Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    25/09/2024, 17:51

General

  • Target

    a9f241143fd476d42bed70ab3fb7dfb31fda59ceaec2eca9dabe136fb432adb1.exe

  • Size

    66KB

  • MD5

    9a769a66705076525660d751ac973f10

  • SHA1

    84c2e6fcc5e44a94a3c70e72d3c58476ef8fe344

  • SHA256

    a9f241143fd476d42bed70ab3fb7dfb31fda59ceaec2eca9dabe136fb432adb1

  • SHA512

    e105b5ecb8864e34c573a2696c2a3653c84e2225430e4bcbdc92da6106c1550171dc782097c45c07784526015970a937d8591cd2fd78db735aab6e8177ae0a9d

  • SSDEEP

    1536:JEaYzMXqtGN/CstC9qVFuiS4qz0XSW3iDhy3:JEaY46tGNFC0VFPS4qz3DhO

Malware Config

Signatures

  • Drops file in Drivers directory 2 IoCs
  • Deletes itself 1 IoCs
  • Drops startup file 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 43 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1196
      • C:\Users\Admin\AppData\Local\Temp\a9f241143fd476d42bed70ab3fb7dfb31fda59ceaec2eca9dabe136fb432adb1.exe
        "C:\Users\Admin\AppData\Local\Temp\a9f241143fd476d42bed70ab3fb7dfb31fda59ceaec2eca9dabe136fb432adb1.exe"
        2⤵
        • Drops file in Drivers directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2520
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1720
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            4⤵
            • System Location Discovery: System Language Discovery
            PID:1972
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\$$a9A3D.bat
          3⤵
          • Deletes itself
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2376
          • C:\Users\Admin\AppData\Local\Temp\a9f241143fd476d42bed70ab3fb7dfb31fda59ceaec2eca9dabe136fb432adb1.exe
            "C:\Users\Admin\AppData\Local\Temp\a9f241143fd476d42bed70ab3fb7dfb31fda59ceaec2eca9dabe136fb432adb1.exe"
            4⤵
            • Executes dropped EXE
            PID:2808
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Drops file in Drivers directory
          • Drops startup file
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2688
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2712
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
              • System Location Discovery: System Language Discovery
              PID:2892
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2932
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
              • System Location Discovery: System Language Discovery
              PID:2280

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

      Filesize

      258KB

      MD5

      5e7a367c344024963b61ee3bbdb92e9d

      SHA1

      af64550db27d9905bf6451fc94c37d5205ec23ba

      SHA256

      0ab7c4fd1c417e3eec1ad697ee9024ce81e6a36d408139d1dbf29002085f9445

      SHA512

      4abcfc3afe54176e493f162b8e6d194ae1a74d05569939d9c7f49bb717a6f39c71355dc2d884454ad0a9102797c0e86e99a86500fc707aee89fc8d9c172b4daf

    • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

      Filesize

      478KB

      MD5

      e3d7f6cbc53a96972587f05acd5c0ca0

      SHA1

      e12f124807a30188da6157d4423775373c668dd8

      SHA256

      75db003d5fe6855e432e4ccaf8720890f181c3dc9d800b253508aebabfde2da8

      SHA512

      ea783b525ebf1fa786d06051e64c72efa9665aaaa0e456c99c3fb80298066491da47d9056f7046d35d4bb3165ac2ca85eac9c9a9331923dbf56937831a9bc078

    • C:\Users\Admin\AppData\Local\Temp\$$a9A3D.bat

      Filesize

      722B

      MD5

      c070ecbd5a93558eedf2746f5e67810c

      SHA1

      985c6416d779f4d8c69e8443ff47a9be5e3ac1e7

      SHA256

      2c4e8a5e176dc6f3c4cd9db9fd4061280d10bad2446843a3ab2d6f068ff60794

      SHA512

      4c0bbeeb725efc64a0f7c48b1099a5e62b7f915dd3b3bcdfd326da6ce6386531692adad5be2c79e2848001442a4b11c23fbfa598c87756c338730799ac9f9eed

    • C:\Users\Admin\AppData\Local\Temp\a9f241143fd476d42bed70ab3fb7dfb31fda59ceaec2eca9dabe136fb432adb1.exe.exe

      Filesize

      33KB

      MD5

      e23f654ce94c5fea4bc1d10bac9e1705

      SHA1

      8bf96eb96181339a2c0f261768045546503d7545

      SHA256

      74d75e8cd9f52cd9b294bd8203d21c83009824890811174af2601795a2bffe6c

      SHA512

      c9021cec17d19bfea97d6c038747f6c0a387934d3700e058b4ffad41f9d4805771c52739c5f9efdf69db099a52fc48040e7fed692acbea0398b3ffe843f9fce6

    • C:\Windows\Logo1_.exe

      Filesize

      33KB

      MD5

      59da86273cbde98e3fb6274e3181834b

      SHA1

      24b2e7d415d7f4e40ec6420f0e88cb401165b64a

      SHA256

      853e0659e3f3c5fd81de6edcebb97b388b0006f7c78b514cd2aa93aa1d97f724

      SHA512

      3534114ac7de80b2f6c5794109a7f89386b86df095799844353530384f113e63bffa6a85f445f5c1a825d45740631b95c80a0612d8a2a1964469207df6615f41

    • C:\Windows\system32\drivers\etc\hosts

      Filesize

      832B

      MD5

      7e3a0edd0c6cd8316f4b6c159d5167a1

      SHA1

      753428b4736ffb2c9e3eb50f89255b212768c55a

      SHA256

      1965854dfa54c72529c88c7d9f41fa31b4140cad04cf03d3f0f2e7601fcbdc6c

      SHA512

      9c68f7f72dfa109fcfba6472a1cced85bc6c2a5481232c6d1d039c88b2f65fb86070aeb26ac23e420c6255daca02ea6e698892f7670298d2c4f741b9e9415c7f

    • F:\$RECYCLE.BIN\S-1-5-21-1506706701-1246725540-2219210854-1000\_desktop.ini

      Filesize

      9B

      MD5

      e02899454c67c7d6d1af854fdcb53b67

      SHA1

      26fb213f7c299c2a4d8c4afd234ee0b751d7a30e

      SHA256

      0e67e90646d3ba7b46f935b205c9f89e8bff2dca7aeda3cd5dfb93868b262315

      SHA512

      e1519bebf62ab4cb28e630a201312812e04f815ec0663f7b68b478da97c0bf7c7c2238a8632540d3d1f37acbe83919fb198b39ebeb222c19faa2130ab65ffffa

    • memory/1196-31-0x0000000002E40000-0x0000000002E41000-memory.dmp

      Filesize

      4KB

    • memory/2520-17-0x0000000000230000-0x000000000026E000-memory.dmp

      Filesize

      248KB

    • memory/2520-16-0x0000000000230000-0x000000000026E000-memory.dmp

      Filesize

      248KB

    • memory/2520-0-0x0000000000400000-0x000000000043E000-memory.dmp

      Filesize

      248KB

    • memory/2520-21-0x0000000000400000-0x000000000043E000-memory.dmp

      Filesize

      248KB

    • memory/2688-35-0x0000000000400000-0x000000000043E000-memory.dmp

      Filesize

      248KB

    • memory/2688-20-0x0000000000400000-0x000000000043E000-memory.dmp

      Filesize

      248KB

    • memory/2688-2964-0x0000000000400000-0x000000000043E000-memory.dmp

      Filesize

      248KB

    • memory/2688-4154-0x0000000000400000-0x000000000043E000-memory.dmp

      Filesize

      248KB