Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/09/2024, 18:01

General

  • Target

    88dac7348311960b99e3bc957b60bd0dd69918dc10b29c2bfb8165598a409043.exe

  • Size

    662KB

  • MD5

    d3636521f0f525ed88f067d7849e253c

  • SHA1

    789f2e146a56831644746fe5fc4bd167fcb0a45d

  • SHA256

    88dac7348311960b99e3bc957b60bd0dd69918dc10b29c2bfb8165598a409043

  • SHA512

    71266e45df533732514ef54fb83cd957baef9ca71180ec379f3b2764239255f4ac152aebdae1fed7892f1af225f08db6f8081afbfb55343d0819354f29ee2dd9

  • SSDEEP

    6144:duJpC9LRU0ySj14WH+JPb7uL8zRMnJjNhAp7SO8zRMnJjNhAp7S8FRcdEKFVAh7f:RPFlTz

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3396
      • C:\Users\Admin\AppData\Local\Temp\88dac7348311960b99e3bc957b60bd0dd69918dc10b29c2bfb8165598a409043.exe
        "C:\Users\Admin\AppData\Local\Temp\88dac7348311960b99e3bc957b60bd0dd69918dc10b29c2bfb8165598a409043.exe"
        2⤵
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3680
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aC11D.bat
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4312
          • C:\Users\Admin\AppData\Local\Temp\88dac7348311960b99e3bc957b60bd0dd69918dc10b29c2bfb8165598a409043.exe
            "C:\Users\Admin\AppData\Local\Temp\88dac7348311960b99e3bc957b60bd0dd69918dc10b29c2bfb8165598a409043.exe"
            4⤵
            • Executes dropped EXE
            PID:3068
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:3460
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:3712
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
              • System Location Discovery: System Language Discovery
              PID:3352

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleUpdateCore.exe

      Filesize

      247KB

      MD5

      0ce7eae1dcb64cf24a6946cec13e0124

      SHA1

      cb3c64234c8d0a1cd90cc5e20195371cbdbe2f14

      SHA256

      9a18b51f5ddd8060f5fb54c010889d896f1c98b1d83d7ef4e39d8f1b613bbb99

      SHA512

      467dcf21dd19881e624de7c6851acd654dd32c6edd33f492d5016050578dbf3b422e8dcaf040924cd8367df0533728f90b88f13b2a3f59d97f615766c7332c97

    • C:\Program Files\7-Zip\7z.exe

      Filesize

      573KB

      MD5

      e8fd19650932bd690b562974f15a325f

      SHA1

      819e54beeb08d90d3470a95724ce2c666d9afc8d

      SHA256

      fc5f1dbc58af7ddab54816b0002514e2738fa5d5f9637ff5ca9cfc84c7813990

      SHA512

      44a44882e06efc7dcc0fe107e1b671da6462e05626853b566e6f23144d72122dd1ba4bc5e8275441b944479aaabe9f213fa4b6fe93c3d939582567461b831102

    • C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe

      Filesize

      639KB

      MD5

      c8d281da4c32df16eef470c27c8cb459

      SHA1

      00efc9f6844bfaa37c264b6452c6a7356638ab10

      SHA256

      058c81e5a07f2c6c33cf28dff71d07ad8f179046108d945159957e891bfd9c62

      SHA512

      e3c79e19f620068f668d4ebaa5097f1a95a30dabb8dce75f3787171dddbea9f684fc7ce8d1011a398f38084d7af96dd1ff9a02d25906aab9b13861b8363d24bb

    • C:\Users\Admin\AppData\Local\Temp\$$aC11D.bat

      Filesize

      722B

      MD5

      61641cf769f0f1c24e29e1ed0fff487d

      SHA1

      0890bed29d63383a77ca78c111e358286ed25f16

      SHA256

      5a192775b4354cb55f7ec2c8127b43a0523325a008ad0d9f22ae8d8d63626ed4

      SHA512

      66c5582cf381be19bcc8983fb31986b59933d9a959baf93287bfd00f64738958a611caf8f7d5d20cf5cef81c805da1e89b065c3495332426a4496bf3cf6f00ac

    • C:\Users\Admin\AppData\Local\Temp\88dac7348311960b99e3bc957b60bd0dd69918dc10b29c2bfb8165598a409043.exe.exe

      Filesize

      633KB

      MD5

      2e0d056ad62b6ef87a091003714fd512

      SHA1

      73150bddb5671c36413d9fbc94a668f132a2edc5

      SHA256

      cb83f04591cc1d602e650dd5c12f4470cf21b04328477bd6a52081f37c04bd7c

      SHA512

      b8e920f8b7547aec6f5771e3e6119b01157e5e36a92c67142b0d73ffe0d501d933581e1fc752e5bba9ce819e3897be9c146bebfc0018e91318b0c99d188a2580

    • C:\Windows\Logo1_.exe

      Filesize

      29KB

      MD5

      208452b7e09eaf8db2d52b273802185a

      SHA1

      566559b990e1c374db142c5da3037deb97bda61d

      SHA256

      7393c04c0a78bfdf128e728b94cb18c9f0056a9d3da6c4944368debbef68234e

      SHA512

      3880ac1f9ea1e4e510057764927e29497b95df2734fcda61e667e0a9164397874968a59853a60ec2bc52de97d98bd16253d0bf2474f855fd3805d19851d685ea

    • F:\$RECYCLE.BIN\S-1-5-21-786284298-625481688-3210388970-1000\_desktop.ini

      Filesize

      9B

      MD5

      e2a14c19421b289cbd51a76363b166bd

      SHA1

      5d0621d68da5a444f49c090b0725c7044d47fdb7

      SHA256

      844af243be560dc4e478aa7ea28f4959f9df45f204006bade7ae52398d651835

      SHA512

      8c49bec05605c4d2b8f07f00a7a39e70f5bd4f7c84ba221c615447f947053bf3bb0496c38e2bf8b15235c493cc5a0b41f34285fed1adb4c13572f25b67e178e5

    • memory/3460-27-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/3460-33-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/3460-37-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/3460-20-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/3460-665-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/3460-1234-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/3460-4785-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/3460-13-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/3460-5230-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/3680-0-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/3680-12-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB