Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
189s -
max time network
188s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
06/12/2022, 12:24
Behavioral task
behavioral1
Sample
effa178438c58a45da86e1ada849b2d55afb829a275624298cb336a2eacc064f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
effa178438c58a45da86e1ada849b2d55afb829a275624298cb336a2eacc064f.exe
Resource
win10v2004-20221111-en
General
-
Target
effa178438c58a45da86e1ada849b2d55afb829a275624298cb336a2eacc064f.exe
-
Size
133KB
-
MD5
e327fee95ea6fa5e91f443e351feb346
-
SHA1
af9a45fecd896289e232dd93421b1a7d396d65e3
-
SHA256
effa178438c58a45da86e1ada849b2d55afb829a275624298cb336a2eacc064f
-
SHA512
26c831c9d7d09e338193e1f4115a436a487d932d1b77a082ce2acfb0df8ee0e9fdc35f3a17df34bb385972b9612f230654b115b4d164a3109994d0566784cede
-
SSDEEP
3072:+A8VOVqz0aslVrCuE5u2ffbDrMYsuGf8vG:R8Kq9Crdfsfb/ZsuGQG
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run svch0st.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ = "C:\\Program Files\\Common Files\\svch0st.exe" svch0st.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\02212111227.ini svch0st.exe -
Kills process with taskkill 2 IoCs
pid Process 4232 taskkill.exe 812 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4364 svch0st.exe 4364 svch0st.exe 4364 svch0st.exe 4364 svch0st.exe 4364 svch0st.exe 4364 svch0st.exe 4364 svch0st.exe 4364 svch0st.exe 4364 svch0st.exe 4364 svch0st.exe 4364 svch0st.exe 4364 svch0st.exe 4364 svch0st.exe 4364 svch0st.exe 4364 svch0st.exe 4364 svch0st.exe 4364 svch0st.exe 4364 svch0st.exe 4364 svch0st.exe 4364 svch0st.exe 4364 svch0st.exe 4364 svch0st.exe 4364 svch0st.exe 4364 svch0st.exe 4364 svch0st.exe 4364 svch0st.exe 4364 svch0st.exe 4364 svch0st.exe 4364 svch0st.exe 4364 svch0st.exe 4364 svch0st.exe 4364 svch0st.exe 4364 svch0st.exe 4364 svch0st.exe 4364 svch0st.exe 4364 svch0st.exe 4364 svch0st.exe 4364 svch0st.exe 4364 svch0st.exe 4364 svch0st.exe 4364 svch0st.exe 4364 svch0st.exe 4364 svch0st.exe 4364 svch0st.exe 4364 svch0st.exe 4364 svch0st.exe 4364 svch0st.exe 4364 svch0st.exe 4364 svch0st.exe 4364 svch0st.exe 4364 svch0st.exe 4364 svch0st.exe 4364 svch0st.exe 4364 svch0st.exe 4364 svch0st.exe 4364 svch0st.exe 4364 svch0st.exe 4364 svch0st.exe 4364 svch0st.exe 4364 svch0st.exe 4364 svch0st.exe 4364 svch0st.exe 4364 svch0st.exe 4364 svch0st.exe -
Suspicious behavior: RenamesItself 2 IoCs
pid Process 2492 effa178438c58a45da86e1ada849b2d55afb829a275624298cb336a2eacc064f.exe 4364 svch0st.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4232 taskkill.exe Token: SeDebugPrivilege 812 taskkill.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2492 wrote to memory of 4232 2492 effa178438c58a45da86e1ada849b2d55afb829a275624298cb336a2eacc064f.exe 82 PID 2492 wrote to memory of 4232 2492 effa178438c58a45da86e1ada849b2d55afb829a275624298cb336a2eacc064f.exe 82 PID 2492 wrote to memory of 4232 2492 effa178438c58a45da86e1ada849b2d55afb829a275624298cb336a2eacc064f.exe 82 PID 2492 wrote to memory of 4364 2492 effa178438c58a45da86e1ada849b2d55afb829a275624298cb336a2eacc064f.exe 83 PID 2492 wrote to memory of 4364 2492 effa178438c58a45da86e1ada849b2d55afb829a275624298cb336a2eacc064f.exe 83 PID 2492 wrote to memory of 4364 2492 effa178438c58a45da86e1ada849b2d55afb829a275624298cb336a2eacc064f.exe 83 PID 4364 wrote to memory of 812 4364 svch0st.exe 85 PID 4364 wrote to memory of 812 4364 svch0st.exe 85 PID 4364 wrote to memory of 812 4364 svch0st.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\effa178438c58a45da86e1ada849b2d55afb829a275624298cb336a2eacc064f.exe"C:\Users\Admin\AppData\Local\Temp\effa178438c58a45da86e1ada849b2d55afb829a275624298cb336a2eacc064f.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Ksafetray.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4232
-
-
C:\Program Files\Common Files\svch0st.exe"C:\Program Files\Common Files\svch0st.exe"2⤵
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Ksafetray.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:812
-
-