Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20230621-en -
resource tags
arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system -
submitted
02/07/2023, 01:51
Static task
static1
Behavioral task
behavioral1
Sample
977f6bc76e6d7a02366e8af5d3cac2aa.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
977f6bc76e6d7a02366e8af5d3cac2aa.exe
Resource
win10v2004-20230621-en
General
-
Target
977f6bc76e6d7a02366e8af5d3cac2aa.exe
-
Size
97.6MB
-
MD5
977f6bc76e6d7a02366e8af5d3cac2aa
-
SHA1
f341b681115c49c79dc24670ff31015c5bc31fe4
-
SHA256
95068ba50db5eebb71e8a1601b4745fb17b5a6ffc381994709d4b1abb7e0b3ec
-
SHA512
7ba1fbff66d71c16d5a643b861e370a23ebb99deeb923a96883f7bc27cce553727f7f24a1f91ecd5914ced94c5f1fcccdc9771ec56dbc62a7adfcb179fa0307c
-
SSDEEP
3145728:6QAPCRrlpr73GrShtGO4fc5NAagkx+LdPfne:aqZv/3EslQc5NAaGd+
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 4960 977f6bc76e6d7a02366e8af5d3cac2aa.exe -
Drops file in System32 directory 8 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{9789543E-8542-4957-9541-97FE6FDCA932}.catalogItem svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{1A3B8E33-0156-410A-9C09-8CE9B6975A16}.catalogItem svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{C6BA2BDE-F353-4A76-83C1-C5C9EEF6E803}.catalogItem svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{5C585F43-406A-4CEF-A647-5FF6781BB316}.catalogItem svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{92B3FA60-3BCA-47C3-8D75-1749926EF77C}.catalogItem svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{5B20E623-6BBF-4F94-8DDB-6ADE3ACBA2BE}.catalogItem svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{810F2361-7500-446D-A950-A068DEDE9AED}.catalogItem svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{2BDE0923-231A-4289-821B-451E8605A970}.catalogItem svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
Processes
-
C:\Users\Admin\AppData\Local\Temp\977f6bc76e6d7a02366e8af5d3cac2aa.exe"C:\Users\Admin\AppData\Local\Temp\977f6bc76e6d7a02366e8af5d3cac2aa.exe"1⤵
- Loads dropped DLL
PID:4960
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵
- Drops file in System32 directory
PID:4476
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD5cff85c549d536f651d4fb8387f1976f2
SHA1d41ce3a5ff609df9cf5c7e207d3b59bf8a48530e
SHA2568dc562cda7217a3a52db898243de3e2ed68b80e62ddcb8619545ed0b4e7f65a8
SHA512531d6328daf3b86d85556016d299798fa06fefc81604185108a342d000e203094c8c12226a12bd6e1f89b0db501fb66f827b610d460b933bd4ab936ac2fd8a88