Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows7_x64 -
resource
win7 -
submitted
09/07/2020, 18:33
Static task
static1
Behavioral task
behavioral1
Sample
svc.exe
Resource
win7
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
svc.exe
Resource
win10
0 signatures
0 seconds
General
-
Target
svc.exe
-
Size
470KB
-
MD5
05e4aeecf11a890bfc365ccce931065b
-
SHA1
e6c22b3242244cb8000df3b26529c5f24b76be57
-
SHA256
9ebc903ca6847352aaac87d7f904fe4009c4b7b7acc9b629e5610c0f04dac4ef
-
SHA512
9aafe634aae28c4523948b81eab725b80b7d47677552492c028e1e1308784d2ddfd431eff4c8a6702f7b7642fa33654b8136b4f72ee03446e1eec0cd6e416678
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1464 wrote to memory of 336 1464 svc.exe 24 PID 1464 wrote to memory of 336 1464 svc.exe 24 PID 1464 wrote to memory of 336 1464 svc.exe 24 PID 1464 wrote to memory of 336 1464 svc.exe 24 PID 1464 wrote to memory of 336 1464 svc.exe 24 PID 1464 wrote to memory of 336 1464 svc.exe 24 PID 1464 wrote to memory of 336 1464 svc.exe 24 PID 1228 wrote to memory of 1036 1228 Explorer.EXE 25 PID 1228 wrote to memory of 1036 1228 Explorer.EXE 25 PID 1228 wrote to memory of 1036 1228 Explorer.EXE 25 PID 1228 wrote to memory of 1036 1228 Explorer.EXE 25 PID 1036 wrote to memory of 732 1036 control.exe 26 PID 1036 wrote to memory of 732 1036 control.exe 26 PID 1036 wrote to memory of 732 1036 control.exe 26 PID 1036 wrote to memory of 732 1036 control.exe 26 -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 336 svc.exe 336 svc.exe 1036 control.exe 1036 control.exe 1036 control.exe 1036 control.exe 1036 control.exe 1036 control.exe 1036 control.exe 1036 control.exe 1036 control.exe 1036 control.exe 1036 control.exe 1036 control.exe 1036 control.exe 1036 control.exe 1036 control.exe 1036 control.exe 1036 control.exe 1036 control.exe 1036 control.exe 1036 control.exe 1036 control.exe 1036 control.exe -
Deletes itself 1 IoCs
pid Process 732 cmd.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 1228 Explorer.EXE 1228 Explorer.EXE 1228 Explorer.EXE 1228 Explorer.EXE -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Explorer.EXE -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1464 set thread context of 336 1464 svc.exe 24 PID 336 set thread context of 1228 336 svc.exe 20 PID 1036 set thread context of 1228 1036 control.exe 20 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 336 svc.exe Token: SeDebugPrivilege 1036 control.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 336 svc.exe 336 svc.exe 336 svc.exe 1036 control.exe 1036 control.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
pid Process 1228 Explorer.EXE 1228 Explorer.EXE 1228 Explorer.EXE 1228 Explorer.EXE 1228 Explorer.EXE
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of SendNotifyMessage
- Checks whether UAC is enabled
- Suspicious use of FindShellTrayWindow
PID:1228 -
C:\Users\Admin\AppData\Local\Temp\svc.exe"C:\Users\Admin\AppData\Local\Temp\svc.exe"2⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
PID:1464 -
C:\Users\Admin\AppData\Local\Temp\svc.exe"{path}"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: MapViewOfSection
PID:336
-
-
-
C:\Windows\SysWOW64\control.exe"C:\Windows\SysWOW64\control.exe"2⤵
- Suspicious use of WriteProcessMemory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: MapViewOfSection
PID:1036 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\svc.exe"3⤵
- Deletes itself
PID:732
-
-