Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
26/10/2022, 01:18
Static task
static1
Behavioral task
behavioral1
Sample
9cb054034c2521cc8b93cdfaee0de122672af303aafec24565aa7b3ef599fc29.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
9cb054034c2521cc8b93cdfaee0de122672af303aafec24565aa7b3ef599fc29.exe
Resource
win10v2004-20220812-en
General
-
Target
9cb054034c2521cc8b93cdfaee0de122672af303aafec24565aa7b3ef599fc29.exe
-
Size
1.0MB
-
MD5
0f2505b4e2152e859332b9606396099b
-
SHA1
0c31cea8f55d46b278a128c3429f88171f5b5d13
-
SHA256
9cb054034c2521cc8b93cdfaee0de122672af303aafec24565aa7b3ef599fc29
-
SHA512
9f8c105e6fad955b04d59d94c2ed237e5978b9fb0c2be32dfe3c40e8ee7cba4d62d41ee5394531eade957ad3a8839e14a5ebeb0e42d440181c1335e8d3e5eecf
-
SSDEEP
24576:PmUNJyJqb1FcMap2ATT5kmUNJyJqb1FcMap2ATT5kmUNJyJqb1FcMap2ATT5:PmV2ApkmV2ApkmV2Ap
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 4700 svchost.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\344fa469 = "C\x1f'ùÜ\vñ*)î\x01'¦]\x18:/\x03MGóãV\x05¢6¹\x10›ý¨µ>í@0Ø(\u009d6¦¥\u00a0]˜•îeN\r\x0evYQ;MNm5;C-\u009díYý¶=>\x05\u00a0àxå&½`…æð%í\u0090öž˜\x11\x15Æí\x0eU]Eenm6í\x05#Em\u00ad\rÅ\x18\x1dÞ\x1d³\x0e–m½þý\u009dVë>8žEvf–\u00a0æ&ëÓeK\x01¡½Q^&\rÛ…\x165\u00ad°Ý\u00ad\v\u00ad.õ]>½ÐÓÍHuèË%öU\u008d!í.MS=3\u009dN½íé5»Y•‘v“\x18VËE\t\u009d" 9cb054034c2521cc8b93cdfaee0de122672af303aafec24565aa7b3ef599fc29.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\344fa469 = "C\x1f'ùÜ\vñ*)î\x01'¦]\x18:/\x03MGóãV\x05¢6¹\x10›ý¨µ>í@0Ø(\u009d6¦¥\u00a0]˜•îeN\r\x0evYQ;MNm5;C-\u009díYý¶=>\x05\u00a0àxå&½`…æð%í\u0090öž˜\x11\x15Æí\x0eU]Eenm6í\x05#Em\u00ad\rÅ\x18\x1dÞ\x1d³\x0e–m½þý\u009dVë>8žEvf–\u00a0æ&ëÓeK\x01¡½Q^&\rÛ…\x165\u00ad°Ý\u00ad\v\u00ad.õ]>½ÐÓÍHuèË%öU\u008d!í.MS=3\u009dN½íé5»Y•‘v“\x18VËE\t\u009d" svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe 9cb054034c2521cc8b93cdfaee0de122672af303aafec24565aa7b3ef599fc29.exe File opened for modification C:\Windows\apppatch\svchost.exe 9cb054034c2521cc8b93cdfaee0de122672af303aafec24565aa7b3ef599fc29.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3420 9cb054034c2521cc8b93cdfaee0de122672af303aafec24565aa7b3ef599fc29.exe 3420 9cb054034c2521cc8b93cdfaee0de122672af303aafec24565aa7b3ef599fc29.exe 3420 9cb054034c2521cc8b93cdfaee0de122672af303aafec24565aa7b3ef599fc29.exe 3420 9cb054034c2521cc8b93cdfaee0de122672af303aafec24565aa7b3ef599fc29.exe 3420 9cb054034c2521cc8b93cdfaee0de122672af303aafec24565aa7b3ef599fc29.exe 3420 9cb054034c2521cc8b93cdfaee0de122672af303aafec24565aa7b3ef599fc29.exe 3420 9cb054034c2521cc8b93cdfaee0de122672af303aafec24565aa7b3ef599fc29.exe 3420 9cb054034c2521cc8b93cdfaee0de122672af303aafec24565aa7b3ef599fc29.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3420 9cb054034c2521cc8b93cdfaee0de122672af303aafec24565aa7b3ef599fc29.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3420 wrote to memory of 4700 3420 9cb054034c2521cc8b93cdfaee0de122672af303aafec24565aa7b3ef599fc29.exe 81 PID 3420 wrote to memory of 4700 3420 9cb054034c2521cc8b93cdfaee0de122672af303aafec24565aa7b3ef599fc29.exe 81 PID 3420 wrote to memory of 4700 3420 9cb054034c2521cc8b93cdfaee0de122672af303aafec24565aa7b3ef599fc29.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\9cb054034c2521cc8b93cdfaee0de122672af303aafec24565aa7b3ef599fc29.exe"C:\Users\Admin\AppData\Local\Temp\9cb054034c2521cc8b93cdfaee0de122672af303aafec24565aa7b3ef599fc29.exe"1⤵
- Modifies WinLogon
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:3420 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- Suspicious behavior: EnumeratesProcesses
PID:4700
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD517d74ad3d174654d7f7c1a1cc53cecfe
SHA13a53989620a7aaa8ec02f80c1d9880407fd6c2d4
SHA256f5b4ce933f91d6cff55e87fcfe4ba79b68307c53342728113aedcc43a6fe2477
SHA51271aaf654370b16e1ffd21ae8ddcb8487c2be63a04177df728bc1ec5b0c0a04909d4c1267b1ede064750551bcbb84f89ca3add288890cafef6753e816db607a9d
-
Filesize
1.0MB
MD517d74ad3d174654d7f7c1a1cc53cecfe
SHA13a53989620a7aaa8ec02f80c1d9880407fd6c2d4
SHA256f5b4ce933f91d6cff55e87fcfe4ba79b68307c53342728113aedcc43a6fe2477
SHA51271aaf654370b16e1ffd21ae8ddcb8487c2be63a04177df728bc1ec5b0c0a04909d4c1267b1ede064750551bcbb84f89ca3add288890cafef6753e816db607a9d