Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    08/09/2024, 01:33

General

  • Target

    fec54214beea7d09d0ccfaba712c320cb86bce6095e351d0d90787005c4dbeae.exe

  • Size

    227KB

  • MD5

    e44b50e764edadbefeefabd02d651c9d

  • SHA1

    23a19c728f3833545ecd22d1a6621f39a9f8d2b9

  • SHA256

    fec54214beea7d09d0ccfaba712c320cb86bce6095e351d0d90787005c4dbeae

  • SHA512

    24c9079e4a37b3c8f6e86fae272fb552ed6e4831c427b0c1b3f0d998e30c548466b5a5339dd91cde35a8005267e1de1e457e960b3eedf18ff57047059486ffc1

  • SSDEEP

    3072:p/kuJVLUdeKzC/lzMPySe8DnpeIPipoHbKvXWXz9LRnsaJUS+6wPXD3fxNW7gq5n:yuJWdeKzC/leySe8AIqpoHbnDns1ND9m

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1116
      • C:\Users\Admin\AppData\Local\Temp\fec54214beea7d09d0ccfaba712c320cb86bce6095e351d0d90787005c4dbeae.exe
        "C:\Users\Admin\AppData\Local\Temp\fec54214beea7d09d0ccfaba712c320cb86bce6095e351d0d90787005c4dbeae.exe"
        2⤵
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2844
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\$$a8A36.bat
          3⤵
          • Deletes itself
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1908
          • C:\Users\Admin\AppData\Local\Temp\fec54214beea7d09d0ccfaba712c320cb86bce6095e351d0d90787005c4dbeae.exe
            "C:\Users\Admin\AppData\Local\Temp\fec54214beea7d09d0ccfaba712c320cb86bce6095e351d0d90787005c4dbeae.exe"
            4⤵
            • Executes dropped EXE
            PID:1624
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2788
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2072
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
              • System Location Discovery: System Language Discovery
              PID:2076

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

      Filesize

      474KB

      MD5

      6eabc463f8025a7e6e65f38cba22f126

      SHA1

      3e430ee5ec01c5509ed750b88d3473e7990dfe95

      SHA256

      cc8da3ecd355b519d81415d279ed037c725ba221bf323d250aa92ee2b2b88ca7

      SHA512

      c8fde7026ac8633403bbefee4b044457184388fb7343d8c46f5f7f272724227976bf485ea91da49e2a85dd0cfb73f260ac705d8007333dd3e5539fe5ed67e3ab

    • C:\Users\Admin\AppData\Local\Temp\$$a8A36.bat

      Filesize

      722B

      MD5

      6501e92853f5d3961a608534f150bd94

      SHA1

      20d839b615e0f589605def85363b62519394a446

      SHA256

      aff74342ba8723540186a4e617ceac1cd7d63a14d5d1ed6e97ca5df205844413

      SHA512

      c89d5cee338dda03d94cf8dfd230d1d2e081065041e2e802af049ff26134571485f18a4853861055d5b6c6ba5b40f8ebfd71db25f092107fbf5329c40be37f06

    • C:\Users\Admin\AppData\Local\Temp\fec54214beea7d09d0ccfaba712c320cb86bce6095e351d0d90787005c4dbeae.exe.exe

      Filesize

      198KB

      MD5

      e133c2d85cff4edd7fe8e8f0f8be6cdb

      SHA1

      b8269209ebb6fe44bc50dab35f97b0ae244701b4

      SHA256

      6c5e7d9c81a409e67c143cd3aed33bddc3967fa4c9ab3b98560b7d3bf57d093d

      SHA512

      701b7d1c7e154519d77043f7de09d60c1ff76c95f820fc1c9afca19724efb0847d646686053354156fd4e8a9dab1f29a79d3223f939a3ff1b3613770dc8603b1

    • C:\Windows\rundl132.exe

      Filesize

      29KB

      MD5

      0a22c1ea4b867a82271e2173bbb7ccfb

      SHA1

      cae0f4ee49b426c3eefe5af8da008be2d09e2b6d

      SHA256

      e01d2dfa8289fb6d4483e18e8f3f8eecea75b783e401908c227f87078195eddf

      SHA512

      b940cb99532fb7830dcd6f6b52fd933ca1431b21b4233703c48013fb612246300029b725aecfcfae33879581d59e6f5f7c033db084c65e848c4b8b5c97cb2e77

    • F:\$RECYCLE.BIN\S-1-5-21-3533259084-2542256011-65585152-1000\_desktop.ini

      Filesize

      8B

      MD5

      646a1be8fae9210cfba53ee1aab14c96

      SHA1

      8677ff347131a9c8304f10b48012ebd8b075030c

      SHA256

      660d57a3dc71884e70a9cbd6ca26d02872f4706abeb098c6d35f6b217462edf5

      SHA512

      812b716a422628d486a4c78c66a85c641f13976537fbd452e14fab9a6c440b442632df04de8437c485c9c8164e3b3499201d3dbe681b36fe6bec749df1ab75e4

    • memory/1116-29-0x0000000002D20000-0x0000000002D21000-memory.dmp

      Filesize

      4KB

    • memory/2788-97-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/2788-31-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/2788-38-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/2788-44-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/2788-90-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/2788-479-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/2788-1873-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/2788-3333-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/2788-18-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/2844-16-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/2844-0-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB