Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
188s -
max time network
183s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 23:26
Static task
static1
Behavioral task
behavioral1
Sample
612c97e4d9d929a094826d134e15e6cf3a00668cce434a9a70525f7ab09f240d.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
612c97e4d9d929a094826d134e15e6cf3a00668cce434a9a70525f7ab09f240d.exe
Resource
win10v2004-20221111-en
General
-
Target
612c97e4d9d929a094826d134e15e6cf3a00668cce434a9a70525f7ab09f240d.exe
-
Size
58KB
-
MD5
55ad67cae98bd2c03245b3ebe548036e
-
SHA1
87a191dd2a972cd95f9e8e01d9e9228c5a6087f1
-
SHA256
612c97e4d9d929a094826d134e15e6cf3a00668cce434a9a70525f7ab09f240d
-
SHA512
c0b6e0835992462a9ec45efa88327ad8e4fe22923c4aaf5b9c11fc108e7a77b170eef9315ddf1a37570e905b61ba56033a248317c7a04c293a2f18a7ed9fe36d
-
SSDEEP
1536:MndEVw7aXA/S8nACBuoZB5FfqGSnw8xiMFvKymlfJr:MndEiUA/S8CoZPovxip/lfJ
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\cache.dat" svchost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1672 612c97e4d9d929a094826d134e15e6cf3a00668cce434a9a70525f7ab09f240d.exe 1340 svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1672 612c97e4d9d929a094826d134e15e6cf3a00668cce434a9a70525f7ab09f240d.exe 1672 612c97e4d9d929a094826d134e15e6cf3a00668cce434a9a70525f7ab09f240d.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1340 svchost.exe 1340 svchost.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1340 wrote to memory of 1480 1340 svchost.exe 29 PID 1340 wrote to memory of 1480 1340 svchost.exe 29 PID 1340 wrote to memory of 1480 1340 svchost.exe 29 PID 1340 wrote to memory of 1480 1340 svchost.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\612c97e4d9d929a094826d134e15e6cf3a00668cce434a9a70525f7ab09f240d.exe"C:\Users\Admin\AppData\Local\Temp\612c97e4d9d929a094826d134e15e6cf3a00668cce434a9a70525f7ab09f240d.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: MapViewOfSection
PID:1672
-
C:\Windows\syswow64\svchost.exe"C:\Windows\syswow64\svchost.exe"1⤵
- Modifies WinLogon for persistence
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Windows\SysWOW64\ctfmon.exectfmon.exe2⤵PID:1480
-