Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    09/09/2024, 19:33

General

  • Target

    4c097ef714de4e0ba7ddcbe7cd7b1eae8eec1c2597c15449b16ba3a80e10da61.exe

  • Size

    52KB

  • MD5

    fa2a8fcf49048bc8c095c6db30042ef7

  • SHA1

    e53cd9957713e1e17e4e31a5d02742ba301a9a91

  • SHA256

    4c097ef714de4e0ba7ddcbe7cd7b1eae8eec1c2597c15449b16ba3a80e10da61

  • SHA512

    63e31442627636c840d23abe27d173d247e1fd9008e2d2796e57ff80215de37696c81fc79e27e87df3300252b33df9abc3b7da95f7b3caca96462cbaa355b688

  • SSDEEP

    768:/b016GVRu1yK9fMnJG2V9dDClcxGqgt6jpYU5ltbDrYiI0oPxWExI:Te3SHuJV9Qaxo6jWWvr78Pxc

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 5 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1208
      • C:\Users\Admin\AppData\Local\Temp\4c097ef714de4e0ba7ddcbe7cd7b1eae8eec1c2597c15449b16ba3a80e10da61.exe
        "C:\Users\Admin\AppData\Local\Temp\4c097ef714de4e0ba7ddcbe7cd7b1eae8eec1c2597c15449b16ba3a80e10da61.exe"
        2⤵
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1680
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\$$a930C.bat
          3⤵
          • Deletes itself
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3028
          • C:\Users\Admin\AppData\Local\Temp\4c097ef714de4e0ba7ddcbe7cd7b1eae8eec1c2597c15449b16ba3a80e10da61.exe
            "C:\Users\Admin\AppData\Local\Temp\4c097ef714de4e0ba7ddcbe7cd7b1eae8eec1c2597c15449b16ba3a80e10da61.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:2848
            • C:\Windows\system32\WerFault.exe
              C:\Windows\system32\WerFault.exe -u -p 2848 -s 124
              5⤵
              • Loads dropped DLL
              PID:2732
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2336
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2696
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
              • System Location Discovery: System Language Discovery
              PID:2860

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

      Filesize

      254KB

      MD5

      921fc83c2208656c013a85865169346e

      SHA1

      7f886d05d016adde3346fe23bd35e12d52885e1c

      SHA256

      0d6759c38d4c270b3203ebd0de92161c34944e0fe837f2b58a23251fdd3e666f

      SHA512

      1fcef614784f4d7e7d89e6b29f08535afdf0a656b0a398926847dec43e6a7462cc195398105af560384fd6c13df770d3bf41aa84a618b56e056e109f99bf51b0

    • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

      Filesize

      474KB

      MD5

      45ba25b4e6fe57152a1966bdea786d3c

      SHA1

      b79b3a4f2d3b525688edf4b7818a400822834361

      SHA256

      d309f5130994c60441620daef072bc849b8a4e8af881f25946ecbe8761448834

      SHA512

      8ddb1e63c9454ae572f25d9353cafcffc238d5be3b6ddec87cefcf8280fcbaa3e7c59db2cff67a458c55bb0da9c07cee3c972f7ab18cee8dcbfcf3b5b1a5d699

    • C:\Users\Admin\AppData\Local\Temp\$$a930C.bat

      Filesize

      722B

      MD5

      1548b98f30e78e4c7f1b21e0beebcd9a

      SHA1

      454a3331a4be0f8be3070f71dc378ab5bcbff191

      SHA256

      c091386f6a14bc0854eeedd653163d60e4acfa3f5188892889451a2d7a515690

      SHA512

      ec0d4247eb668578caeefc52487b6b4829c7a1ce1850c3804c5a0efbb36f28d40ca3f2b834e32fe4c1f55186c398eaefc166a66e927b76a67b0118ba533679ba

    • C:\Users\Admin\AppData\Local\Temp\4c097ef714de4e0ba7ddcbe7cd7b1eae8eec1c2597c15449b16ba3a80e10da61.exe.exe

      Filesize

      23KB

      MD5

      3f9dbfee668294872ef01b90740b01d0

      SHA1

      99a4702b65485cd14736b1c2cdfb81b455dda01c

      SHA256

      40b32fea1fcadcb2db369475e2bba58b0b83f5c3bb647e2e63877726c35a9f86

      SHA512

      0113cec160d97ea0cce70860cc5b79b502d16191ee237a3abb84309499be193aa0127dbcb41fc05a90fa61484b061ec4332ad29a918db598e32fe832b74bd1e3

    • C:\Windows\Logo1_.exe

      Filesize

      29KB

      MD5

      b2a95470179dbfc67491209da01c3a73

      SHA1

      1f71702eab91e66d604b5e37508dc0997fb0cc18

      SHA256

      26f51b187a06a048a401aa37ad05f8d8ee31c47494ddecb6b665f2f8c56a888f

      SHA512

      7d3488eb2f0411b51b105aa304bc85ac1bb3c0baedc20255feb466ee457673f91cd3b4a2369b1302f39616ae9b1097d0bfe8ac885777e7d9a87f98fe07fdd0a4

    • F:\$RECYCLE.BIN\S-1-5-21-3290804112-2823094203-3137964600-1000\_desktop.ini

      Filesize

      8B

      MD5

      5d65d1288c9ecedfd5f28d17a01a30bc

      SHA1

      e5bb89b8ad5c73516abf7e3baeaf1855154381dc

      SHA256

      3501728ad227b52ce4d4f85ddd0e6d28dfa7acce977ae27f1e337be209825a5f

      SHA512

      6177ce001dd535382c3bae5e8c3cfda85d8d8b76b68bce10fa8e5e1e748fd1512a531ffc93fef1316f2c27d93b5b4a5b60a6391f0e131ccc5cc0a65c2755868e

    • memory/1208-33-0x00000000025A0000-0x00000000025A1000-memory.dmp

      Filesize

      4KB

    • memory/1680-0-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/1680-16-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/2336-21-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/2336-48-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/2336-94-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/2336-98-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/2336-101-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/2336-495-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/2336-1877-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/2336-42-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/2336-3337-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/2336-35-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB