Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
137s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 06:13
Static task
static1
Behavioral task
behavioral1
Sample
0acd998bcf05696e1dec4982df4f137e.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0acd998bcf05696e1dec4982df4f137e.exe
Resource
win10v2004-20231215-en
General
-
Target
0acd998bcf05696e1dec4982df4f137e.exe
-
Size
102KB
-
MD5
0acd998bcf05696e1dec4982df4f137e
-
SHA1
b451ee0f2e35ee2c4e2325720b829e17dd37c46e
-
SHA256
12b624e3beff8a9739025fc3fd411a94f9b0fe88a1037d64b73a3dd48c868996
-
SHA512
8252fe4a2c6e4944beb584f136299ee6b582c0456e473f548fe08dd569793bf27a6d47a9d2f7313bd5a4ed17ee42aceb5b6dfae4089c7c9d4a6f1196cb9390de
-
SSDEEP
3072:mDR+nfZhKqreB4Iz9he/znFYy6ThYA+oSPrICGk7:mDQX9eH7Inqy6ThYAvarICGk7
Malware Config
Signatures
-
Executes dropped EXE 10 IoCs
pid Process 1312 smgs.exe 2608 smgs.exe 3008 smgs.exe 2572 smgs.exe 2800 smgs.exe 2160 smgs.exe 2648 smgs.exe 1780 smgs.exe 1968 smgs.exe 284 smgs.exe -
Loads dropped DLL 20 IoCs
pid Process 2112 0acd998bcf05696e1dec4982df4f137e.exe 2112 0acd998bcf05696e1dec4982df4f137e.exe 1312 smgs.exe 1312 smgs.exe 2608 smgs.exe 2608 smgs.exe 3008 smgs.exe 3008 smgs.exe 2572 smgs.exe 2572 smgs.exe 2800 smgs.exe 2800 smgs.exe 2160 smgs.exe 2160 smgs.exe 2648 smgs.exe 2648 smgs.exe 1780 smgs.exe 1780 smgs.exe 1968 smgs.exe 1968 smgs.exe -
Drops file in System32 directory 22 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\smgs.exe smgs.exe File opened for modification C:\Windows\SysWOW64\smgs.exe smgs.exe File created C:\Windows\SysWOW64\smgs.exe smgs.exe File created C:\Windows\SysWOW64\smgs.exe smgs.exe File created C:\Windows\SysWOW64\smgs.exe smgs.exe File created C:\Windows\SysWOW64\smgs.exe smgs.exe File created C:\Windows\SysWOW64\smgs.exe smgs.exe File opened for modification C:\Windows\SysWOW64\smgs.exe smgs.exe File created C:\Windows\SysWOW64\smgs.exe smgs.exe File created C:\Windows\SysWOW64\smgs.exe 0acd998bcf05696e1dec4982df4f137e.exe File created C:\Windows\SysWOW64\smgs.exe smgs.exe File opened for modification C:\Windows\SysWOW64\smgs.exe smgs.exe File opened for modification C:\Windows\SysWOW64\smgs.exe smgs.exe File opened for modification C:\Windows\SysWOW64\smgs.exe smgs.exe File opened for modification C:\Windows\SysWOW64\smgs.exe smgs.exe File created C:\Windows\SysWOW64\smgs.exe smgs.exe File created C:\Windows\SysWOW64\smgs.exe smgs.exe File opened for modification C:\Windows\SysWOW64\smgs.exe smgs.exe File created C:\Windows\SysWOW64\smgs.exe smgs.exe File opened for modification C:\Windows\SysWOW64\smgs.exe 0acd998bcf05696e1dec4982df4f137e.exe File opened for modification C:\Windows\SysWOW64\smgs.exe smgs.exe File opened for modification C:\Windows\SysWOW64\smgs.exe smgs.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 2112 wrote to memory of 1312 2112 0acd998bcf05696e1dec4982df4f137e.exe 28 PID 2112 wrote to memory of 1312 2112 0acd998bcf05696e1dec4982df4f137e.exe 28 PID 2112 wrote to memory of 1312 2112 0acd998bcf05696e1dec4982df4f137e.exe 28 PID 2112 wrote to memory of 1312 2112 0acd998bcf05696e1dec4982df4f137e.exe 28 PID 1312 wrote to memory of 2608 1312 smgs.exe 29 PID 1312 wrote to memory of 2608 1312 smgs.exe 29 PID 1312 wrote to memory of 2608 1312 smgs.exe 29 PID 1312 wrote to memory of 2608 1312 smgs.exe 29 PID 2608 wrote to memory of 3008 2608 smgs.exe 30 PID 2608 wrote to memory of 3008 2608 smgs.exe 30 PID 2608 wrote to memory of 3008 2608 smgs.exe 30 PID 2608 wrote to memory of 3008 2608 smgs.exe 30 PID 3008 wrote to memory of 2572 3008 smgs.exe 31 PID 3008 wrote to memory of 2572 3008 smgs.exe 31 PID 3008 wrote to memory of 2572 3008 smgs.exe 31 PID 3008 wrote to memory of 2572 3008 smgs.exe 31 PID 2572 wrote to memory of 2800 2572 smgs.exe 34 PID 2572 wrote to memory of 2800 2572 smgs.exe 34 PID 2572 wrote to memory of 2800 2572 smgs.exe 34 PID 2572 wrote to memory of 2800 2572 smgs.exe 34 PID 2800 wrote to memory of 2160 2800 smgs.exe 35 PID 2800 wrote to memory of 2160 2800 smgs.exe 35 PID 2800 wrote to memory of 2160 2800 smgs.exe 35 PID 2800 wrote to memory of 2160 2800 smgs.exe 35 PID 2160 wrote to memory of 2648 2160 smgs.exe 36 PID 2160 wrote to memory of 2648 2160 smgs.exe 36 PID 2160 wrote to memory of 2648 2160 smgs.exe 36 PID 2160 wrote to memory of 2648 2160 smgs.exe 36 PID 2648 wrote to memory of 1780 2648 smgs.exe 37 PID 2648 wrote to memory of 1780 2648 smgs.exe 37 PID 2648 wrote to memory of 1780 2648 smgs.exe 37 PID 2648 wrote to memory of 1780 2648 smgs.exe 37 PID 1780 wrote to memory of 1968 1780 smgs.exe 38 PID 1780 wrote to memory of 1968 1780 smgs.exe 38 PID 1780 wrote to memory of 1968 1780 smgs.exe 38 PID 1780 wrote to memory of 1968 1780 smgs.exe 38 PID 1968 wrote to memory of 284 1968 smgs.exe 39 PID 1968 wrote to memory of 284 1968 smgs.exe 39 PID 1968 wrote to memory of 284 1968 smgs.exe 39 PID 1968 wrote to memory of 284 1968 smgs.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\0acd998bcf05696e1dec4982df4f137e.exe"C:\Users\Admin\AppData\Local\Temp\0acd998bcf05696e1dec4982df4f137e.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Windows\SysWOW64\smgs.exeC:\Windows\system32\smgs.exe 480 "C:\Users\Admin\AppData\Local\Temp\0acd998bcf05696e1dec4982df4f137e.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Windows\SysWOW64\smgs.exeC:\Windows\system32\smgs.exe 548 "C:\Windows\SysWOW64\smgs.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\SysWOW64\smgs.exeC:\Windows\system32\smgs.exe 540 "C:\Windows\SysWOW64\smgs.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\SysWOW64\smgs.exeC:\Windows\system32\smgs.exe 532 "C:\Windows\SysWOW64\smgs.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\SysWOW64\smgs.exeC:\Windows\system32\smgs.exe 552 "C:\Windows\SysWOW64\smgs.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\SysWOW64\smgs.exeC:\Windows\system32\smgs.exe 560 "C:\Windows\SysWOW64\smgs.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Windows\SysWOW64\smgs.exeC:\Windows\system32\smgs.exe 536 "C:\Windows\SysWOW64\smgs.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\SysWOW64\smgs.exeC:\Windows\system32\smgs.exe 564 "C:\Windows\SysWOW64\smgs.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Windows\SysWOW64\smgs.exeC:\Windows\system32\smgs.exe 544 "C:\Windows\SysWOW64\smgs.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Windows\SysWOW64\smgs.exeC:\Windows\system32\smgs.exe 556 "C:\Windows\SysWOW64\smgs.exe"11⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:284
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
102KB
MD50acd998bcf05696e1dec4982df4f137e
SHA1b451ee0f2e35ee2c4e2325720b829e17dd37c46e
SHA25612b624e3beff8a9739025fc3fd411a94f9b0fe88a1037d64b73a3dd48c868996
SHA5128252fe4a2c6e4944beb584f136299ee6b582c0456e473f548fe08dd569793bf27a6d47a9d2f7313bd5a4ed17ee42aceb5b6dfae4089c7c9d4a6f1196cb9390de