Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    106s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/09/2024, 15:01

General

  • Target

    0e1d7b1bc93df70ebd41fb4b5a2ae0e85f519568786e352f1404a425b2ee3799.exe

  • Size

    26KB

  • MD5

    e207b9fe562e784a003de76c8985e4b0

  • SHA1

    a913efadc46fbea856276be5133f6e5f070cc582

  • SHA256

    0e1d7b1bc93df70ebd41fb4b5a2ae0e85f519568786e352f1404a425b2ee3799

  • SHA512

    8026fd862af1fdbb2486d05be17a2cd71bb54d6c6dc019ad8936aefbb1c601019486ad1e3b3b3b48820aa52da0fc06190f1a58c2292f4e898bc138a932538d32

  • SSDEEP

    768:t1ODKAaDMG8H92RwZNQSwcfymNBg+g61GoLvC:rfgLdQAQfcfymN

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3496
      • C:\Users\Admin\AppData\Local\Temp\0e1d7b1bc93df70ebd41fb4b5a2ae0e85f519568786e352f1404a425b2ee3799.exe
        "C:\Users\Admin\AppData\Local\Temp\0e1d7b1bc93df70ebd41fb4b5a2ae0e85f519568786e352f1404a425b2ee3799.exe"
        2⤵
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:4864
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3084
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            4⤵
            • System Location Discovery: System Language Discovery
            PID:4784

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleUpdateCore.exe

      Filesize

      244KB

      MD5

      c101fbd18e88122722036b2e366e9c51

      SHA1

      0b67b3ca71c212afab2259d198bf9510b71725cb

      SHA256

      209515464e58a67a65a06be221740a43dbb54adfbc55d629a8087796380f388b

      SHA512

      5c4561c56ad02ff968820cb00a2f7b119637971d141dc9ee2e7de805e1325dcfca8903e82a517d7f05ea1a69b044e45dde2f0b349cd83ec325d42606bf2b73f3

    • C:\Program Files\dotnet\dotnet.exe

      Filesize

      170KB

      MD5

      6a73a842894df7a135f8047c7ab29c46

      SHA1

      df2359f8682200009cfd541ec9c1cca797e49f5f

      SHA256

      d994fdd69262790f9eaf14353183e26b4d5d54d1497c5692b499861f3e61653b

      SHA512

      1a73c9415f997a1ac8f38f645212ba38bfed9591b06c25a0c0ae597cbb3172b85e0a12d132819a07ae63568d08c90894fc89c3edc3039ec42b7c7636ba9a52ce

    • C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe

      Filesize

      636KB

      MD5

      82168b5f40194e6e86457c2b534cfc21

      SHA1

      3e2702a384a03243e98ee6866e09f6d5df9b5de5

      SHA256

      c2f452c90356d0070c71ce17da69c4245dc24f46e1215eca22748567e48279d9

      SHA512

      6d041166b41e4608aa46b1724322a22d49e5d709f4b1bf89d2c6819282a813c88cd74ba6167f337d4d36a741ae53830b04e58e92fbfc597f85cd7f763284c774

    • F:\$RECYCLE.BIN\S-1-5-21-656926755-4116854191-210765258-1000\_desktop.ini

      Filesize

      9B

      MD5

      5412111268dd2c1fb1cf8697bfab9b6c

      SHA1

      16d0b289e83c74cb50a004edd7c5750ac706f321

      SHA256

      f3aa35be7048ddbf11fc581e5f9476745d75bcf097e121ba2915614e360a0cdc

      SHA512

      13fc5bf11faaf5471fde8a1bafdcc6d27521bad796e5e532c94d9c8232dd70088e70b6d5ac60c4c15d13e59926ac38e9a9e01b4dd4694a77d70bdd1ae7005ccf

    • memory/4864-12-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/4864-18-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/4864-22-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/4864-0-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/4864-528-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/4864-1219-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/4864-5-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/4864-4777-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/4864-5222-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB