Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
160s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01/12/2022, 09:44
Static task
static1
Behavioral task
behavioral1
Sample
a8928e01f20fe5af454b228e7564af7fe4425adc19f2cb6e934faddf77f9a452.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a8928e01f20fe5af454b228e7564af7fe4425adc19f2cb6e934faddf77f9a452.exe
Resource
win10v2004-20220812-en
General
-
Target
a8928e01f20fe5af454b228e7564af7fe4425adc19f2cb6e934faddf77f9a452.exe
-
Size
980KB
-
MD5
3956b4edbe6a6ff807f12ae5cbe5c189
-
SHA1
95717b32165cb18b5da2e5586efdd9ca3f75917f
-
SHA256
a8928e01f20fe5af454b228e7564af7fe4425adc19f2cb6e934faddf77f9a452
-
SHA512
ec689ae082ef64e3586fa29b08d32270bf61d7fc772c8ce40681f2384ef32ae001e0e7f23d36e996ecf8dc863df1e087bade3aa04017724117945ecd222a485c
-
SSDEEP
12288:uEzxgIsBVdzn7UX6JP4y99/FMHL0vHIxQuivPcwgMw:uEzxgIsBPIXJy90HYAxQbv
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 3456 smsc.exe 4820 smsc.exe 4196 smsc.exe 1892 smsc.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\smsc.exe a8928e01f20fe5af454b228e7564af7fe4425adc19f2cb6e934faddf77f9a452.exe File opened for modification C:\Windows\SysWOW64\smsc.exe a8928e01f20fe5af454b228e7564af7fe4425adc19f2cb6e934faddf77f9a452.exe File created C:\Windows\SysWOW64\smsc.exe smsc.exe File created C:\Windows\SysWOW64\smsc.exe smsc.exe File created C:\Windows\SysWOW64\smsc.exe smsc.exe File created C:\Windows\SysWOW64\smsc.exe smsc.exe -
Suspicious behavior: EnumeratesProcesses 60 IoCs
pid Process 528 a8928e01f20fe5af454b228e7564af7fe4425adc19f2cb6e934faddf77f9a452.exe 528 a8928e01f20fe5af454b228e7564af7fe4425adc19f2cb6e934faddf77f9a452.exe 528 a8928e01f20fe5af454b228e7564af7fe4425adc19f2cb6e934faddf77f9a452.exe 528 a8928e01f20fe5af454b228e7564af7fe4425adc19f2cb6e934faddf77f9a452.exe 528 a8928e01f20fe5af454b228e7564af7fe4425adc19f2cb6e934faddf77f9a452.exe 528 a8928e01f20fe5af454b228e7564af7fe4425adc19f2cb6e934faddf77f9a452.exe 528 a8928e01f20fe5af454b228e7564af7fe4425adc19f2cb6e934faddf77f9a452.exe 528 a8928e01f20fe5af454b228e7564af7fe4425adc19f2cb6e934faddf77f9a452.exe 528 a8928e01f20fe5af454b228e7564af7fe4425adc19f2cb6e934faddf77f9a452.exe 528 a8928e01f20fe5af454b228e7564af7fe4425adc19f2cb6e934faddf77f9a452.exe 528 a8928e01f20fe5af454b228e7564af7fe4425adc19f2cb6e934faddf77f9a452.exe 528 a8928e01f20fe5af454b228e7564af7fe4425adc19f2cb6e934faddf77f9a452.exe 3456 smsc.exe 3456 smsc.exe 3456 smsc.exe 3456 smsc.exe 3456 smsc.exe 3456 smsc.exe 3456 smsc.exe 3456 smsc.exe 3456 smsc.exe 3456 smsc.exe 3456 smsc.exe 3456 smsc.exe 4820 smsc.exe 4820 smsc.exe 4820 smsc.exe 4820 smsc.exe 4820 smsc.exe 4820 smsc.exe 4820 smsc.exe 4820 smsc.exe 4820 smsc.exe 4820 smsc.exe 4820 smsc.exe 4820 smsc.exe 4196 smsc.exe 4196 smsc.exe 4196 smsc.exe 4196 smsc.exe 4196 smsc.exe 4196 smsc.exe 4196 smsc.exe 4196 smsc.exe 4196 smsc.exe 4196 smsc.exe 4196 smsc.exe 4196 smsc.exe 1892 smsc.exe 1892 smsc.exe 1892 smsc.exe 1892 smsc.exe 1892 smsc.exe 1892 smsc.exe 1892 smsc.exe 1892 smsc.exe 1892 smsc.exe 1892 smsc.exe 1892 smsc.exe 1892 smsc.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 528 wrote to memory of 3456 528 a8928e01f20fe5af454b228e7564af7fe4425adc19f2cb6e934faddf77f9a452.exe 81 PID 528 wrote to memory of 3456 528 a8928e01f20fe5af454b228e7564af7fe4425adc19f2cb6e934faddf77f9a452.exe 81 PID 528 wrote to memory of 3456 528 a8928e01f20fe5af454b228e7564af7fe4425adc19f2cb6e934faddf77f9a452.exe 81 PID 3456 wrote to memory of 4820 3456 smsc.exe 82 PID 3456 wrote to memory of 4820 3456 smsc.exe 82 PID 3456 wrote to memory of 4820 3456 smsc.exe 82 PID 4820 wrote to memory of 4196 4820 smsc.exe 83 PID 4820 wrote to memory of 4196 4820 smsc.exe 83 PID 4820 wrote to memory of 4196 4820 smsc.exe 83 PID 4196 wrote to memory of 1892 4196 smsc.exe 84 PID 4196 wrote to memory of 1892 4196 smsc.exe 84 PID 4196 wrote to memory of 1892 4196 smsc.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\a8928e01f20fe5af454b228e7564af7fe4425adc19f2cb6e934faddf77f9a452.exe"C:\Users\Admin\AppData\Local\Temp\a8928e01f20fe5af454b228e7564af7fe4425adc19f2cb6e934faddf77f9a452.exe"1⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:528 -
C:\Windows\SysWOW64\smsc.exeC:\Windows\system32\smsc.exe -bai C:\Users\Admin\AppData\Local\Temp\a8928e01f20fe5af454b228e7564af7fe4425adc19f2cb6e934faddf77f9a452.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3456 -
C:\Windows\SysWOW64\smsc.exeC:\Windows\system32\smsc.exe -bai C:\Windows\SysWOW64\smsc.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Windows\SysWOW64\smsc.exeC:\Windows\system32\smsc.exe -bai C:\Windows\SysWOW64\smsc.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4196 -
C:\Windows\SysWOW64\smsc.exeC:\Windows\system32\smsc.exe -bai C:\Windows\SysWOW64\smsc.exe5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1892
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
980KB
MD53956b4edbe6a6ff807f12ae5cbe5c189
SHA195717b32165cb18b5da2e5586efdd9ca3f75917f
SHA256a8928e01f20fe5af454b228e7564af7fe4425adc19f2cb6e934faddf77f9a452
SHA512ec689ae082ef64e3586fa29b08d32270bf61d7fc772c8ce40681f2384ef32ae001e0e7f23d36e996ecf8dc863df1e087bade3aa04017724117945ecd222a485c
-
Filesize
980KB
MD53956b4edbe6a6ff807f12ae5cbe5c189
SHA195717b32165cb18b5da2e5586efdd9ca3f75917f
SHA256a8928e01f20fe5af454b228e7564af7fe4425adc19f2cb6e934faddf77f9a452
SHA512ec689ae082ef64e3586fa29b08d32270bf61d7fc772c8ce40681f2384ef32ae001e0e7f23d36e996ecf8dc863df1e087bade3aa04017724117945ecd222a485c
-
Filesize
980KB
MD53956b4edbe6a6ff807f12ae5cbe5c189
SHA195717b32165cb18b5da2e5586efdd9ca3f75917f
SHA256a8928e01f20fe5af454b228e7564af7fe4425adc19f2cb6e934faddf77f9a452
SHA512ec689ae082ef64e3586fa29b08d32270bf61d7fc772c8ce40681f2384ef32ae001e0e7f23d36e996ecf8dc863df1e087bade3aa04017724117945ecd222a485c
-
Filesize
980KB
MD53956b4edbe6a6ff807f12ae5cbe5c189
SHA195717b32165cb18b5da2e5586efdd9ca3f75917f
SHA256a8928e01f20fe5af454b228e7564af7fe4425adc19f2cb6e934faddf77f9a452
SHA512ec689ae082ef64e3586fa29b08d32270bf61d7fc772c8ce40681f2384ef32ae001e0e7f23d36e996ecf8dc863df1e087bade3aa04017724117945ecd222a485c
-
Filesize
980KB
MD53956b4edbe6a6ff807f12ae5cbe5c189
SHA195717b32165cb18b5da2e5586efdd9ca3f75917f
SHA256a8928e01f20fe5af454b228e7564af7fe4425adc19f2cb6e934faddf77f9a452
SHA512ec689ae082ef64e3586fa29b08d32270bf61d7fc772c8ce40681f2384ef32ae001e0e7f23d36e996ecf8dc863df1e087bade3aa04017724117945ecd222a485c