Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02/10/2022, 15:03
Static task
static1
Behavioral task
behavioral1
Sample
819b421a8a091a0188468672824fe5383be7ef8f4336b0a92916ca7a129adb32.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
819b421a8a091a0188468672824fe5383be7ef8f4336b0a92916ca7a129adb32.exe
Resource
win10v2004-20220812-en
General
-
Target
819b421a8a091a0188468672824fe5383be7ef8f4336b0a92916ca7a129adb32.exe
-
Size
230KB
-
MD5
65c87fa0b7c308fff3e155b328b1690a
-
SHA1
4e84175dd432f24a9ed67cdd0a3ddf6612d96394
-
SHA256
819b421a8a091a0188468672824fe5383be7ef8f4336b0a92916ca7a129adb32
-
SHA512
a4647eff5f43f0d1f0955f12fa0e3bd5c61f5cfb510e0e2c886392564c24811871838236bb28e85d6d4bd6026e1f350e7bc987f57677140716ecde1049ab05a1
-
SSDEEP
3072:TIMa5VPdnLAWeBIg5Si2mVvu3TRENKWH3xPALAiyEv7p5qyt/s7niwK/f+JuKtkk:GDAWw5NV4EBXWAIT/nw08xTm3E
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 1284 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 2016 819b421a8a091a0188468672824fe5383be7ef8f4336b0a92916ca7a129adb32.exe 2016 819b421a8a091a0188468672824fe5383be7ef8f4336b0a92916ca7a129adb32.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\d30d2276 = "EÖ}\vž\u0081Ûž\x1eÅ&\x18„¢·£kBz+Ìz‘|XB\x15\x17÷OœOÞ„\"äO§ñ²\x19'ZŽZÌ×\"^”é!ÿ§§/¢\x0eQ׉—‚ªÏÚŸWÿìÖšo÷‡\\j\x19_÷ŸOQºr'w_4‚\x14?GçZgº\x12g\x19OdÑ:\x02Zô‘‡—T\x1a\x11/bÇâÚª©ÔÿÇG‘NÉ,'&Ä?©\x19g\x19×·\"Ž9≆ïŸÇ§y?§².ŠZ\x17\x0f\aI§êÖ²úúšÏ\x11™\x17b1”Ê?\u008f\"*TB$‘IaGªRAï\n7¹¿¦‘„\x1a²ìIª\t\x06š:ÇWÏW1סVY²\x19¼‚âÔùçFgG\nŸÔ\x0eÎ÷Gw\x7fF|º¾Bì¹JJQ¦\x0e±ê6ji\x11šJ·ê×69Z" 819b421a8a091a0188468672824fe5383be7ef8f4336b0a92916ca7a129adb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\d30d2276 = "EÖ}\vž\u0081Ûž\x1eÅ&\x18„¢·£kBz+Ìz‘|XB\x15\x17÷OœOÞ„\"äO§ñ²\x19'ZŽZÌ×\"^”é!ÿ§§/¢\x0eQ׉—‚ªÏÚŸWÿìÖšo÷‡\\j\x19_÷ŸOQºr'w_4‚\x14?GçZgº\x12g\x19OdÑ:\x02Zô‘‡—T\x1a\x11/bÇâÚª©ÔÿÇG‘NÉ,'&Ä?©\x19g\x19×·\"Ž9≆ïŸÇ§y?§².ŠZ\x17\x0f\aI§êÖ²úúšÏ\x11™\x17b1”Ê?\u008f\"*TB$‘IaGªRAï\n7¹¿¦‘„\x1a²ìIª\t\x06š:ÇWÏW1סVY²\x19¼‚âÔùçFgG\nŸÔ\x0eÎ÷Gw\x7fF|º¾Bì¹JJQ¦\x0e±ê6ji\x11šJ·ê×69Z" svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe 819b421a8a091a0188468672824fe5383be7ef8f4336b0a92916ca7a129adb32.exe File opened for modification C:\Windows\apppatch\svchost.exe 819b421a8a091a0188468672824fe5383be7ef8f4336b0a92916ca7a129adb32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2016 819b421a8a091a0188468672824fe5383be7ef8f4336b0a92916ca7a129adb32.exe 2016 819b421a8a091a0188468672824fe5383be7ef8f4336b0a92916ca7a129adb32.exe 2016 819b421a8a091a0188468672824fe5383be7ef8f4336b0a92916ca7a129adb32.exe 2016 819b421a8a091a0188468672824fe5383be7ef8f4336b0a92916ca7a129adb32.exe 1284 svchost.exe 1284 svchost.exe 1284 svchost.exe 1284 svchost.exe 1284 svchost.exe 1284 svchost.exe 1284 svchost.exe 1284 svchost.exe 1284 svchost.exe 1284 svchost.exe 1284 svchost.exe 1284 svchost.exe 1284 svchost.exe 1284 svchost.exe 1284 svchost.exe 1284 svchost.exe 1284 svchost.exe 1284 svchost.exe 1284 svchost.exe 1284 svchost.exe 1284 svchost.exe 1284 svchost.exe 1284 svchost.exe 1284 svchost.exe 1284 svchost.exe 1284 svchost.exe 1284 svchost.exe 1284 svchost.exe 1284 svchost.exe 1284 svchost.exe 1284 svchost.exe 1284 svchost.exe 1284 svchost.exe 1284 svchost.exe 1284 svchost.exe 1284 svchost.exe 1284 svchost.exe 1284 svchost.exe 1284 svchost.exe 1284 svchost.exe 1284 svchost.exe 1284 svchost.exe 1284 svchost.exe 1284 svchost.exe 1284 svchost.exe 1284 svchost.exe 1284 svchost.exe 1284 svchost.exe 1284 svchost.exe 1284 svchost.exe 1284 svchost.exe 1284 svchost.exe 1284 svchost.exe 1284 svchost.exe 1284 svchost.exe 1284 svchost.exe 1284 svchost.exe 1284 svchost.exe 1284 svchost.exe 1284 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2016 819b421a8a091a0188468672824fe5383be7ef8f4336b0a92916ca7a129adb32.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2016 wrote to memory of 1284 2016 819b421a8a091a0188468672824fe5383be7ef8f4336b0a92916ca7a129adb32.exe 27 PID 2016 wrote to memory of 1284 2016 819b421a8a091a0188468672824fe5383be7ef8f4336b0a92916ca7a129adb32.exe 27 PID 2016 wrote to memory of 1284 2016 819b421a8a091a0188468672824fe5383be7ef8f4336b0a92916ca7a129adb32.exe 27 PID 2016 wrote to memory of 1284 2016 819b421a8a091a0188468672824fe5383be7ef8f4336b0a92916ca7a129adb32.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\819b421a8a091a0188468672824fe5383be7ef8f4336b0a92916ca7a129adb32.exe"C:\Users\Admin\AppData\Local\Temp\819b421a8a091a0188468672824fe5383be7ef8f4336b0a92916ca7a129adb32.exe"1⤵
- Loads dropped DLL
- Modifies WinLogon
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- Suspicious behavior: EnumeratesProcesses
PID:1284
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
230KB
MD509569cf1886d3639f8771aea9fdeb91f
SHA1657066081b67792f0d66f85b30165d75d80e4796
SHA2566f2c2972a06e5000164560ce736a639a6d5ec1f37ed2ca52f0483eef73440571
SHA512c20e569a70fa22113a86b8fe9ef917a9fcb283f0b0594683f2ad9ff8f5dadceaa0bc0239ea748c3b1dd173b091d694ae70760d6fe6a2a2d6a354237fc12ca797
-
Filesize
230KB
MD509569cf1886d3639f8771aea9fdeb91f
SHA1657066081b67792f0d66f85b30165d75d80e4796
SHA2566f2c2972a06e5000164560ce736a639a6d5ec1f37ed2ca52f0483eef73440571
SHA512c20e569a70fa22113a86b8fe9ef917a9fcb283f0b0594683f2ad9ff8f5dadceaa0bc0239ea748c3b1dd173b091d694ae70760d6fe6a2a2d6a354237fc12ca797
-
Filesize
230KB
MD509569cf1886d3639f8771aea9fdeb91f
SHA1657066081b67792f0d66f85b30165d75d80e4796
SHA2566f2c2972a06e5000164560ce736a639a6d5ec1f37ed2ca52f0483eef73440571
SHA512c20e569a70fa22113a86b8fe9ef917a9fcb283f0b0594683f2ad9ff8f5dadceaa0bc0239ea748c3b1dd173b091d694ae70760d6fe6a2a2d6a354237fc12ca797
-
Filesize
230KB
MD509569cf1886d3639f8771aea9fdeb91f
SHA1657066081b67792f0d66f85b30165d75d80e4796
SHA2566f2c2972a06e5000164560ce736a639a6d5ec1f37ed2ca52f0483eef73440571
SHA512c20e569a70fa22113a86b8fe9ef917a9fcb283f0b0594683f2ad9ff8f5dadceaa0bc0239ea748c3b1dd173b091d694ae70760d6fe6a2a2d6a354237fc12ca797