Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    08/09/2024, 04:32

General

  • Target

    47a3c9fcb4a059cf7ef91367307b86ce502550c03f7d64b18f6a7afdb6c5c834.exe

  • Size

    577KB

  • MD5

    c5a3b44ea543351c4ed6f327c16cfb0a

  • SHA1

    a9efb7b530f6c7d796fe4af7b1f88919cc2d3787

  • SHA256

    47a3c9fcb4a059cf7ef91367307b86ce502550c03f7d64b18f6a7afdb6c5c834

  • SHA512

    83921fc1464610c6ea640505ba9a797d07815a57e676af5b803ac8de17fa9fb274b88fd90f9674c258c6b0ee4a603b925fed0c16e495a3eef25f9f6909387f8f

  • SSDEEP

    6144:RVuJTI79NH//QYLq2wNf2lGEz9QqSkZf6UD:eIrH//Q12Un69QhkZT

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1188
      • C:\Users\Admin\AppData\Local\Temp\47a3c9fcb4a059cf7ef91367307b86ce502550c03f7d64b18f6a7afdb6c5c834.exe
        "C:\Users\Admin\AppData\Local\Temp\47a3c9fcb4a059cf7ef91367307b86ce502550c03f7d64b18f6a7afdb6c5c834.exe"
        2⤵
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2084
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\$$aDD83.bat
          3⤵
          • Deletes itself
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1444
          • C:\Users\Admin\AppData\Local\Temp\47a3c9fcb4a059cf7ef91367307b86ce502550c03f7d64b18f6a7afdb6c5c834.exe
            "C:\Users\Admin\AppData\Local\Temp\47a3c9fcb4a059cf7ef91367307b86ce502550c03f7d64b18f6a7afdb6c5c834.exe"
            4⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2252
            • C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
              dw20.exe -x -s 412
              5⤵
              • Loads dropped DLL
              • System Location Discovery: System Language Discovery
              PID:2908
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2248
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:3060
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
              • System Location Discovery: System Language Discovery
              PID:2780

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

      Filesize

      254KB

      MD5

      bd1c5f10a79541124a32209a82776583

      SHA1

      199f2135cd82c469b7d9d02b851e7eef3e5ef9b6

      SHA256

      4bc8149c1af0c33db3cf7ce59b78e6a0562c2e58f55de50cca71296f990068fe

      SHA512

      501cbf5c830a6169c0555540fc2f2eb30d08737879e28ddf71e262a8c8586958c5ff87b64cc55c5a74923c2ec12f8a7af2e2d7386df87e62eada14853c88d8c0

    • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

      Filesize

      474KB

      MD5

      17e5de36cf448d652adab881a4557ec2

      SHA1

      c45337444120f4cc4a9a65b2bee63cd61618ca2a

      SHA256

      32568fb07078e0d4e77efac9ad862454dba63de5c5f920d9a14de709372f2430

      SHA512

      22678c9ca2d70d9a3377d1f2c6c91d7649adcaccee564acdf1bd6373e60f13f6e21fc09feed5b590475889996287961a1450542741ef0888a4a0b5e9c9812b92

    • C:\Users\Admin\AppData\Local\Temp\$$aDD83.bat

      Filesize

      722B

      MD5

      8e52914bb1a273bda309200312d7e16a

      SHA1

      eb176e70032730082af4a0aa5ea924abc2dfbc2e

      SHA256

      baa1c63bac8808aadf38c224d6e2f6f8261acb77e77807a6540a2517ca8cd017

      SHA512

      6f43d97f1b1b77c0a600728346ccd25e462904b4236bd57ccc4082277c8699f3a57f9ec9571cfa06045d771708b074d800b2b137516cda77a97ea0c0facb6cfc

    • C:\Users\Admin\AppData\Local\Temp\47a3c9fcb4a059cf7ef91367307b86ce502550c03f7d64b18f6a7afdb6c5c834.exe.exe

      Filesize

      548KB

      MD5

      99f5ad280275b636ca54950ef479e41f

      SHA1

      5b3444cee5ba2eedbf176557ef80bc3be9f2e612

      SHA256

      0da0e49fb3d4e6861a71466def49924841a478ab3d1798730f51b2c6421c20b2

      SHA512

      22ed742d47ce75e11b49af8aaa7e8ff98e36d41ae9c58563d5f3cd23d29e1a5833a887ad0487ad6715e23fcae506db0f9421263b5431fdcbffb3b6cd7e15d4d3

    • C:\Windows\Logo1_.exe

      Filesize

      29KB

      MD5

      e60d42b1d6a0f2cad24978c2b6d1f97b

      SHA1

      475ffcfa24cc1592f4df365e812de3cc9b7fab1e

      SHA256

      0659547e92dee1b004fe2e5892411d4b6aa740a76fc0830f968b75527c1a5b55

      SHA512

      fa2ca1553e4351657355646090a4ee23a14e3c68f01516aff097f9b119736205f5dde54630f0dd141ec8eaf8e5f4e4c08e8989801863b14879043b715838b25d

    • F:\$RECYCLE.BIN\S-1-5-21-1846800975-3917212583-2893086201-1000\_desktop.ini

      Filesize

      8B

      MD5

      646a1be8fae9210cfba53ee1aab14c96

      SHA1

      8677ff347131a9c8304f10b48012ebd8b075030c

      SHA256

      660d57a3dc71884e70a9cbd6ca26d02872f4706abeb098c6d35f6b217462edf5

      SHA512

      812b716a422628d486a4c78c66a85c641f13976537fbd452e14fab9a6c440b442632df04de8437c485c9c8164e3b3499201d3dbe681b36fe6bec749df1ab75e4

    • memory/1188-35-0x0000000002DF0000-0x0000000002DF1000-memory.dmp

      Filesize

      4KB

    • memory/2084-17-0x0000000000220000-0x0000000000256000-memory.dmp

      Filesize

      216KB

    • memory/2084-16-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/2084-0-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/2248-38-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/2248-1883-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/2248-19-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/2248-3343-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/2248-712-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/2248-48-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/2248-54-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/2248-100-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/2248-106-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/2252-31-0x0000000074CD0000-0x000000007527B000-memory.dmp

      Filesize

      5.7MB

    • memory/2252-32-0x0000000074CD0000-0x000000007527B000-memory.dmp

      Filesize

      5.7MB

    • memory/2252-30-0x0000000074CD1000-0x0000000074CD2000-memory.dmp

      Filesize

      4KB

    • memory/2252-40-0x0000000074CD0000-0x000000007527B000-memory.dmp

      Filesize

      5.7MB

    • memory/2252-39-0x0000000074CD1000-0x0000000074CD2000-memory.dmp

      Filesize

      4KB