Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
03/10/2023, 18:02
Static task
static1
Behavioral task
behavioral1
Sample
9f7902e3711c689cb5b8874e3f4ffc02_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
9f7902e3711c689cb5b8874e3f4ffc02_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
9f7902e3711c689cb5b8874e3f4ffc02_JC.exe
-
Size
206KB
-
MD5
9f7902e3711c689cb5b8874e3f4ffc02
-
SHA1
65ba3c5266bb273610ea82ae931f55bdc0c01a9f
-
SHA256
4d7c229c22ac534569f6b3dd2a419bd99fa0f42635430e237be17c76473bed2c
-
SHA512
102c089ab60c3e30b1cf8958ce534981ed19bb8de29b30a739975f66b9a0d5cf0b91ae223202e8531e458b5c02d8287e032fb31f4c4e42c0304705191ca0b772
-
SSDEEP
3072:unY9tqi07/+8qZip+YRADRddUpBYzkcGSaUyRt6umF4T/L+htRTA5M9Qfcl:uY9P07/O2+UGd0HPRhT/L+hU5wkcl
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 1908 svchost.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\8bec575a = "C:\\Windows\\apppatch\\svchost.exe" 9f7902e3711c689cb5b8874e3f4ffc02_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\8bec575a = "C:\\Windows\\apppatch\\svchost.exe" svchost.exe -
Drops file in Program Files directory 50 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Windows Defender\lysyfyj.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lymyxid.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\qetyfuv.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\galynuh.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\vonyket.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\lyxynyx.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vofycot.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qetyhyg.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\lygyvuj.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\puzylyp.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lysyfyj.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lyrysor.com svchost.exe File created C:\Program Files (x86)\Windows Defender\gadyciz.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\purylev.com svchost.exe File created C:\Program Files (x86)\Windows Defender\volykit.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lygyvuj.com svchost.exe File created C:\Program Files (x86)\Windows Defender\gahyqah.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\vonypom.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\qegyval.com svchost.exe File created C:\Program Files (x86)\Windows Defender\purylev.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\gatyhub.com svchost.exe File created C:\Program Files (x86)\Windows Defender\puzylyp.com svchost.exe File created C:\Program Files (x86)\Windows Defender\galyqaz.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\galyqaz.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\purypol.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\pupydeq.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vonyket.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\pumyjig.com svchost.exe File created C:\Program Files (x86)\Windows Defender\gatyhub.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\gahyqah.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qetyfuv.com svchost.exe File created C:\Program Files (x86)\Windows Defender\galynuh.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\gadyciz.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vonypom.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\lyrysor.com svchost.exe File created C:\Program Files (x86)\Windows Defender\purypol.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qexynyp.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\volykit.com svchost.exe File created C:\Program Files (x86)\Windows Defender\pupycag.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\pupycag.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lyxynyx.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\vofycot.com svchost.exe File created C:\Program Files (x86)\Windows Defender\pumyjig.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vocyzit.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\vocyzit.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\lymyxid.com svchost.exe File created C:\Program Files (x86)\Windows Defender\pupydeq.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\qexynyp.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qegyval.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\qetyhyg.com svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe 9f7902e3711c689cb5b8874e3f4ffc02_JC.exe File opened for modification C:\Windows\apppatch\svchost.exe 9f7902e3711c689cb5b8874e3f4ffc02_JC.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1908 svchost.exe 1908 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4440 9f7902e3711c689cb5b8874e3f4ffc02_JC.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4440 wrote to memory of 1908 4440 9f7902e3711c689cb5b8874e3f4ffc02_JC.exe 86 PID 4440 wrote to memory of 1908 4440 9f7902e3711c689cb5b8874e3f4ffc02_JC.exe 86 PID 4440 wrote to memory of 1908 4440 9f7902e3711c689cb5b8874e3f4ffc02_JC.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\9f7902e3711c689cb5b8874e3f4ffc02_JC.exe"C:\Users\Admin\AppData\Local\Temp\9f7902e3711c689cb5b8874e3f4ffc02_JC.exe"1⤵
- Modifies WinLogon
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:1908
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22KB
MD58256aa6ca960a5f6240ae4a0c50790c1
SHA1ce89edefdd63645d14f2a3ae3e2162287df17443
SHA256171877eb59aaf3d51d8b49e89d9342028896117b1b4a5c36e11778a647489703
SHA5124d3f58d115f21087d42fa3c5fcc5a316b1b6ec50d482225f7be43f2ac0d07d391793851e4ba98b6f99db09e93b424bffa0674e13875d0ecd03e42cc6aee60922
-
Filesize
593B
MD5926512864979bc27cf187f1de3f57aff
SHA1acdeb9d6187932613c7fa08eaf28f0cd8116f4b5
SHA256b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f
SHA512f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b
-
Filesize
1KB
MD5ff4739fe8d3f411c1114f7d7097d5fc5
SHA1c15b76b5ce6ff4774d973ba8965cdefe32e8ad57
SHA256137b2f8fb24d056d9b4d7218c9d1c91d9ba07751dc9e9bb544cdcdbdeb519a48
SHA5123ad0285b59fa9386e8a7b38f30ba473421a8c6048a573c895d46f600df0f6aaaa7b0da238340eb6685dba7729688e917387215bad89aae4f9bc1dd1e44e0c864
-
Filesize
481B
MD503ff8a6f4087f7e4e1e6c8d9a2487411
SHA1288cbc25092d1346d3a996a9a3ccad65f5cc9ea1
SHA25640eb78f5611ba7e37635166a9676bcf6413fa69a7d00a22ffd64c98e4ecd5cc9
SHA5124434f1cefa9c4d1fa61fcec719f16f9448f296ed91e3dc3096fe7722eaa8538bc9693f488b266aa87b54fde08a702b923eb7e065fca9ec539a8f043cbe3a142b
-
Filesize
302B
MD5d3b33b6d931f30f47e21908d2ea80e23
SHA13880a6c1926821149e490995b42b85c9b743c692
SHA2567e45348d6ebb420cdcfcbdb33b38dda40b5333dec4bf97a5bef08980154c3b7e
SHA512e040120f50252c9e346a5a73b57a9616316cb95e61e0870f4bc72c22c2306126d34765e971b00413454aa1547e7e75240abc72db3342042f1f272167a71ee935
-
Filesize
2KB
MD53e13bef1345cad73b852689375c5b637
SHA1e65e21ac6ae65a6c5a39bc736fdfe84062d3e065
SHA256e3100d8708388940fc3d8a9cc7a425fbdf4b5a68689d935fa78512c1939e0807
SHA512ed563d3c3f6faf39fda9ff6f76cd56da020338624be26a35f8cddcb765635a50c9511b0e205428804c7521c546c1eb0c37298baa039cf00965d5334f68d4f8f2
-
Filesize
2KB
MD5686319bdd93d497947e8088098a8ef72
SHA11a1af24d0e44f4075afff970f5e08799192cb784
SHA256a1af56d2e5e369182584be7a975ac8f4d3e416fe13205aa839b715be6756e77a
SHA5129af0438e82abfa7074b65d356d85d668c10e1b9e7a9da2c726a18239e27695c8f09d52fa100dd6852e9b4a850fe69722510d6f398b120c7b8344a80a93de9621
-
Filesize
302B
MD54ce666ef7a718c187215b2dccc0373b4
SHA147f0e38de0da8b6717af239eff02a1cfe0acc4f5
SHA256884f8d4e93c19659410caae3482764775fad300524167b6b41376a3a496e8bd0
SHA512afce1b468a04eb9733b8ef19cd228a2e02af78e5042c13407549031efaf3d0654dfd44e7723a7322a5c188d633c7a415a65f2a0539e7b061f3bd42b3807cd550
-
Filesize
2KB
MD5dc3e1aa54db92876cdbcbe1d1ccef02a
SHA12ff0b152ed379ce56f866454464d748bbf7184f7
SHA256b75bd423472b466de902e810df0bee6b8e6499364d736cb97607e0b8e3f94ead
SHA512db9067144086aec94963c9bc2ebeed31133a0244a000c6aacbe40bd1ed80d437d7f8d4faddd013823536ac4974dda8613b342abefa7ba398e902727d21b6cd1d
-
Filesize
302B
MD5c16cb1b64e29c9517f90a0295b5cc4af
SHA11ec90f432d46d6aeb0b0f3100ba52ad69bd1ca22
SHA256b32260a90267b21ab67d8f72ff09884ffecacf197260e0a761932b8cba9cc62e
SHA5128e21bd58a4c1c9d76c9a6216029050cb3604fa08701215679792a1eff8c85bfdaf1dea98b126c463bbb2def36da7fed71b68fbc10609228d8f34dfa5ac78fc75
-
Filesize
168B
MD5d57e3a550060f85d44a175139ea23021
SHA12c5cb3428a322c9709a34d04dd86fe7628f8f0a6
SHA25643edf068d34276e8ade4113d4d7207de19fc98a2ae1c07298e593edae2a8774c
SHA5120364fe6a010fce7a3f4a6344c84468c64b20fd131f3160fc649db78f1075ba52d8a1c4496e50dbe27c357e01ee52e94cdcda8f7927cba28d5f2f45b9da690063
-
Filesize
206KB
MD5fafbdb54e7d9d049d77991c10336ef5b
SHA116c3f24bbff4581604d073f88a5b9f873a5b8434
SHA25678360a15d5525d5156fd9007d75c7ef19947982236daad0c62b11822b67da63d
SHA51201d5d715383134be9f7876989bc2a2b1bb3f156e9ffb0a71410d9589ea73c30596d0dee53359872f7b32bfa31805715bd65ff463bc7c375f7ebcfb7009edef31
-
Filesize
206KB
MD5fafbdb54e7d9d049d77991c10336ef5b
SHA116c3f24bbff4581604d073f88a5b9f873a5b8434
SHA25678360a15d5525d5156fd9007d75c7ef19947982236daad0c62b11822b67da63d
SHA51201d5d715383134be9f7876989bc2a2b1bb3f156e9ffb0a71410d9589ea73c30596d0dee53359872f7b32bfa31805715bd65ff463bc7c375f7ebcfb7009edef31