Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
7s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
28/12/2023, 21:34
Static task
static1
Behavioral task
behavioral1
Sample
f9aa95e6164dc84ce3239ed4113501b3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
f9aa95e6164dc84ce3239ed4113501b3.exe
Resource
win10v2004-20231215-en
General
-
Target
f9aa95e6164dc84ce3239ed4113501b3.exe
-
Size
208KB
-
MD5
f9aa95e6164dc84ce3239ed4113501b3
-
SHA1
18c9d51860bfba976c3408460029b7ec2e60362f
-
SHA256
598dc8235dab8788f4fd1392d666f21a74043b2ee52e0a03c25d9f74d0f41872
-
SHA512
e9187dd29a13dc1c741a704e8a1deff6a8dda83ef9e4533fbc74bdc2679e39b5743ce69581623450f6cd3d28220dc3c652331ee1318f4d0dc53dc52b98f109e1
-
SSDEEP
6144:wiuUDq+7K5zL0tM9QaUBSt6X+XrE/fWhvL8Y:Ju0qqKi2QQtsUr+fW9t
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 4492 svchost.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\9892fd04 = "C:\\Windows\\apppatch\\svchost.exe" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\9892fd04 = "C:\\Windows\\apppatch\\svchost.exe" f9aa95e6164dc84ce3239ed4113501b3.exe -
Drops file in Program Files directory 8 IoCs
description ioc Process File created C:\Program Files (x86)\Windows Defender\gahyqah.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vocyzit.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\vocyzit.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\gahyqah.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qetyfuv.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\qetyfuv.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vonypom.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\vonypom.com svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe f9aa95e6164dc84ce3239ed4113501b3.exe File opened for modification C:\Windows\apppatch\svchost.exe f9aa95e6164dc84ce3239ed4113501b3.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3684 4492 WerFault.exe 55 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4492 svchost.exe 4492 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1008 f9aa95e6164dc84ce3239ed4113501b3.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1008 wrote to memory of 4492 1008 f9aa95e6164dc84ce3239ed4113501b3.exe 55 PID 1008 wrote to memory of 4492 1008 f9aa95e6164dc84ce3239ed4113501b3.exe 55 PID 1008 wrote to memory of 4492 1008 f9aa95e6164dc84ce3239ed4113501b3.exe 55
Processes
-
C:\Users\Admin\AppData\Local\Temp\f9aa95e6164dc84ce3239ed4113501b3.exe"C:\Users\Admin\AppData\Local\Temp\f9aa95e6164dc84ce3239ed4113501b3.exe"1⤵
- Modifies WinLogon
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1008 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:4492 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4492 -s 39283⤵
- Program crash
PID:3684
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4492 -ip 44921⤵PID:1980
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22KB
MD50a5bc5f0d2fac6781cba26755c6e1c81
SHA18ff7bdbe447327ae80cfeaac03c9af109f66cda2
SHA256a506c7a466858267726bb09bf48d1c76f24df0c0e913b3ae48cbeea84b2aaf21
SHA512008914c935c9c0430a90c705d1b50bfd468729641b33145a5f30c055c973ba1b16fdefa79d5137dca896a3a775d9ad540efd25c8d7d6cf9a8bc687b89975e4ee
-
Filesize
593B
MD5926512864979bc27cf187f1de3f57aff
SHA1acdeb9d6187932613c7fa08eaf28f0cd8116f4b5
SHA256b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f
SHA512f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b
-
Filesize
9KB
MD523ecdaa65e1ba192d8b67ce81e9ecbec
SHA103b5bb3b4cefcbf1918f342a567a9cf22a070dcc
SHA256c05e50de375ef92786759a3aca9be2ae35fd109361a6e964590cb27abd77c854
SHA5124882545c7de68f6e204a31eb0e9ab6daa1918046ece46ac52ecbfac08c77c255a2c86ffd8eff26cb66df19e7ae0522cdd690218a6eee5c002c430bc55366db40
-
Filesize
1KB
MD56f602afff4e164edbc78917f08436d10
SHA19797c256e106811a73e25687aa97e19a732baaef
SHA256866edd1ecb7a561c3a18431bc3e1f5eb54020221c077e1e8bdf8ca573ff7d1a6
SHA512c80eaf45b7d7e2e06879777aa3fc21cd1038e07acc05f5ee97fda5d1bfffbcd8d1a8319c5eacc47f29742c47ee9f50949a61020825bd6e7adf73e63cf6c7ab09
-
Filesize
481B
MD524db7d17687e84ebbfd9c181be00f1a2
SHA1acaaa7d6e6671332c1efd093e555c6424a2ad5b0
SHA256f7f13fe4fb7fc002f15c9b3c54020626a4a27817f376a87677fcf99c1f56aebf
SHA512f56776b894d2ba6e5207e2c45ce3be62f548a86f6caeef50ba253fe1e197ccd9226c4d41a8ca98d54a3e4898f90e475b57e9c3522c3ab162ff4df075426904c6
-
Filesize
2KB
MD5a8fdd0012e6998420474a0c0669327c4
SHA1aa0b687e766c259a247c16677f4c631ce542fc6e
SHA25685a0119ffb919c7b1157dabbc8e40897f97ce6544f89931e503564966057d5d6
SHA512bd834b7119f51ef0c741d2c0696e449e13a003140ad631f5e272130cac2d30f8cb25a5e76cc415ddf6208ee920efed6c7c33519b8f1bd02dd4ae8d3f39e926f5
-
Filesize
2KB
MD5699457d95715adef8b0f6180dbc8c159
SHA1e85025ee2626565365e7811528b38227ab58df1b
SHA256ae60e9a99e4ec8fd1bca81b561d2ea30fd098954fd1a27d028d91e97562c454d
SHA512ea36139392e5dd7abe61b5b8dff5c78c9cf2bd074fc167489809c5ca5c341aba4a1aec2e06b8f1e94e6b988d0dcaccfdd03ce579745bb306a63ca522a0d19707
-
Filesize
168B
MD5d57e3a550060f85d44a175139ea23021
SHA12c5cb3428a322c9709a34d04dd86fe7628f8f0a6
SHA25643edf068d34276e8ade4113d4d7207de19fc98a2ae1c07298e593edae2a8774c
SHA5120364fe6a010fce7a3f4a6344c84468c64b20fd131f3160fc649db78f1075ba52d8a1c4496e50dbe27c357e01ee52e94cdcda8f7927cba28d5f2f45b9da690063
-
Filesize
11KB
MD563ed6e760b443c8aab038c34587fe9dc
SHA1bf521cbffdd86da608201961b56539339293bc06
SHA2563df95c721db87c276895939f01187fa1ae91d099ebb18ba8c64fa312775b50cc
SHA512b5a1f10c44ec0535651d051e073796b7beaff4fd4e0c9d6b2a57f3a76e6a248be3be145876337fff9c19b974add3ceb3a4f7096fbba9d1adc08cd81e76647ad6
-
Filesize
52KB
MD587e78595214025d653d35be9c12c8bef
SHA10a43b61c8bf271e5b7bed59b9900b10a563feb43
SHA256a9f9d4578287ac9d9e066c6875c58a156702d04159ba2bfaa03ff9d4b0958a8e
SHA51226f60ce7609e10ba711e896f372ca7f638fcdc62fd33ff3c68997f2a9fd4caef315335579abcad90cccee4b9e8970ebf723b589145d0338eeba70f7df14080df
-
Filesize
52KB
MD57c006e6c99ebe21a640f708e736ad070
SHA13288e6eba176a1a6cd23bd33fcc8569866241b20
SHA256b529a7158111048868c1f63a186884fdc4d9de3448ea61db8b2fce801b608966
SHA5128ef2841571243fdbdabcb697f0a82842df683b99ebf9fea3baf870d540cbc897b79305434b001908d4a0ebc2dad6f11420fff79000bc40fdef3fd0653e32c702