Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
06/12/2022, 12:24
Behavioral task
behavioral1
Sample
effa178438c58a45da86e1ada849b2d55afb829a275624298cb336a2eacc064f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
effa178438c58a45da86e1ada849b2d55afb829a275624298cb336a2eacc064f.exe
Resource
win10v2004-20221111-en
General
-
Target
effa178438c58a45da86e1ada849b2d55afb829a275624298cb336a2eacc064f.exe
-
Size
133KB
-
MD5
e327fee95ea6fa5e91f443e351feb346
-
SHA1
af9a45fecd896289e232dd93421b1a7d396d65e3
-
SHA256
effa178438c58a45da86e1ada849b2d55afb829a275624298cb336a2eacc064f
-
SHA512
26c831c9d7d09e338193e1f4115a436a487d932d1b77a082ce2acfb0df8ee0e9fdc35f3a17df34bb385972b9612f230654b115b4d164a3109994d0566784cede
-
SSDEEP
3072:+A8VOVqz0aslVrCuE5u2ffbDrMYsuGf8vG:R8Kq9Crdfsfb/ZsuGQG
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run svch0st.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "C:\\Program Files\\Common Files\\svch0st.exe" svch0st.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\022121111944.ini svch0st.exe -
Kills process with taskkill 2 IoCs
pid Process 912 taskkill.exe 960 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 920 svch0st.exe 920 svch0st.exe 920 svch0st.exe 920 svch0st.exe 920 svch0st.exe 920 svch0st.exe 920 svch0st.exe 920 svch0st.exe 920 svch0st.exe 920 svch0st.exe 920 svch0st.exe 920 svch0st.exe 920 svch0st.exe 920 svch0st.exe 920 svch0st.exe 920 svch0st.exe 920 svch0st.exe 920 svch0st.exe 920 svch0st.exe 920 svch0st.exe 920 svch0st.exe 920 svch0st.exe 920 svch0st.exe 920 svch0st.exe 920 svch0st.exe 920 svch0st.exe 920 svch0st.exe 920 svch0st.exe 920 svch0st.exe 920 svch0st.exe 920 svch0st.exe 920 svch0st.exe 920 svch0st.exe 920 svch0st.exe 920 svch0st.exe 920 svch0st.exe 920 svch0st.exe 920 svch0st.exe 920 svch0st.exe 920 svch0st.exe 920 svch0st.exe 920 svch0st.exe 920 svch0st.exe 920 svch0st.exe 920 svch0st.exe 920 svch0st.exe 920 svch0st.exe 920 svch0st.exe 920 svch0st.exe 920 svch0st.exe 920 svch0st.exe 920 svch0st.exe 920 svch0st.exe 920 svch0st.exe 920 svch0st.exe 920 svch0st.exe 920 svch0st.exe 920 svch0st.exe 920 svch0st.exe 920 svch0st.exe 920 svch0st.exe 920 svch0st.exe 920 svch0st.exe 920 svch0st.exe -
Suspicious behavior: RenamesItself 2 IoCs
pid Process 2016 effa178438c58a45da86e1ada849b2d55afb829a275624298cb336a2eacc064f.exe 920 svch0st.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 912 taskkill.exe Token: SeDebugPrivilege 960 taskkill.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2016 wrote to memory of 912 2016 effa178438c58a45da86e1ada849b2d55afb829a275624298cb336a2eacc064f.exe 27 PID 2016 wrote to memory of 912 2016 effa178438c58a45da86e1ada849b2d55afb829a275624298cb336a2eacc064f.exe 27 PID 2016 wrote to memory of 912 2016 effa178438c58a45da86e1ada849b2d55afb829a275624298cb336a2eacc064f.exe 27 PID 2016 wrote to memory of 912 2016 effa178438c58a45da86e1ada849b2d55afb829a275624298cb336a2eacc064f.exe 27 PID 2016 wrote to memory of 920 2016 effa178438c58a45da86e1ada849b2d55afb829a275624298cb336a2eacc064f.exe 28 PID 2016 wrote to memory of 920 2016 effa178438c58a45da86e1ada849b2d55afb829a275624298cb336a2eacc064f.exe 28 PID 2016 wrote to memory of 920 2016 effa178438c58a45da86e1ada849b2d55afb829a275624298cb336a2eacc064f.exe 28 PID 2016 wrote to memory of 920 2016 effa178438c58a45da86e1ada849b2d55afb829a275624298cb336a2eacc064f.exe 28 PID 920 wrote to memory of 960 920 svch0st.exe 30 PID 920 wrote to memory of 960 920 svch0st.exe 30 PID 920 wrote to memory of 960 920 svch0st.exe 30 PID 920 wrote to memory of 960 920 svch0st.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\effa178438c58a45da86e1ada849b2d55afb829a275624298cb336a2eacc064f.exe"C:\Users\Admin\AppData\Local\Temp\effa178438c58a45da86e1ada849b2d55afb829a275624298cb336a2eacc064f.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Ksafetray.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:912
-
-
C:\Program Files\Common Files\svch0st.exe"C:\Program Files\Common Files\svch0st.exe"2⤵
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:920 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Ksafetray.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:960
-
-