Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 02:53
Static task
static1
Behavioral task
behavioral1
Sample
0c38c4c8c4f3c14169487b2295851d71.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0c38c4c8c4f3c14169487b2295851d71.exe
Resource
win10v2004-20231215-en
General
-
Target
0c38c4c8c4f3c14169487b2295851d71.exe
-
Size
32KB
-
MD5
0c38c4c8c4f3c14169487b2295851d71
-
SHA1
5d4a1519d98d33e7c83b6509f948ba21974b2765
-
SHA256
530f707320841f1bfa73c1fae471b7b532669b06ce159f1f2e71e6fb9b1e4294
-
SHA512
476da3b2e8c4cfc98c9758fbb835e80c24d3a36decf64027435eae1082f75271a1f4c5296fa893d2d5f0c34694b55244340976f346938949805c696e79cfced4
-
SSDEEP
192:Eab8fWPl1l/cfvjmG4UzeFi98uidjZtiWeMZqVUs4pE9U5zy3L+r:zbVPFEfrmvOeFiGR/heUs4pbQKr
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3076 svchost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\WINDOWS\\Fonts\\svchost.exe" 0c38c4c8c4f3c14169487b2295851d71.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\WINDOWS\Fonts\svchost.exe 0c38c4c8c4f3c14169487b2295851d71.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Software\Microsoft\Internet Explorer\Main svchost.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://www.31fa.com" svchost.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 228 0c38c4c8c4f3c14169487b2295851d71.exe 3076 svchost.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 228 wrote to memory of 3076 228 0c38c4c8c4f3c14169487b2295851d71.exe 22 PID 228 wrote to memory of 3076 228 0c38c4c8c4f3c14169487b2295851d71.exe 22 PID 228 wrote to memory of 3076 228 0c38c4c8c4f3c14169487b2295851d71.exe 22 PID 228 wrote to memory of 3044 228 0c38c4c8c4f3c14169487b2295851d71.exe 19 PID 228 wrote to memory of 3044 228 0c38c4c8c4f3c14169487b2295851d71.exe 19 PID 228 wrote to memory of 3044 228 0c38c4c8c4f3c14169487b2295851d71.exe 19
Processes
-
C:\Users\Admin\AppData\Local\Temp\0c38c4c8c4f3c14169487b2295851d71.exe"C:\Users\Admin\AppData\Local\Temp\0c38c4c8c4f3c14169487b2295851d71.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\kill.bat""2⤵PID:3044
-
-
C:\WINDOWS\Fonts\svchost.exeC:\WINDOWS\Fonts\svchost.exe2⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious use of SetWindowsHookEx
PID:3076
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD58fb18e8bfe3035f3850bec26397d4d5a
SHA1da62a44f88f1277d7aa3241fae20fc7eb5175e15
SHA256a926effacc1c0e0ab9eebf89b3aa1bcbe6dd590b3f98e82b524ee26184679004
SHA51218dd9687cc010892d20039eb7cfe9bc61a2878c9fb3d9a01b70074a1deaa7fcdcb6ef4f1014b27c35d8830a951db74d69c6c21d2d06a533a5abf3a9aefd333f7