb27c34ec94fccf5affde4f0dd9e5dd0bef38510d088ec00b885dccafff09706a75fd927f882540ead7cc7965

    • C:\Users\Admin\AppData\Local\Temp\$$a96F2.bat

      Filesize

      728B

      MD5

      d152068eb3e9c2f6fce61bd4285cbcca

      SHA1

      a91bcc32b90d696d706bac59f1d70ff19ffa88a5

      SHA256

      273cd6dcc69cea053e13fe2fc9f406addfdb4096e75fac75dd5f3d2a6cc974a9

      SHA512

      9556ff3ca5942f911eca687ebb863739956d5bf719b82cd0de84ab3dd2c02a3ff1ff9635dd4d03523ed7286704aeabeaa131c83b381e47eb4caf79774272f629

    • C:\Users\Admin\AppData\Local\Temp\Virus.Injector.ATA_virussign.com_71d804c8cf876e65e93d58c79177c313.exe.exe

      Filesize

      529KB

      MD5

      cca0c5482b8a6a275d9d49433f435dfa

      SHA1

      a72ae8621386e13c34055f612ae7612b8a18a39e

      SHA256

      6ea08bbcedf7cb51cfbe4896ef8c589a4568b1d5240265b1dcfda83dc8b55365

      SHA512

      b88f5cdb4bc08429ca40d24cef490128d341e10615d1d93d084b3247c2b28573d177d878c1385d3941e16a8bcc8a9f6b7870c152f4a43d02e69c05defcc9196e

    • C:\Windows\Logo1_.exe

      Filesize

      33KB

      MD5

      8db8f01ff3888c1cf7faa0d7bee56fac

      SHA1

      2e67943b7b89ed681aad28d547f5fe105b8d6bbb

      SHA256

      ec7ddca76eda53f8cd5276c1300d78e1ac0e29c6eb14d95f0e6342ad97acf100

      SHA512

      e87cca7c2892bc440f2d9a7de9935395a17726df780e56feb861d3219a8586993bd7b95f610609c589ebc694469eb1213d5e39986a90b83a48f5475ed3da547a

    • F:\$RECYCLE.BIN\S-1-5-21-457978338-2990298471-2379561640-1000\_desktop.ini

      Filesize

      8B

      MD5

      24cfb7e9169e3ecbcdf34395dff5aed0

      SHA1

      64061d8b0afd788fb3d2990e90e61f14010896dd

      SHA256

      e11477f26e6139dabba6ad5dab927732c6a3785db78f82194ad7ae20323c6578

      SHA512

      a315d4ab14f15f8df115e35134f0a1eff8018b0c35c5a0283928f2d3f3014215d683973b9aeba1bc74c49437cc929ea4e2fb847b4305da6d5abca235c750e299

    • memory/1192-30-0x0000000002250000-0x0000000002251000-memory.dmp

      Filesize

      4KB

    • memory/2696-34-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB

    • memory/2696-1140-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB

    • memory/2696-20-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB

    • memory/2696-3346-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB

    • memory/2696-6512-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB

    • memory/2696-9329-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB

    • memory/2876-16-0x0000000000440000-0x000000000047F000-memory.dmp

      Filesize

      252KB

    • memory/2876-0-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB

    • memory/2876-17-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB

    • memory/2876-18-0x0000000000440000-0x000000000047F000-memory.dmp

      Filesize

      252KB