Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 13:49
Static task
static1
Behavioral task
behavioral1
Sample
6d6f6654d135dd2ab18e47e15fd1f8757992dc39022da62ebf828a52910e8d0d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6d6f6654d135dd2ab18e47e15fd1f8757992dc39022da62ebf828a52910e8d0d.exe
Resource
win10v2004-20220901-en
General
-
Target
6d6f6654d135dd2ab18e47e15fd1f8757992dc39022da62ebf828a52910e8d0d.exe
-
Size
55KB
-
MD5
04de46e18add3a1a1a7cab353e2bca30
-
SHA1
48a0ab35611f2602921c49b058c765212ed27b57
-
SHA256
6d6f6654d135dd2ab18e47e15fd1f8757992dc39022da62ebf828a52910e8d0d
-
SHA512
58d5ac7205c71f49d821225faa094e547aeab1786c4861cad0cad8d3a6156164a13bfe1c707b2c00f800798cb5de650d19b49a6968b60dd2eda877aadbc892dc
-
SSDEEP
1536:oH+SV87rUTXJAF3UGuFh7CHt8OCaoVuZTJh5ObBXFNfGEmL:oH4rUTZGYFh7UrCzGJhkbpFRGE
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\data.dat" svchost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1000 6d6f6654d135dd2ab18e47e15fd1f8757992dc39022da62ebf828a52910e8d0d.exe 956 svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 956 svchost.exe 956 svchost.exe 956 svchost.exe 956 svchost.exe 956 svchost.exe 956 svchost.exe 956 svchost.exe 956 svchost.exe 956 svchost.exe 956 svchost.exe 956 svchost.exe 956 svchost.exe 956 svchost.exe 956 svchost.exe 956 svchost.exe 956 svchost.exe 956 svchost.exe 956 svchost.exe 956 svchost.exe 956 svchost.exe 956 svchost.exe 956 svchost.exe 956 svchost.exe 956 svchost.exe 956 svchost.exe 956 svchost.exe 956 svchost.exe 956 svchost.exe 956 svchost.exe 956 svchost.exe 956 svchost.exe 956 svchost.exe 956 svchost.exe 956 svchost.exe 956 svchost.exe 956 svchost.exe 956 svchost.exe 956 svchost.exe 956 svchost.exe 956 svchost.exe 956 svchost.exe 956 svchost.exe 956 svchost.exe 956 svchost.exe 956 svchost.exe 956 svchost.exe 956 svchost.exe 956 svchost.exe 956 svchost.exe 956 svchost.exe 956 svchost.exe 956 svchost.exe 956 svchost.exe 956 svchost.exe 956 svchost.exe 956 svchost.exe 956 svchost.exe 956 svchost.exe 956 svchost.exe 956 svchost.exe 956 svchost.exe 956 svchost.exe 956 svchost.exe 956 svchost.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1000 6d6f6654d135dd2ab18e47e15fd1f8757992dc39022da62ebf828a52910e8d0d.exe 1000 6d6f6654d135dd2ab18e47e15fd1f8757992dc39022da62ebf828a52910e8d0d.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 956 svchost.exe 956 svchost.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 956 wrote to memory of 520 956 svchost.exe 28 PID 956 wrote to memory of 520 956 svchost.exe 28 PID 956 wrote to memory of 520 956 svchost.exe 28 PID 956 wrote to memory of 520 956 svchost.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\6d6f6654d135dd2ab18e47e15fd1f8757992dc39022da62ebf828a52910e8d0d.exe"C:\Users\Admin\AppData\Local\Temp\6d6f6654d135dd2ab18e47e15fd1f8757992dc39022da62ebf828a52910e8d0d.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: MapViewOfSection
PID:1000
-
C:\Windows\syswow64\svchost.exe"C:\Windows\syswow64\svchost.exe"1⤵
- Modifies WinLogon for persistence
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Windows\SysWOW64\ctfmon.exectfmon.exe2⤵PID:520
-