Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 15:25
Behavioral task
behavioral1
Sample
78c41bf988c1f039681b3b82f6ce8b3f.exe
Resource
win7-20231215-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
78c41bf988c1f039681b3b82f6ce8b3f.exe
Resource
win10v2004-20231222-en
2 signatures
150 seconds
General
-
Target
78c41bf988c1f039681b3b82f6ce8b3f.exe
-
Size
43KB
-
MD5
78c41bf988c1f039681b3b82f6ce8b3f
-
SHA1
036b50d8ac533170a0fc37afb380a7f7de19c4d6
-
SHA256
6aed67946cd8ab98720bd73e67349d10927b826e707fae055da834578fe0411c
-
SHA512
0d54accbf781aa3c44b0b00f8a57fbed38333aa4d375a20ec2992116423c6fb3cef03d97ba689af1f1b25afe6387f019d3a929ef5499897904941f4c9ad7eb4c
-
SSDEEP
768:APIFTS2hJL766WdUxYnisdbA5xqvqGVfDOFwoY0Tlr8tydg1lx9qzn:rS2hJLgazsBOMvHfDOFc0TlrIR2
Score
8/10
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Microsoft = "C:\\Users\\Admin\\AppData\\Roaming\\smss.exe" svchost.exe -
Deletes itself 1 IoCs
pid Process 2192 svchost.exe -
resource yara_rule behavioral1/memory/2248-0-0x0000000000400000-0x0000000000420000-memory.dmp upx -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2248 78c41bf988c1f039681b3b82f6ce8b3f.exe 2248 78c41bf988c1f039681b3b82f6ce8b3f.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2248 wrote to memory of 2192 2248 78c41bf988c1f039681b3b82f6ce8b3f.exe 28 PID 2248 wrote to memory of 2192 2248 78c41bf988c1f039681b3b82f6ce8b3f.exe 28 PID 2248 wrote to memory of 2192 2248 78c41bf988c1f039681b3b82f6ce8b3f.exe 28 PID 2248 wrote to memory of 2192 2248 78c41bf988c1f039681b3b82f6ce8b3f.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\78c41bf988c1f039681b3b82f6ce8b3f.exe"C:\Users\Admin\AppData\Local\Temp\78c41bf988c1f039681b3b82f6ce8b3f.exe"1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Adds policy Run key to start application
- Deletes itself
PID:2192
-