Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    117s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2023, 23:11

General

  • Target

    0f8c656539eedcbba2153182bdb60a1ec96aa8bffed8e026a991e851525d7080.exe

  • Size

    1.1MB

  • MD5

    fdb0b8642dd7fa7d36d11bb70f9b23e2

  • SHA1

    38a26e6b4e38994e9412e14d7ce832c804b923e5

  • SHA256

    0f8c656539eedcbba2153182bdb60a1ec96aa8bffed8e026a991e851525d7080

  • SHA512

    86cd12d15c0d3e9b588f34817e6bc9cf24838649f4997838a4b65500873d5c0616a329a48f5568416a8da334818a65b77ab49773d645df4b51198ed75050ff96

  • SSDEEP

    24576:CH0dl8myX9Bg42QoXFkrzkmmlSgRDko0lG4Z8r7Qfbkiu5QR:CcaClSFlG4ZM7QzMS

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 10 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 16 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0f8c656539eedcbba2153182bdb60a1ec96aa8bffed8e026a991e851525d7080.exe
    "C:\Users\Admin\AppData\Local\Temp\0f8c656539eedcbba2153182bdb60a1ec96aa8bffed8e026a991e851525d7080.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2436
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:3052
      • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
        3⤵
        • Deletes itself
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:2624
      • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:1900
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2696
      • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2560
        • C:\Windows\SysWOW64\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
          4⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:2828
          • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
            "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:2240
          • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
            "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:1948
            • C:\Windows\SysWOW64\WScript.exe
              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
              6⤵
              • Loads dropped DLL
              • Suspicious use of WriteProcessMemory
              PID:336
              • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:1312
          • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
            "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:2216

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Config.ini

    Filesize

    92B

    MD5

    67b9b3e2ded7086f393ebbc36c5e7bca

    SHA1

    e6299d0450b9a92a18cc23b5704a2b475652c790

    SHA256

    44063c266686263f14cd2a83fee124fb3e61a9171a6aab69709464f49511011d

    SHA512

    826fbc9481f46b1ae3db828a665c55c349023caf563e6e8c17321f5f3af3e4c3914955db6f0eebfc6defe561315435d47310b4d0499ab9c2c85bb61264dedc09

  • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

    Filesize

    696B

    MD5

    03f68343f5906993640e0b9e3f9c7964

    SHA1

    699e9c3fda1aa89e7a47ac8b77b41178c99cc8e2

    SHA256

    dd2d5bf380874e81adc5e05b667047dcf1b6c8a8953068fb177053e20c35f727

    SHA512

    76de9e035c0ad6ee3237006749fd28ee93a6fcd09700e265aaea432f7d2292aac87f0799221559caacd6dd58ff72af17d67627aace77bd2a36a802bbdc88b99c

  • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

    Filesize

    696B

    MD5

    321085c6e57a8455a3e915906a6c160b

    SHA1

    9cd284183cd00b8ed9766cf5ba4433bd041c381e

    SHA256

    0d5abb9f989e8b184b17b159987cacb4be04d476a85a3c684e797cdbded810cb

    SHA512

    030c762c6548c28805fb3f9d97ed98ff958a379fb5142b7ba6c4cb2a8dd7a59051135e649abd6c16320361b10c374e4a1003c802560fcc244849089255fb7722

  • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

    Filesize

    753B

    MD5

    259dfbf0b29956c98eea187f37dc9ed1

    SHA1

    6295fc6ea553947ab3d569d7cd2e30ce5bc0bd99

    SHA256

    c85e00419b00027afd65f6c78762f26ff627dcbf7acf3ffea03ffd364824b24d

    SHA512

    84a1fd49ed2399f76f7145896ff8554249b1e892ea76ca8ec04db0ff86e77b650a2c561914466ff876591ba3c0fb87b70fc19bd8701de827cd71fca9077bb99f

  • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

    Filesize

    753B

    MD5

    259dfbf0b29956c98eea187f37dc9ed1

    SHA1

    6295fc6ea553947ab3d569d7cd2e30ce5bc0bd99

    SHA256

    c85e00419b00027afd65f6c78762f26ff627dcbf7acf3ffea03ffd364824b24d

    SHA512

    84a1fd49ed2399f76f7145896ff8554249b1e892ea76ca8ec04db0ff86e77b650a2c561914466ff876591ba3c0fb87b70fc19bd8701de827cd71fca9077bb99f

  • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

    Filesize

    1.1MB

    MD5

    16cff7175770af8d32089c080eec90eb

    SHA1

    bf346e99a9ff7cb4d115dfec7d7ad25ec011ca84

    SHA256

    f7179ea05fa1f5b020004591f93a32c78057ca2c91e245a472de9dfdc5148053

    SHA512

    cca024da4061f37a3839214dea765d573f54c7c92fab9423d977e311d17d68cc5ace53be4d3c383b294058e2039b2eba4a2edddfde912d6d97821701182c9ef7

  • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

    Filesize

    1.1MB

    MD5

    16cff7175770af8d32089c080eec90eb

    SHA1

    bf346e99a9ff7cb4d115dfec7d7ad25ec011ca84

    SHA256

    f7179ea05fa1f5b020004591f93a32c78057ca2c91e245a472de9dfdc5148053

    SHA512

    cca024da4061f37a3839214dea765d573f54c7c92fab9423d977e311d17d68cc5ace53be4d3c383b294058e2039b2eba4a2edddfde912d6d97821701182c9ef7

  • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

    Filesize

    1.1MB

    MD5

    16cff7175770af8d32089c080eec90eb

    SHA1

    bf346e99a9ff7cb4d115dfec7d7ad25ec011ca84

    SHA256

    f7179ea05fa1f5b020004591f93a32c78057ca2c91e245a472de9dfdc5148053

    SHA512

    cca024da4061f37a3839214dea765d573f54c7c92fab9423d977e311d17d68cc5ace53be4d3c383b294058e2039b2eba4a2edddfde912d6d97821701182c9ef7

  • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

    Filesize

    1.1MB

    MD5

    16cff7175770af8d32089c080eec90eb

    SHA1

    bf346e99a9ff7cb4d115dfec7d7ad25ec011ca84

    SHA256

    f7179ea05fa1f5b020004591f93a32c78057ca2c91e245a472de9dfdc5148053

    SHA512

    cca024da4061f37a3839214dea765d573f54c7c92fab9423d977e311d17d68cc5ace53be4d3c383b294058e2039b2eba4a2edddfde912d6d97821701182c9ef7

  • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

    Filesize

    1.1MB

    MD5

    16cff7175770af8d32089c080eec90eb

    SHA1

    bf346e99a9ff7cb4d115dfec7d7ad25ec011ca84

    SHA256

    f7179ea05fa1f5b020004591f93a32c78057ca2c91e245a472de9dfdc5148053

    SHA512

    cca024da4061f37a3839214dea765d573f54c7c92fab9423d977e311d17d68cc5ace53be4d3c383b294058e2039b2eba4a2edddfde912d6d97821701182c9ef7

  • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

    Filesize

    1.1MB

    MD5

    16cff7175770af8d32089c080eec90eb

    SHA1

    bf346e99a9ff7cb4d115dfec7d7ad25ec011ca84

    SHA256

    f7179ea05fa1f5b020004591f93a32c78057ca2c91e245a472de9dfdc5148053

    SHA512

    cca024da4061f37a3839214dea765d573f54c7c92fab9423d977e311d17d68cc5ace53be4d3c383b294058e2039b2eba4a2edddfde912d6d97821701182c9ef7

  • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

    Filesize

    1.1MB

    MD5

    c1243d2855dd67ff488ccc0f2402a97c

    SHA1

    f4bd32ae2022a6085e6b1c1f8a3e095bd2f093c1

    SHA256

    6678c5ac19ae49ab8604c3eda1407d34a6bfb3f98484bbf0a95fbff7ace00cb7

    SHA512

    6e02cef484a908b0d5920d7174a141ea9776231e217857ed981a23f9e056cbb1c2d31d44af8f115de8592a767104c37389efc51b469c6cc6c35e9547d98e73e0

  • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

    Filesize

    1.1MB

    MD5

    c1243d2855dd67ff488ccc0f2402a97c

    SHA1

    f4bd32ae2022a6085e6b1c1f8a3e095bd2f093c1

    SHA256

    6678c5ac19ae49ab8604c3eda1407d34a6bfb3f98484bbf0a95fbff7ace00cb7

    SHA512

    6e02cef484a908b0d5920d7174a141ea9776231e217857ed981a23f9e056cbb1c2d31d44af8f115de8592a767104c37389efc51b469c6cc6c35e9547d98e73e0

  • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

    Filesize

    1.1MB

    MD5

    c1243d2855dd67ff488ccc0f2402a97c

    SHA1

    f4bd32ae2022a6085e6b1c1f8a3e095bd2f093c1

    SHA256

    6678c5ac19ae49ab8604c3eda1407d34a6bfb3f98484bbf0a95fbff7ace00cb7

    SHA512

    6e02cef484a908b0d5920d7174a141ea9776231e217857ed981a23f9e056cbb1c2d31d44af8f115de8592a767104c37389efc51b469c6cc6c35e9547d98e73e0

  • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

    Filesize

    1.1MB

    MD5

    c1243d2855dd67ff488ccc0f2402a97c

    SHA1

    f4bd32ae2022a6085e6b1c1f8a3e095bd2f093c1

    SHA256

    6678c5ac19ae49ab8604c3eda1407d34a6bfb3f98484bbf0a95fbff7ace00cb7

    SHA512

    6e02cef484a908b0d5920d7174a141ea9776231e217857ed981a23f9e056cbb1c2d31d44af8f115de8592a767104c37389efc51b469c6cc6c35e9547d98e73e0

  • C:\Users\Admin\AppData\Roaming\svchcst.exe

    Filesize

    1.1MB

    MD5

    16cff7175770af8d32089c080eec90eb

    SHA1

    bf346e99a9ff7cb4d115dfec7d7ad25ec011ca84

    SHA256

    f7179ea05fa1f5b020004591f93a32c78057ca2c91e245a472de9dfdc5148053

    SHA512

    cca024da4061f37a3839214dea765d573f54c7c92fab9423d977e311d17d68cc5ace53be4d3c383b294058e2039b2eba4a2edddfde912d6d97821701182c9ef7

  • \Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

    Filesize

    1.1MB

    MD5

    16cff7175770af8d32089c080eec90eb

    SHA1

    bf346e99a9ff7cb4d115dfec7d7ad25ec011ca84

    SHA256

    f7179ea05fa1f5b020004591f93a32c78057ca2c91e245a472de9dfdc5148053

    SHA512

    cca024da4061f37a3839214dea765d573f54c7c92fab9423d977e311d17d68cc5ace53be4d3c383b294058e2039b2eba4a2edddfde912d6d97821701182c9ef7

  • \Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

    Filesize

    1.1MB

    MD5

    16cff7175770af8d32089c080eec90eb

    SHA1

    bf346e99a9ff7cb4d115dfec7d7ad25ec011ca84

    SHA256

    f7179ea05fa1f5b020004591f93a32c78057ca2c91e245a472de9dfdc5148053

    SHA512

    cca024da4061f37a3839214dea765d573f54c7c92fab9423d977e311d17d68cc5ace53be4d3c383b294058e2039b2eba4a2edddfde912d6d97821701182c9ef7

  • \Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

    Filesize

    1.1MB

    MD5

    16cff7175770af8d32089c080eec90eb

    SHA1

    bf346e99a9ff7cb4d115dfec7d7ad25ec011ca84

    SHA256

    f7179ea05fa1f5b020004591f93a32c78057ca2c91e245a472de9dfdc5148053

    SHA512

    cca024da4061f37a3839214dea765d573f54c7c92fab9423d977e311d17d68cc5ace53be4d3c383b294058e2039b2eba4a2edddfde912d6d97821701182c9ef7

  • \Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

    Filesize

    1.1MB

    MD5

    16cff7175770af8d32089c080eec90eb

    SHA1

    bf346e99a9ff7cb4d115dfec7d7ad25ec011ca84

    SHA256

    f7179ea05fa1f5b020004591f93a32c78057ca2c91e245a472de9dfdc5148053

    SHA512

    cca024da4061f37a3839214dea765d573f54c7c92fab9423d977e311d17d68cc5ace53be4d3c383b294058e2039b2eba4a2edddfde912d6d97821701182c9ef7

  • \Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

    Filesize

    1.1MB

    MD5

    16cff7175770af8d32089c080eec90eb

    SHA1

    bf346e99a9ff7cb4d115dfec7d7ad25ec011ca84

    SHA256

    f7179ea05fa1f5b020004591f93a32c78057ca2c91e245a472de9dfdc5148053

    SHA512

    cca024da4061f37a3839214dea765d573f54c7c92fab9423d977e311d17d68cc5ace53be4d3c383b294058e2039b2eba4a2edddfde912d6d97821701182c9ef7

  • \Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

    Filesize

    1.1MB

    MD5

    16cff7175770af8d32089c080eec90eb

    SHA1

    bf346e99a9ff7cb4d115dfec7d7ad25ec011ca84

    SHA256

    f7179ea05fa1f5b020004591f93a32c78057ca2c91e245a472de9dfdc5148053

    SHA512

    cca024da4061f37a3839214dea765d573f54c7c92fab9423d977e311d17d68cc5ace53be4d3c383b294058e2039b2eba4a2edddfde912d6d97821701182c9ef7

  • \Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

    Filesize

    1.1MB

    MD5

    16cff7175770af8d32089c080eec90eb

    SHA1

    bf346e99a9ff7cb4d115dfec7d7ad25ec011ca84

    SHA256

    f7179ea05fa1f5b020004591f93a32c78057ca2c91e245a472de9dfdc5148053

    SHA512

    cca024da4061f37a3839214dea765d573f54c7c92fab9423d977e311d17d68cc5ace53be4d3c383b294058e2039b2eba4a2edddfde912d6d97821701182c9ef7

  • \Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

    Filesize

    1.1MB

    MD5

    c1243d2855dd67ff488ccc0f2402a97c

    SHA1

    f4bd32ae2022a6085e6b1c1f8a3e095bd2f093c1

    SHA256

    6678c5ac19ae49ab8604c3eda1407d34a6bfb3f98484bbf0a95fbff7ace00cb7

    SHA512

    6e02cef484a908b0d5920d7174a141ea9776231e217857ed981a23f9e056cbb1c2d31d44af8f115de8592a767104c37389efc51b469c6cc6c35e9547d98e73e0

  • \Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

    Filesize

    1.1MB

    MD5

    c1243d2855dd67ff488ccc0f2402a97c

    SHA1

    f4bd32ae2022a6085e6b1c1f8a3e095bd2f093c1

    SHA256

    6678c5ac19ae49ab8604c3eda1407d34a6bfb3f98484bbf0a95fbff7ace00cb7

    SHA512

    6e02cef484a908b0d5920d7174a141ea9776231e217857ed981a23f9e056cbb1c2d31d44af8f115de8592a767104c37389efc51b469c6cc6c35e9547d98e73e0

  • \Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

    Filesize

    1.1MB

    MD5

    c1243d2855dd67ff488ccc0f2402a97c

    SHA1

    f4bd32ae2022a6085e6b1c1f8a3e095bd2f093c1

    SHA256

    6678c5ac19ae49ab8604c3eda1407d34a6bfb3f98484bbf0a95fbff7ace00cb7

    SHA512

    6e02cef484a908b0d5920d7174a141ea9776231e217857ed981a23f9e056cbb1c2d31d44af8f115de8592a767104c37389efc51b469c6cc6c35e9547d98e73e0