Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 20:31
Behavioral task
behavioral1
Sample
3b68e66152b7aecb2ce5916777c470cb.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3b68e66152b7aecb2ce5916777c470cb.exe
Resource
win10v2004-20231215-en
General
-
Target
3b68e66152b7aecb2ce5916777c470cb.exe
-
Size
24KB
-
MD5
3b68e66152b7aecb2ce5916777c470cb
-
SHA1
7a79df8415180728eb8e5e53b5954dff620e4765
-
SHA256
a427d646432979e1ada922b272e55461f41df736f49e614cefc1ac8e8595c340
-
SHA512
84a89d569004ae7a061adabd5650848fe15833a43e303059155c0c78f4f1210524901fca6ae7efad2b8eba4f450a6a463a27188b2fa0baa9a70bb51fb7b98743
-
SSDEEP
192:E+EsB3ysfnQ6UH1MeOwzxy+4du1DlZrIz26F0sRuxVmrknTQyKHin91dsfI2EtgK:E+EEysfj+MAz8+40lZE66FRHIKHgt5h
Malware Config
Signatures
-
Modifies Windows Firewall 1 TTPs 2 IoCs
pid Process 2756 netsh.exe 3064 netsh.exe -
Executes dropped EXE 1 IoCs
pid Process 2220 svcnet.exe -
Loads dropped DLL 2 IoCs
pid Process 2184 3b68e66152b7aecb2ce5916777c470cb.exe 2184 3b68e66152b7aecb2ce5916777c470cb.exe -
resource yara_rule behavioral1/memory/2184-0-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/files/0x000b000000012262-11.dat upx behavioral1/memory/2184-17-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/memory/2220-20-0x0000000000400000-0x000000000040E000-memory.dmp upx -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Shell API32 = "svcnet.exe" svcnet.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Run\Shell API32 = "svcnet.exe" svcnet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Shell API32 = "svcnet.exe" 3b68e66152b7aecb2ce5916777c470cb.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Run\Shell API32 = "svcnet.exe" 3b68e66152b7aecb2ce5916777c470cb.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\svcnet.exe 3b68e66152b7aecb2ce5916777c470cb.exe File opened for modification C:\Windows\SysWOW64\svcnet.exe 3b68e66152b7aecb2ce5916777c470cb.exe File created C:\Windows\SysWOW64\svcnet.exe svcnet.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2184 wrote to memory of 2644 2184 3b68e66152b7aecb2ce5916777c470cb.exe 28 PID 2184 wrote to memory of 2644 2184 3b68e66152b7aecb2ce5916777c470cb.exe 28 PID 2184 wrote to memory of 2644 2184 3b68e66152b7aecb2ce5916777c470cb.exe 28 PID 2184 wrote to memory of 2644 2184 3b68e66152b7aecb2ce5916777c470cb.exe 28 PID 2184 wrote to memory of 2220 2184 3b68e66152b7aecb2ce5916777c470cb.exe 30 PID 2184 wrote to memory of 2220 2184 3b68e66152b7aecb2ce5916777c470cb.exe 30 PID 2184 wrote to memory of 2220 2184 3b68e66152b7aecb2ce5916777c470cb.exe 30 PID 2184 wrote to memory of 2220 2184 3b68e66152b7aecb2ce5916777c470cb.exe 30 PID 2644 wrote to memory of 2756 2644 cmd.exe 31 PID 2644 wrote to memory of 2756 2644 cmd.exe 31 PID 2644 wrote to memory of 2756 2644 cmd.exe 31 PID 2644 wrote to memory of 2756 2644 cmd.exe 31 PID 2644 wrote to memory of 3064 2644 cmd.exe 32 PID 2644 wrote to memory of 3064 2644 cmd.exe 32 PID 2644 wrote to memory of 3064 2644 cmd.exe 32 PID 2644 wrote to memory of 3064 2644 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\3b68e66152b7aecb2ce5916777c470cb.exe"C:\Users\Admin\AppData\Local\Temp\3b68e66152b7aecb2ce5916777c470cb.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\175.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\SysWOW64\netsh.exenetsh firewall set allowedprogram "C:\Windows\system32\svcnet.exe"3⤵
- Modifies Windows Firewall
PID:2756
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall set allowedprogram C:\Windows\system32\svcnet.exe3⤵
- Modifies Windows Firewall
PID:3064
-
-
-
C:\Windows\SysWOW64\svcnet.exe"C:\Windows\system32\svcnet.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:2220
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
195B
MD56dacfa6be897cdf83df9b94112f46e61
SHA1fd494e4513fd61c8b856b118a42dfbf5c0b2b9f3
SHA256aeb29c6fc2ec71338be26c6326b033358ad48c3f29dbc5d0329267dce5e295a7
SHA51250dd2a8077241fa3ebd1bb189a5d61bee16c9b98566c5629966047321ab291672e3b9e4b282575d2a75a44b15646fcfed476071fbb9e35d0038db8584b5191a6
-
Filesize
24KB
MD53b68e66152b7aecb2ce5916777c470cb
SHA17a79df8415180728eb8e5e53b5954dff620e4765
SHA256a427d646432979e1ada922b272e55461f41df736f49e614cefc1ac8e8595c340
SHA51284a89d569004ae7a061adabd5650848fe15833a43e303059155c0c78f4f1210524901fca6ae7efad2b8eba4f450a6a463a27188b2fa0baa9a70bb51fb7b98743