Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
175s -
max time network
172s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 06:13
Static task
static1
Behavioral task
behavioral1
Sample
0acd998bcf05696e1dec4982df4f137e.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0acd998bcf05696e1dec4982df4f137e.exe
Resource
win10v2004-20231215-en
General
-
Target
0acd998bcf05696e1dec4982df4f137e.exe
-
Size
102KB
-
MD5
0acd998bcf05696e1dec4982df4f137e
-
SHA1
b451ee0f2e35ee2c4e2325720b829e17dd37c46e
-
SHA256
12b624e3beff8a9739025fc3fd411a94f9b0fe88a1037d64b73a3dd48c868996
-
SHA512
8252fe4a2c6e4944beb584f136299ee6b582c0456e473f548fe08dd569793bf27a6d47a9d2f7313bd5a4ed17ee42aceb5b6dfae4089c7c9d4a6f1196cb9390de
-
SSDEEP
3072:mDR+nfZhKqreB4Iz9he/znFYy6ThYA+oSPrICGk7:mDQX9eH7Inqy6ThYAvarICGk7
Malware Config
Signatures
-
Executes dropped EXE 10 IoCs
pid Process 2956 smgs.exe 3312 smgs.exe 444 smgs.exe 3272 smgs.exe 4956 smgs.exe 1608 smgs.exe 3224 smgs.exe 4408 smgs.exe 4336 smgs.exe 3324 smgs.exe -
Drops file in System32 directory 22 IoCs
description ioc Process File created C:\Windows\SysWOW64\smgs.exe smgs.exe File opened for modification C:\Windows\SysWOW64\smgs.exe smgs.exe File created C:\Windows\SysWOW64\smgs.exe smgs.exe File created C:\Windows\SysWOW64\smgs.exe 0acd998bcf05696e1dec4982df4f137e.exe File opened for modification C:\Windows\SysWOW64\smgs.exe smgs.exe File opened for modification C:\Windows\SysWOW64\smgs.exe smgs.exe File created C:\Windows\SysWOW64\smgs.exe smgs.exe File created C:\Windows\SysWOW64\smgs.exe smgs.exe File opened for modification C:\Windows\SysWOW64\smgs.exe smgs.exe File created C:\Windows\SysWOW64\smgs.exe smgs.exe File opened for modification C:\Windows\SysWOW64\smgs.exe smgs.exe File opened for modification C:\Windows\SysWOW64\smgs.exe smgs.exe File created C:\Windows\SysWOW64\smgs.exe smgs.exe File opened for modification C:\Windows\SysWOW64\smgs.exe smgs.exe File opened for modification C:\Windows\SysWOW64\smgs.exe smgs.exe File opened for modification C:\Windows\SysWOW64\smgs.exe 0acd998bcf05696e1dec4982df4f137e.exe File created C:\Windows\SysWOW64\smgs.exe smgs.exe File created C:\Windows\SysWOW64\smgs.exe smgs.exe File opened for modification C:\Windows\SysWOW64\smgs.exe smgs.exe File opened for modification C:\Windows\SysWOW64\smgs.exe smgs.exe File created C:\Windows\SysWOW64\smgs.exe smgs.exe File created C:\Windows\SysWOW64\smgs.exe smgs.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 4020 wrote to memory of 2956 4020 0acd998bcf05696e1dec4982df4f137e.exe 93 PID 4020 wrote to memory of 2956 4020 0acd998bcf05696e1dec4982df4f137e.exe 93 PID 4020 wrote to memory of 2956 4020 0acd998bcf05696e1dec4982df4f137e.exe 93 PID 2956 wrote to memory of 3312 2956 smgs.exe 100 PID 2956 wrote to memory of 3312 2956 smgs.exe 100 PID 2956 wrote to memory of 3312 2956 smgs.exe 100 PID 3312 wrote to memory of 444 3312 smgs.exe 101 PID 3312 wrote to memory of 444 3312 smgs.exe 101 PID 3312 wrote to memory of 444 3312 smgs.exe 101 PID 444 wrote to memory of 3272 444 smgs.exe 105 PID 444 wrote to memory of 3272 444 smgs.exe 105 PID 444 wrote to memory of 3272 444 smgs.exe 105 PID 3272 wrote to memory of 4956 3272 smgs.exe 108 PID 3272 wrote to memory of 4956 3272 smgs.exe 108 PID 3272 wrote to memory of 4956 3272 smgs.exe 108 PID 4956 wrote to memory of 1608 4956 smgs.exe 111 PID 4956 wrote to memory of 1608 4956 smgs.exe 111 PID 4956 wrote to memory of 1608 4956 smgs.exe 111 PID 1608 wrote to memory of 3224 1608 smgs.exe 115 PID 1608 wrote to memory of 3224 1608 smgs.exe 115 PID 1608 wrote to memory of 3224 1608 smgs.exe 115 PID 3224 wrote to memory of 4408 3224 smgs.exe 116 PID 3224 wrote to memory of 4408 3224 smgs.exe 116 PID 3224 wrote to memory of 4408 3224 smgs.exe 116 PID 4408 wrote to memory of 4336 4408 smgs.exe 117 PID 4408 wrote to memory of 4336 4408 smgs.exe 117 PID 4408 wrote to memory of 4336 4408 smgs.exe 117 PID 4336 wrote to memory of 3324 4336 smgs.exe 118 PID 4336 wrote to memory of 3324 4336 smgs.exe 118 PID 4336 wrote to memory of 3324 4336 smgs.exe 118
Processes
-
C:\Users\Admin\AppData\Local\Temp\0acd998bcf05696e1dec4982df4f137e.exe"C:\Users\Admin\AppData\Local\Temp\0acd998bcf05696e1dec4982df4f137e.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4020 -
C:\Windows\SysWOW64\smgs.exeC:\Windows\system32\smgs.exe 1156 "C:\Users\Admin\AppData\Local\Temp\0acd998bcf05696e1dec4982df4f137e.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Windows\SysWOW64\smgs.exeC:\Windows\system32\smgs.exe 1152 "C:\Windows\SysWOW64\smgs.exe"3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3312 -
C:\Windows\SysWOW64\smgs.exeC:\Windows\system32\smgs.exe 972 "C:\Windows\SysWOW64\smgs.exe"4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:444 -
C:\Windows\SysWOW64\smgs.exeC:\Windows\system32\smgs.exe 1124 "C:\Windows\SysWOW64\smgs.exe"5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3272 -
C:\Windows\SysWOW64\smgs.exeC:\Windows\system32\smgs.exe 1128 "C:\Windows\SysWOW64\smgs.exe"6⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Windows\SysWOW64\smgs.exeC:\Windows\system32\smgs.exe 1140 "C:\Windows\SysWOW64\smgs.exe"7⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Windows\SysWOW64\smgs.exeC:\Windows\system32\smgs.exe 1132 "C:\Windows\SysWOW64\smgs.exe"8⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3224 -
C:\Windows\SysWOW64\smgs.exeC:\Windows\system32\smgs.exe 1144 "C:\Windows\SysWOW64\smgs.exe"9⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4408 -
C:\Windows\SysWOW64\smgs.exeC:\Windows\system32\smgs.exe 1136 "C:\Windows\SysWOW64\smgs.exe"10⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4336 -
C:\Windows\SysWOW64\smgs.exeC:\Windows\system32\smgs.exe 1148 "C:\Windows\SysWOW64\smgs.exe"11⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3324
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
102KB
MD50acd998bcf05696e1dec4982df4f137e
SHA1b451ee0f2e35ee2c4e2325720b829e17dd37c46e
SHA25612b624e3beff8a9739025fc3fd411a94f9b0fe88a1037d64b73a3dd48c868996
SHA5128252fe4a2c6e4944beb584f136299ee6b582c0456e473f548fe08dd569793bf27a6d47a9d2f7313bd5a4ed17ee42aceb5b6dfae4089c7c9d4a6f1196cb9390de