Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/10/2024, 07:29

General

  • Target

    96ede9e65af50e0473209a2b77ebe5ac5b474b333fa27329f77737686ee26d85.exe

  • Size

    959KB

  • MD5

    608071c3294ce3da4277e1cbe9d94fc4

  • SHA1

    b4e35bf3a1570cdf4d79218f30cd90cbf669c322

  • SHA256

    96ede9e65af50e0473209a2b77ebe5ac5b474b333fa27329f77737686ee26d85

  • SHA512

    8bc3d3375e484c168c2ded176b98ee035a2539c738cc3cdea5e66cf3c9e03bb3572af1193cb44d077737bb243198a2ee3411dee7e0fc9dceca4f113e9fdebb38

  • SSDEEP

    12288:3ORKcv8Nh7py6Rmi78gkPH3aPI9vyVg/0paQuj3IdD02fKBjtp/:3nBpDRmi78gkPXlyo0G/jr

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3448
      • C:\Users\Admin\AppData\Local\Temp\96ede9e65af50e0473209a2b77ebe5ac5b474b333fa27329f77737686ee26d85.exe
        "C:\Users\Admin\AppData\Local\Temp\96ede9e65af50e0473209a2b77ebe5ac5b474b333fa27329f77737686ee26d85.exe"
        2⤵
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4892
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a7203.bat
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1624
          • C:\Users\Admin\AppData\Local\Temp\96ede9e65af50e0473209a2b77ebe5ac5b474b333fa27329f77737686ee26d85.exe
            "C:\Users\Admin\AppData\Local\Temp\96ede9e65af50e0473209a2b77ebe5ac5b474b333fa27329f77737686ee26d85.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:1092
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1168
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:4992
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
              • System Location Discovery: System Language Discovery
              PID:2920

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleUpdateCore.exe

      Filesize

      247KB

      MD5

      8845860bb153dd270fd36ca50429238f

      SHA1

      cc72e9beab3adce9ba9fb3099ae6c175395046c1

      SHA256

      32c8eb49aee96e88e3292d95701dd62d43eac3f0e4d76543409bba181fee337e

      SHA512

      7def238255fe2a9a92bb2c8693ae97a039213c0590e12adbee3654c606aa9437576233e0aeeeb2cc4263c27ea9734a0272f66eccff35ead29dfd0fbb1107c12a

    • C:\Program Files\7-Zip\7z.exe

      Filesize

      573KB

      MD5

      57f09b2c9a1e298910d6641a4a9a2426

      SHA1

      e12ff7783a9a27c164ed39cca4de7ec021cc1ed1

      SHA256

      1988dfaab4c70759dc639e21f1986a83231001d6c258dcc9eaa08e21a0081717

      SHA512

      a5cbddb05ffcf7639a0236266d5958b25ba8b873327d450fadfd7cc509efbebbaf4651fbb6d2748b156c6ba7a006bb114e214e6633f1f6d6ddc7120897f9da6c

    • C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe

      Filesize

      639KB

      MD5

      61ea217073e3ba1234e6ffd55fcca224

      SHA1

      faf788aac4704dadc6ce9da5df1b84bc60c194b9

      SHA256

      7b6d68801aef5d8d223bdef5306dcfd26e14afe1fa8d93f11e0fc706459ae555

      SHA512

      20017c29780cc30f34efc3114427fca6683c248c33d64b79206d7a040a2cce30c8b9b414554464c7b12b49b42fbdbcf561886aa29f8eade18c3d8df75f375515

    • C:\Users\Admin\AppData\Local\Temp\$$a7203.bat

      Filesize

      722B

      MD5

      d997f5f0809c37b7206da542dd969ea3

      SHA1

      bd862f4cc6e14748c1db5ad24df8ada17c7cb412

      SHA256

      a5f8b724c6af0b8fe8e7e5fbdccd94bab8c378e282cbab9f9e00a80ade387756

      SHA512

      f15c56b9a9f99eeea549d05eeb65354dea4aa4ca73f8ec8c5d0b9421a4ae5a013e6fae722022711109db6f2ad370ff60c69f5fd6d13df105ef895ec47d436fa6

    • C:\Users\Admin\AppData\Local\Temp\96ede9e65af50e0473209a2b77ebe5ac5b474b333fa27329f77737686ee26d85.exe.exe

      Filesize

      930KB

      MD5

      30ac0b832d75598fb3ec37b6f2a8c86a

      SHA1

      6f47dbfd6ff36df7ba581a4cef024da527dc3046

      SHA256

      1ea0839c8dc95ad2c060af7d042c40c0daed58ce8e4524c0fba12fd73e4afb74

      SHA512

      505870601a4389b7ed2c8fecf85835adfd2944cbc10801f74bc4e08f5a0d6ecc9a52052fc37e216304cd1655129021862294a698ed36b3b43d428698f7263057

    • C:\Windows\Logo1_.exe

      Filesize

      29KB

      MD5

      f1a5c230c008ac88544a42f70081f862

      SHA1

      af50bd6dcdf02c312e569fc861a02befd5f1d501

      SHA256

      4fb055be2b07ebeff596af014fc33d044e97e60da0964c22150d84494d09a332

      SHA512

      f7ebb84dbba01c02b1f25f7ac77988d128c93545f9f600f92463f7a2f9e293d4e15cf8bb6ebd0200921e244978f4c9ea86e2924dfef710e33219e2c35d1e0518

    • F:\$RECYCLE.BIN\S-1-5-21-4050598569-1597076380-177084960-1000\_desktop.ini

      Filesize

      10B

      MD5

      52a225cec34530c05c340f9ae894aa31

      SHA1

      d6553bc25b5bc40447184e9dd520dd7c88f5c2aa

      SHA256

      bddf98f152ff77575c277b91c8f7aa5f69973cd3bfe7aa55ebe61b7d3df17fab

      SHA512

      726f8a96e3dab9ec548bda81a01dc3e0d93afa2363c76c4bf639de4b0471f8a43a8e32e90b230b95639e82b7daa8da3e8d9c848755e2b58398aa48e46e5ba5b5

    • memory/1168-27-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/1168-33-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/1168-37-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/1168-20-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/1168-572-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/1168-1234-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/1168-4785-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/1168-10-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/1168-5258-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/4892-0-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/4892-9-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB