Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
66s -
max time network
69s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
06/12/2022, 22:04
Static task
static1
Behavioral task
behavioral1
Sample
d43c102bc8a95abb2a0c6988abd976ff420ed93e1fa25acdc4811f9d7481563e.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
d43c102bc8a95abb2a0c6988abd976ff420ed93e1fa25acdc4811f9d7481563e.exe
Resource
win10v2004-20220812-en
General
-
Target
d43c102bc8a95abb2a0c6988abd976ff420ed93e1fa25acdc4811f9d7481563e.exe
-
Size
157KB
-
MD5
b7325dc09c71c0de6f602929142a746e
-
SHA1
882b52a605e51bdba308efe10c4802a692d656f4
-
SHA256
d43c102bc8a95abb2a0c6988abd976ff420ed93e1fa25acdc4811f9d7481563e
-
SHA512
6c7dcd5f9b7f3e5f72e864b05639dc299cbe310233dc8bc01551db857e581feaa04d70f45ae91b860c2d7c068f5d8fcf7b17c305d48013a80216962c7051967b
-
SSDEEP
3072:DyXrJEQETNpJfvmyBEmEWmHn/sCc/cO7oH7/iDDG9IvpPJwS6tEPU1RufHq:D22ve3H8ObwHMRtEcOC
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List svcnost.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\x1qevypf31c3lmr3esfkejscejsto1lv2\svcnost.exe = "C:\\Users\\Admin\\AppData\\Roaming\\x1qevypf31c3lmr3esfkejscejsto1lv2\\svcnost.exe:*:Enabled:ldrsoft" svcnost.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\etc\hosts d43c102bc8a95abb2a0c6988abd976ff420ed93e1fa25acdc4811f9d7481563e.exe -
resource yara_rule behavioral1/memory/1560-57-0x0000000000400000-0x0000000000462000-memory.dmp upx behavioral1/memory/1560-59-0x0000000000400000-0x0000000000462000-memory.dmp upx behavioral1/memory/1560-60-0x0000000000400000-0x0000000000462000-memory.dmp upx behavioral1/memory/1560-64-0x0000000000400000-0x0000000000462000-memory.dmp upx behavioral1/memory/1560-65-0x0000000000400000-0x0000000000462000-memory.dmp upx behavioral1/memory/1560-66-0x0000000000400000-0x0000000000462000-memory.dmp upx behavioral1/memory/1104-80-0x0000000000400000-0x0000000000462000-memory.dmp upx behavioral1/memory/1560-85-0x0000000000400000-0x0000000000462000-memory.dmp upx behavioral1/memory/1104-86-0x0000000000400000-0x0000000000462000-memory.dmp upx -
Loads dropped DLL 2 IoCs
pid Process 1104 svcnost.exe 1104 svcnost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Init = "\"C:\\Users\\Admin\\AppData\\Roaming\\x1qevypf31c3lmr3esfkejscejsto1lv2\\svcnost.exe\"" d43c102bc8a95abb2a0c6988abd976ff420ed93e1fa25acdc4811f9d7481563e.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\desktop.ini svcnost.exe File opened for modification C:\Users\Admin\AppData\Roaming\desktop.ini svcnost.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1460 set thread context of 1560 1460 d43c102bc8a95abb2a0c6988abd976ff420ed93e1fa25acdc4811f9d7481563e.exe 27 PID 372 set thread context of 1104 372 svcnost.exe 29 -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry\SavedLegacySettingsML = 313637333130333735 svcnost.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\SOFTWARE\Microsoft\Internet Explorer\LowRegistry svcnost.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1560 d43c102bc8a95abb2a0c6988abd976ff420ed93e1fa25acdc4811f9d7481563e.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1560 d43c102bc8a95abb2a0c6988abd976ff420ed93e1fa25acdc4811f9d7481563e.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1460 d43c102bc8a95abb2a0c6988abd976ff420ed93e1fa25acdc4811f9d7481563e.exe 372 svcnost.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1460 wrote to memory of 1560 1460 d43c102bc8a95abb2a0c6988abd976ff420ed93e1fa25acdc4811f9d7481563e.exe 27 PID 1460 wrote to memory of 1560 1460 d43c102bc8a95abb2a0c6988abd976ff420ed93e1fa25acdc4811f9d7481563e.exe 27 PID 1460 wrote to memory of 1560 1460 d43c102bc8a95abb2a0c6988abd976ff420ed93e1fa25acdc4811f9d7481563e.exe 27 PID 1460 wrote to memory of 1560 1460 d43c102bc8a95abb2a0c6988abd976ff420ed93e1fa25acdc4811f9d7481563e.exe 27 PID 1460 wrote to memory of 1560 1460 d43c102bc8a95abb2a0c6988abd976ff420ed93e1fa25acdc4811f9d7481563e.exe 27 PID 1460 wrote to memory of 1560 1460 d43c102bc8a95abb2a0c6988abd976ff420ed93e1fa25acdc4811f9d7481563e.exe 27 PID 1460 wrote to memory of 1560 1460 d43c102bc8a95abb2a0c6988abd976ff420ed93e1fa25acdc4811f9d7481563e.exe 27 PID 1460 wrote to memory of 1560 1460 d43c102bc8a95abb2a0c6988abd976ff420ed93e1fa25acdc4811f9d7481563e.exe 27 PID 1560 wrote to memory of 372 1560 d43c102bc8a95abb2a0c6988abd976ff420ed93e1fa25acdc4811f9d7481563e.exe 28 PID 1560 wrote to memory of 372 1560 d43c102bc8a95abb2a0c6988abd976ff420ed93e1fa25acdc4811f9d7481563e.exe 28 PID 1560 wrote to memory of 372 1560 d43c102bc8a95abb2a0c6988abd976ff420ed93e1fa25acdc4811f9d7481563e.exe 28 PID 1560 wrote to memory of 372 1560 d43c102bc8a95abb2a0c6988abd976ff420ed93e1fa25acdc4811f9d7481563e.exe 28 PID 372 wrote to memory of 1104 372 svcnost.exe 29 PID 372 wrote to memory of 1104 372 svcnost.exe 29 PID 372 wrote to memory of 1104 372 svcnost.exe 29 PID 372 wrote to memory of 1104 372 svcnost.exe 29 PID 372 wrote to memory of 1104 372 svcnost.exe 29 PID 372 wrote to memory of 1104 372 svcnost.exe 29 PID 372 wrote to memory of 1104 372 svcnost.exe 29 PID 372 wrote to memory of 1104 372 svcnost.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\d43c102bc8a95abb2a0c6988abd976ff420ed93e1fa25acdc4811f9d7481563e.exe"C:\Users\Admin\AppData\Local\Temp\d43c102bc8a95abb2a0c6988abd976ff420ed93e1fa25acdc4811f9d7481563e.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Users\Admin\AppData\Local\Temp\d43c102bc8a95abb2a0c6988abd976ff420ed93e1fa25acdc4811f9d7481563e.exe"C:\Users\Admin\AppData\Local\Temp\d43c102bc8a95abb2a0c6988abd976ff420ed93e1fa25acdc4811f9d7481563e.exe"2⤵
- Drops file in Drivers directory
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Users\Admin\AppData\Roaming\x1qevypf31c3lmr3esfkejscejsto1lv2\svcnost.exe"C:\Users\Admin\AppData\Roaming\x1qevypf31c3lmr3esfkejscejsto1lv2\svcnost.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:372 -
C:\Users\Admin\AppData\Roaming\x1qevypf31c3lmr3esfkejscejsto1lv2\svcnost.exe"C:\Users\Admin\AppData\Roaming\x1qevypf31c3lmr3esfkejscejsto1lv2\svcnost.exe"4⤵
- Modifies firewall policy service
- Loads dropped DLL
- Drops desktop.ini file(s)
- Modifies Internet Explorer settings
PID:1104
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD54a27242b307c6a836993353035fafc16
SHA15fea7a41b8f9071848108015d8a952e6f944eea0
SHA25602fd93f64bda51e1e2991184cac13f077d509712e462c9e44be9cf8e22c06de1
SHA51235e9c87642b82df2bf0a9312bb0e9abfb98282db1e34032a4d0150d82c5e2f2e13150ddc896f1e954f02288a1e696a4306ee595b94b1e404c6ec17bac64c44be
-
Filesize
54KB
MD57e8e966927e04a35aec644602b8a9e05
SHA1d201b0b41e8701818d60ddbf9f334332a512c4da
SHA25646f18d9fbf63f378d86962cbf24f5ce57ce257555acd4effdcc41c1e2f1adf5c
SHA512246777c79129a5076b71ca5d3f7e59b06d344f6b5e771892ae8ee68c0b5af9207cd1868b1336b49e6a84665309ad379a33ec6c8e72d7ce41de72153637921a51