Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 02:53
Static task
static1
Behavioral task
behavioral1
Sample
0c38c4c8c4f3c14169487b2295851d71.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0c38c4c8c4f3c14169487b2295851d71.exe
Resource
win10v2004-20231215-en
General
-
Target
0c38c4c8c4f3c14169487b2295851d71.exe
-
Size
32KB
-
MD5
0c38c4c8c4f3c14169487b2295851d71
-
SHA1
5d4a1519d98d33e7c83b6509f948ba21974b2765
-
SHA256
530f707320841f1bfa73c1fae471b7b532669b06ce159f1f2e71e6fb9b1e4294
-
SHA512
476da3b2e8c4cfc98c9758fbb835e80c24d3a36decf64027435eae1082f75271a1f4c5296fa893d2d5f0c34694b55244340976f346938949805c696e79cfced4
-
SSDEEP
192:Eab8fWPl1l/cfvjmG4UzeFi98uidjZtiWeMZqVUs4pE9U5zy3L+r:zbVPFEfrmvOeFiGR/heUs4pbQKr
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2372 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1820 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 1228 0c38c4c8c4f3c14169487b2295851d71.exe 1228 0c38c4c8c4f3c14169487b2295851d71.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\WINDOWS\\Fonts\\svchost.exe" 0c38c4c8c4f3c14169487b2295851d71.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\WINDOWS\Fonts\svchost.exe 0c38c4c8c4f3c14169487b2295851d71.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main svchost.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.31fa.com" svchost.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1228 0c38c4c8c4f3c14169487b2295851d71.exe 1820 svchost.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1228 wrote to memory of 1820 1228 0c38c4c8c4f3c14169487b2295851d71.exe 28 PID 1228 wrote to memory of 1820 1228 0c38c4c8c4f3c14169487b2295851d71.exe 28 PID 1228 wrote to memory of 1820 1228 0c38c4c8c4f3c14169487b2295851d71.exe 28 PID 1228 wrote to memory of 1820 1228 0c38c4c8c4f3c14169487b2295851d71.exe 28 PID 1228 wrote to memory of 2372 1228 0c38c4c8c4f3c14169487b2295851d71.exe 29 PID 1228 wrote to memory of 2372 1228 0c38c4c8c4f3c14169487b2295851d71.exe 29 PID 1228 wrote to memory of 2372 1228 0c38c4c8c4f3c14169487b2295851d71.exe 29 PID 1228 wrote to memory of 2372 1228 0c38c4c8c4f3c14169487b2295851d71.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\0c38c4c8c4f3c14169487b2295851d71.exe"C:\Users\Admin\AppData\Local\Temp\0c38c4c8c4f3c14169487b2295851d71.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\WINDOWS\Fonts\svchost.exeC:\WINDOWS\Fonts\svchost.exe2⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious use of SetWindowsHookEx
PID:1820
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\kill.bat""2⤵
- Deletes itself
PID:2372
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
190B
MD5675dc72d7dcf711d8a249f292f3ec91d
SHA1ce51092736cac370b7b91101b4678ea5251f02db
SHA2565f44186b59329b6f0fb7c362b8a4119c769a031365441a94de9bbe34f5ac8045
SHA5125d33cd3175dfbbafd67e479b5e770a8d2c54549eb90377825f52ddf0140f59de4076bb12102f547f5ae690eba18d61f8a9c868f47af607367db0f51e182f6e3b
-
Filesize
12KB
MD58fb18e8bfe3035f3850bec26397d4d5a
SHA1da62a44f88f1277d7aa3241fae20fc7eb5175e15
SHA256a926effacc1c0e0ab9eebf89b3aa1bcbe6dd590b3f98e82b524ee26184679004
SHA51218dd9687cc010892d20039eb7cfe9bc61a2878c9fb3d9a01b70074a1deaa7fcdcb6ef4f1014b27c35d8830a951db74d69c6c21d2d06a533a5abf3a9aefd333f7