Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
26/11/2023, 08:46
Static task
static1
Behavioral task
behavioral1
Sample
b35e1b1fa32a323b029b01b9cf136309.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
b35e1b1fa32a323b029b01b9cf136309.exe
Resource
win10v2004-20231020-en
General
-
Target
b35e1b1fa32a323b029b01b9cf136309.exe
-
Size
209KB
-
MD5
b35e1b1fa32a323b029b01b9cf136309
-
SHA1
1e2ce20398031c3ca7af5bc37e8db72210c3eae8
-
SHA256
a6320d82830e7f5e29a80342019dc44272096f8473afec272dfd1bfc5c4d80a0
-
SHA512
a136fe87a6941056117328056bd80bab2b8e653d57dc4a76e5998bf6ad253aaa3e01536a78cf4194f3b97e496cbb9d42beaa2eb428a34a8dc77c9ed820b70690
-
SSDEEP
6144:YOB8K/S3r3FfK3yDrjQVEzUIVhK+2aZyRO:YBKKzFfKCbQVEzNz4R
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4468 svchost.exe -
Modifies WinLogon 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\803da75 = "C:\\Windows\\apppatch\\svchost.exe" b35e1b1fa32a323b029b01b9cf136309.exe -
Drops file in Program Files directory 20 IoCs
description ioc Process File created C:\Program Files (x86)\Windows Defender\pupycag.com svchost.exe File created C:\Program Files (x86)\Windows Defender\pupydeq.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vofycot.com svchost.exe File created C:\Program Files (x86)\Windows Defender\gatyhub.com svchost.exe File created C:\Program Files (x86)\Windows Defender\gahyhiz.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vocyzit.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lysyfyj.com svchost.exe File created C:\Program Files (x86)\Windows Defender\galynuh.com svchost.exe File created C:\Program Files (x86)\Windows Defender\gadyciz.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lygyvuj.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lymyxid.com svchost.exe File created C:\Program Files (x86)\Windows Defender\galyqaz.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qexyhuv.com svchost.exe File created C:\Program Files (x86)\Windows Defender\purylev.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qetyhyg.com svchost.exe File created C:\Program Files (x86)\Windows Defender\volykit.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qetyfuv.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vojyqem.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vonypom.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lyrysor.com svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe b35e1b1fa32a323b029b01b9cf136309.exe File opened for modification C:\Windows\apppatch\svchost.exe b35e1b1fa32a323b029b01b9cf136309.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000_Classes\Local Settings\MuiCache svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4468 svchost.exe 4468 svchost.exe 4468 svchost.exe 4468 svchost.exe 4468 svchost.exe 4468 svchost.exe 4468 svchost.exe 4468 svchost.exe 4468 svchost.exe 4468 svchost.exe 4468 svchost.exe 4468 svchost.exe 4468 svchost.exe 4468 svchost.exe 4468 svchost.exe 4468 svchost.exe 4468 svchost.exe 4468 svchost.exe 4468 svchost.exe 4468 svchost.exe 4468 svchost.exe 4468 svchost.exe 4468 svchost.exe 4468 svchost.exe 4468 svchost.exe 4468 svchost.exe 4468 svchost.exe 4468 svchost.exe 4468 svchost.exe 4468 svchost.exe 4468 svchost.exe 4468 svchost.exe 4468 svchost.exe 4468 svchost.exe 4468 svchost.exe 4468 svchost.exe 4468 svchost.exe 4468 svchost.exe 4468 svchost.exe 4468 svchost.exe 4468 svchost.exe 4468 svchost.exe 4468 svchost.exe 4468 svchost.exe 4468 svchost.exe 4468 svchost.exe 4468 svchost.exe 4468 svchost.exe 4468 svchost.exe 4468 svchost.exe 4468 svchost.exe 4468 svchost.exe 4468 svchost.exe 4468 svchost.exe 4468 svchost.exe 4468 svchost.exe 4468 svchost.exe 4468 svchost.exe 4468 svchost.exe 4468 svchost.exe 4468 svchost.exe 4468 svchost.exe 4468 svchost.exe 4468 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3604 b35e1b1fa32a323b029b01b9cf136309.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeSecurityPrivilege 3604 b35e1b1fa32a323b029b01b9cf136309.exe Token: SeSecurityPrivilege 3604 b35e1b1fa32a323b029b01b9cf136309.exe Token: SeSecurityPrivilege 4468 svchost.exe Token: SeSecurityPrivilege 4468 svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3604 wrote to memory of 4468 3604 b35e1b1fa32a323b029b01b9cf136309.exe 86 PID 3604 wrote to memory of 4468 3604 b35e1b1fa32a323b029b01b9cf136309.exe 86 PID 3604 wrote to memory of 4468 3604 b35e1b1fa32a323b029b01b9cf136309.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\b35e1b1fa32a323b029b01b9cf136309.exe"C:\Users\Admin\AppData\Local\Temp\b35e1b1fa32a323b029b01b9cf136309.exe"1⤵
- Modifies WinLogon
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3604 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4468
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168B
MD5d57e3a550060f85d44a175139ea23021
SHA12c5cb3428a322c9709a34d04dd86fe7628f8f0a6
SHA25643edf068d34276e8ade4113d4d7207de19fc98a2ae1c07298e593edae2a8774c
SHA5120364fe6a010fce7a3f4a6344c84468c64b20fd131f3160fc649db78f1075ba52d8a1c4496e50dbe27c357e01ee52e94cdcda8f7927cba28d5f2f45b9da690063
-
Filesize
209KB
MD593e9dbdc032b7697ed742d45dd5cd9fb
SHA1d5365bb31bb199a0b01dd525fbefbc4ccb07f116
SHA256c97c14f6722c28c5f4e8705437e970b40fb92dccc066ad081f59852281df821d
SHA512bd88762b0a7b906f8da6296948f2c4700e0b6fe3b274e87c1e738d8c2c4640c7b443b36879b0c648222eb61d99a9b45ff81204f457e08e97bd1ed7d67321da32
-
Filesize
209KB
MD593e9dbdc032b7697ed742d45dd5cd9fb
SHA1d5365bb31bb199a0b01dd525fbefbc4ccb07f116
SHA256c97c14f6722c28c5f4e8705437e970b40fb92dccc066ad081f59852281df821d
SHA512bd88762b0a7b906f8da6296948f2c4700e0b6fe3b274e87c1e738d8c2c4640c7b443b36879b0c648222eb61d99a9b45ff81204f457e08e97bd1ed7d67321da32
-
Filesize
209KB
MD593e9dbdc032b7697ed742d45dd5cd9fb
SHA1d5365bb31bb199a0b01dd525fbefbc4ccb07f116
SHA256c97c14f6722c28c5f4e8705437e970b40fb92dccc066ad081f59852281df821d
SHA512bd88762b0a7b906f8da6296948f2c4700e0b6fe3b274e87c1e738d8c2c4640c7b443b36879b0c648222eb61d99a9b45ff81204f457e08e97bd1ed7d67321da32