Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
126s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
21/11/2022, 14:57
Static task
static1
Behavioral task
behavioral1
Sample
c76d02f2c67ed3181153acbcd72cd3e59ad022b990918a5a0099624bdbc95b1d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c76d02f2c67ed3181153acbcd72cd3e59ad022b990918a5a0099624bdbc95b1d.exe
Resource
win10v2004-20221111-en
General
-
Target
c76d02f2c67ed3181153acbcd72cd3e59ad022b990918a5a0099624bdbc95b1d.exe
-
Size
208KB
-
MD5
2246e84fd55fca789020deb084663d7c
-
SHA1
fa29765b1c92c36d721650f4ee7f37ac3360d146
-
SHA256
c76d02f2c67ed3181153acbcd72cd3e59ad022b990918a5a0099624bdbc95b1d
-
SHA512
97b77a3608bad82997a549dffdc7207da035ede84310e7b504b5ea6f0ea49dfe97f11c6ca91f8f144e5409569c759cbf8128c1b8d7dce4e75ff42ceb5e30b22e
-
SSDEEP
1536:Tc+KQVgd54v2vYEJtFG7gm7fxtS5Yui554vTgzQv:TcLL79vZJhqtkY5Pdzq
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1676 SVCH0ST.exe -
Deletes itself 1 IoCs
pid Process 1244 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 1792 c76d02f2c67ed3181153acbcd72cd3e59ad022b990918a5a0099624bdbc95b1d.exe 1792 c76d02f2c67ed3181153acbcd72cd3e59ad022b990918a5a0099624bdbc95b1d.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run SVCH0ST.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\AutoKill = "C:\\windows\\system\\SVCH0ST.exe" SVCH0ST.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\windows\system\HJonny.bat c76d02f2c67ed3181153acbcd72cd3e59ad022b990918a5a0099624bdbc95b1d.exe File opened for modification C:\windows\system\SVCH0ST.exe SVCH0ST.exe File created C:\windows\system\SVCH0ST.exe c76d02f2c67ed3181153acbcd72cd3e59ad022b990918a5a0099624bdbc95b1d.exe File opened for modification C:\windows\system\SVCH0ST.exe c76d02f2c67ed3181153acbcd72cd3e59ad022b990918a5a0099624bdbc95b1d.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2044 PING.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1792 c76d02f2c67ed3181153acbcd72cd3e59ad022b990918a5a0099624bdbc95b1d.exe 1676 SVCH0ST.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1792 wrote to memory of 1676 1792 c76d02f2c67ed3181153acbcd72cd3e59ad022b990918a5a0099624bdbc95b1d.exe 28 PID 1792 wrote to memory of 1676 1792 c76d02f2c67ed3181153acbcd72cd3e59ad022b990918a5a0099624bdbc95b1d.exe 28 PID 1792 wrote to memory of 1676 1792 c76d02f2c67ed3181153acbcd72cd3e59ad022b990918a5a0099624bdbc95b1d.exe 28 PID 1792 wrote to memory of 1676 1792 c76d02f2c67ed3181153acbcd72cd3e59ad022b990918a5a0099624bdbc95b1d.exe 28 PID 1676 wrote to memory of 1244 1676 SVCH0ST.exe 29 PID 1676 wrote to memory of 1244 1676 SVCH0ST.exe 29 PID 1676 wrote to memory of 1244 1676 SVCH0ST.exe 29 PID 1676 wrote to memory of 1244 1676 SVCH0ST.exe 29 PID 1244 wrote to memory of 2044 1244 cmd.exe 31 PID 1244 wrote to memory of 2044 1244 cmd.exe 31 PID 1244 wrote to memory of 2044 1244 cmd.exe 31 PID 1244 wrote to memory of 2044 1244 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\c76d02f2c67ed3181153acbcd72cd3e59ad022b990918a5a0099624bdbc95b1d.exe"C:\Users\Admin\AppData\Local\Temp\c76d02f2c67ed3181153acbcd72cd3e59ad022b990918a5a0099624bdbc95b1d.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\windows\system\SVCH0ST.exeC:\windows\system\SVCH0ST.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\SysWOW64\cmd.execmd /c C:\windows\system\HJonny.bat3⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.14⤵
- Runs ping.exe
PID:2044
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
208KB
MD52246e84fd55fca789020deb084663d7c
SHA1fa29765b1c92c36d721650f4ee7f37ac3360d146
SHA256c76d02f2c67ed3181153acbcd72cd3e59ad022b990918a5a0099624bdbc95b1d
SHA51297b77a3608bad82997a549dffdc7207da035ede84310e7b504b5ea6f0ea49dfe97f11c6ca91f8f144e5409569c759cbf8128c1b8d7dce4e75ff42ceb5e30b22e
-
Filesize
148B
MD5ec98dfc30186a237077ae0b735084c87
SHA15ffd60221fb4bd3ca2cb76b784fe0854f3464f5d
SHA25663fe6ae7da94f15e4a81b4deb54742f9349e399b9e8e13feeddbd335b4ea3c3e
SHA5121e087ae7885b6185763717cf6aeb357f3eb4096aadf941060b714b8b40838ae703b44c405888433c993c3bd1c5b66a93c7265052ab883b4750ce6d7eee36177a
-
Filesize
208KB
MD52246e84fd55fca789020deb084663d7c
SHA1fa29765b1c92c36d721650f4ee7f37ac3360d146
SHA256c76d02f2c67ed3181153acbcd72cd3e59ad022b990918a5a0099624bdbc95b1d
SHA51297b77a3608bad82997a549dffdc7207da035ede84310e7b504b5ea6f0ea49dfe97f11c6ca91f8f144e5409569c759cbf8128c1b8d7dce4e75ff42ceb5e30b22e
-
Filesize
208KB
MD52246e84fd55fca789020deb084663d7c
SHA1fa29765b1c92c36d721650f4ee7f37ac3360d146
SHA256c76d02f2c67ed3181153acbcd72cd3e59ad022b990918a5a0099624bdbc95b1d
SHA51297b77a3608bad82997a549dffdc7207da035ede84310e7b504b5ea6f0ea49dfe97f11c6ca91f8f144e5409569c759cbf8128c1b8d7dce4e75ff42ceb5e30b22e
-
Filesize
208KB
MD52246e84fd55fca789020deb084663d7c
SHA1fa29765b1c92c36d721650f4ee7f37ac3360d146
SHA256c76d02f2c67ed3181153acbcd72cd3e59ad022b990918a5a0099624bdbc95b1d
SHA51297b77a3608bad82997a549dffdc7207da035ede84310e7b504b5ea6f0ea49dfe97f11c6ca91f8f144e5409569c759cbf8128c1b8d7dce4e75ff42ceb5e30b22e