Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
04/10/2022, 02:32
Static task
static1
Behavioral task
behavioral1
Sample
1303d3f143eb59b87228df0d289ec45ffbc473c4c5e8be539cbc95504413e65e.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
1303d3f143eb59b87228df0d289ec45ffbc473c4c5e8be539cbc95504413e65e.exe
Resource
win10v2004-20220901-en
General
-
Target
1303d3f143eb59b87228df0d289ec45ffbc473c4c5e8be539cbc95504413e65e.exe
-
Size
70KB
-
MD5
01510cfb2ae118995d96dcc34a1dc302
-
SHA1
cf59ca74ebe21640e3bcae6777c5980a4ff7506f
-
SHA256
1303d3f143eb59b87228df0d289ec45ffbc473c4c5e8be539cbc95504413e65e
-
SHA512
bf061ff431fd2565bf6f9bd522a90a8d096db3eecbcc15b4265719f73c4af06abe6ca744e0d8c540de48ecdba07b2e4e7db843af1ce22ac70dd65b0b1b9a6bff
-
SSDEEP
768:qW+SOHPfOxK2Xy9ojV3cKuAAAAAAA777v777BrZD0mihYiPZTK6zebY5AawLB:+xvfOdXemV3cq1D0mYxPxR3AawLB
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\skype.dat" svchost.exe -
resource yara_rule behavioral1/memory/948-56-0x0000000000400000-0x0000000000417000-memory.dmp upx behavioral1/memory/948-58-0x0000000000400000-0x0000000000417000-memory.dmp upx behavioral1/memory/948-59-0x0000000000400000-0x0000000000417000-memory.dmp upx behavioral1/memory/948-63-0x0000000000400000-0x0000000000417000-memory.dmp upx behavioral1/memory/948-65-0x0000000000400000-0x0000000000417000-memory.dmp upx behavioral1/memory/948-64-0x0000000000400000-0x0000000000417000-memory.dmp upx behavioral1/memory/948-66-0x0000000000400000-0x0000000000417000-memory.dmp upx behavioral1/memory/948-67-0x0000000000400000-0x0000000000417000-memory.dmp upx -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 948 1303d3f143eb59b87228df0d289ec45ffbc473c4c5e8be539cbc95504413e65e.exe 768 svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2028 set thread context of 948 2028 1303d3f143eb59b87228df0d289ec45ffbc473c4c5e8be539cbc95504413e65e.exe 27 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 768 svchost.exe 768 svchost.exe 768 svchost.exe 768 svchost.exe 768 svchost.exe 768 svchost.exe 768 svchost.exe 768 svchost.exe 768 svchost.exe 768 svchost.exe 768 svchost.exe 768 svchost.exe 768 svchost.exe 768 svchost.exe 768 svchost.exe 768 svchost.exe 768 svchost.exe 768 svchost.exe 768 svchost.exe 768 svchost.exe 768 svchost.exe 768 svchost.exe 768 svchost.exe 768 svchost.exe 768 svchost.exe 768 svchost.exe 768 svchost.exe 768 svchost.exe 768 svchost.exe 768 svchost.exe 768 svchost.exe 768 svchost.exe 768 svchost.exe 768 svchost.exe 768 svchost.exe 768 svchost.exe 768 svchost.exe 768 svchost.exe 768 svchost.exe 768 svchost.exe 768 svchost.exe 768 svchost.exe 768 svchost.exe 768 svchost.exe 768 svchost.exe 768 svchost.exe 768 svchost.exe 768 svchost.exe 768 svchost.exe 768 svchost.exe 768 svchost.exe 768 svchost.exe 768 svchost.exe 768 svchost.exe 768 svchost.exe 768 svchost.exe 768 svchost.exe 768 svchost.exe 768 svchost.exe 768 svchost.exe 768 svchost.exe 768 svchost.exe 768 svchost.exe 768 svchost.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 948 1303d3f143eb59b87228df0d289ec45ffbc473c4c5e8be539cbc95504413e65e.exe 948 1303d3f143eb59b87228df0d289ec45ffbc473c4c5e8be539cbc95504413e65e.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 296 ctfmon.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 768 svchost.exe 768 svchost.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2028 wrote to memory of 948 2028 1303d3f143eb59b87228df0d289ec45ffbc473c4c5e8be539cbc95504413e65e.exe 27 PID 2028 wrote to memory of 948 2028 1303d3f143eb59b87228df0d289ec45ffbc473c4c5e8be539cbc95504413e65e.exe 27 PID 2028 wrote to memory of 948 2028 1303d3f143eb59b87228df0d289ec45ffbc473c4c5e8be539cbc95504413e65e.exe 27 PID 2028 wrote to memory of 948 2028 1303d3f143eb59b87228df0d289ec45ffbc473c4c5e8be539cbc95504413e65e.exe 27 PID 2028 wrote to memory of 948 2028 1303d3f143eb59b87228df0d289ec45ffbc473c4c5e8be539cbc95504413e65e.exe 27 PID 2028 wrote to memory of 948 2028 1303d3f143eb59b87228df0d289ec45ffbc473c4c5e8be539cbc95504413e65e.exe 27 PID 2028 wrote to memory of 948 2028 1303d3f143eb59b87228df0d289ec45ffbc473c4c5e8be539cbc95504413e65e.exe 27 PID 2028 wrote to memory of 948 2028 1303d3f143eb59b87228df0d289ec45ffbc473c4c5e8be539cbc95504413e65e.exe 27 PID 768 wrote to memory of 296 768 svchost.exe 29 PID 768 wrote to memory of 296 768 svchost.exe 29 PID 768 wrote to memory of 296 768 svchost.exe 29 PID 768 wrote to memory of 296 768 svchost.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\1303d3f143eb59b87228df0d289ec45ffbc473c4c5e8be539cbc95504413e65e.exe"C:\Users\Admin\AppData\Local\Temp\1303d3f143eb59b87228df0d289ec45ffbc473c4c5e8be539cbc95504413e65e.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\1303d3f143eb59b87228df0d289ec45ffbc473c4c5e8be539cbc95504413e65e.exe"C:\Users\Admin\AppData\Local\Temp\1303d3f143eb59b87228df0d289ec45ffbc473c4c5e8be539cbc95504413e65e.exe"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: MapViewOfSection
PID:948
-
-
C:\Windows\syswow64\svchost.exe"C:\Windows\syswow64\svchost.exe"1⤵
- Modifies WinLogon for persistence
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Windows\SysWOW64\ctfmon.exectfmon.exe2⤵
- Suspicious use of FindShellTrayWindow
PID:296
-