Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 07:56
Behavioral task
behavioral1
Sample
12bee5a0f409509a09d5042769cea45e.exe
Resource
win7-20231215-en
General
-
Target
12bee5a0f409509a09d5042769cea45e.exe
-
Size
960KB
-
MD5
12bee5a0f409509a09d5042769cea45e
-
SHA1
d49b0e3551f5602389294170768344a07ca7771b
-
SHA256
e3b3f42cc2a24dd62ee89245d50dd815c87b033b45f402ec36e751b3b7b3288b
-
SHA512
016391a9bb084857f770b23d088796e2cd08e27e52b162e0e7f7b479f0ecaa20ef72980848824d1ac6f6341a75c1628c8f2ac68fccb29d6b5f6d6aca09cbcfe1
-
SSDEEP
12288:X6Wq4aaE6KwyF5L0Y2D1PqLb6Wq4aaE6KwyF5L0Y2D1PqLx6Wq4aaE6KwyF5L0YJ:1thEVaPqLBthEVaPqLHthEVaPqLTthX
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" svhost.exe -
Executes dropped EXE 1 IoCs
pid Process 3904 svhost.exe -
resource yara_rule behavioral2/memory/1404-0-0x0000000000400000-0x0000000000523000-memory.dmp upx behavioral2/memory/3904-5-0x0000000000400000-0x0000000000523000-memory.dmp upx behavioral2/files/0x000600000001e5df-4.dat upx behavioral2/files/0x000600000001e5df-3.dat upx behavioral2/files/0x000700000002321c-104.dat upx behavioral2/memory/1404-715-0x0000000000400000-0x0000000000523000-memory.dmp upx behavioral2/memory/3904-2583-0x0000000000400000-0x0000000000523000-memory.dmp upx -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\t: svhost.exe File opened (read-only) \??\e: svhost.exe File opened (read-only) \??\j: svhost.exe File opened (read-only) \??\k: svhost.exe File opened (read-only) \??\l: svhost.exe File opened (read-only) \??\m: svhost.exe File opened (read-only) \??\n: svhost.exe File opened (read-only) \??\s: svhost.exe File opened (read-only) \??\u: svhost.exe File opened (read-only) \??\w: svhost.exe File opened (read-only) \??\y: svhost.exe File opened (read-only) \??\i: svhost.exe File opened (read-only) \??\p: svhost.exe File opened (read-only) \??\v: svhost.exe File opened (read-only) \??\z: svhost.exe File opened (read-only) \??\a: svhost.exe File opened (read-only) \??\g: svhost.exe File opened (read-only) \??\r: svhost.exe File opened (read-only) \??\x: svhost.exe File opened (read-only) \??\b: svhost.exe File opened (read-only) \??\h: svhost.exe File opened (read-only) \??\o: svhost.exe File opened (read-only) \??\q: svhost.exe -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/1404-715-0x0000000000400000-0x0000000000523000-memory.dmp autoit_exe behavioral2/memory/3904-2583-0x0000000000400000-0x0000000000523000-memory.dmp autoit_exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\svhost.exe 12bee5a0f409509a09d5042769cea45e.exe File opened for modification C:\Windows\Driver.db svhost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1404 12bee5a0f409509a09d5042769cea45e.exe 1404 12bee5a0f409509a09d5042769cea45e.exe 3904 svhost.exe 3904 svhost.exe 3904 svhost.exe 3904 svhost.exe 3904 svhost.exe 3904 svhost.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3904 svhost.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1404 12bee5a0f409509a09d5042769cea45e.exe 1404 12bee5a0f409509a09d5042769cea45e.exe 3904 svhost.exe 3904 svhost.exe 1404 12bee5a0f409509a09d5042769cea45e.exe 3904 svhost.exe 1404 12bee5a0f409509a09d5042769cea45e.exe 3904 svhost.exe 1404 12bee5a0f409509a09d5042769cea45e.exe 3904 svhost.exe 1404 12bee5a0f409509a09d5042769cea45e.exe 3904 svhost.exe 1404 12bee5a0f409509a09d5042769cea45e.exe 3904 svhost.exe 1404 12bee5a0f409509a09d5042769cea45e.exe 3904 svhost.exe 1404 12bee5a0f409509a09d5042769cea45e.exe 3904 svhost.exe 1404 12bee5a0f409509a09d5042769cea45e.exe 3904 svhost.exe 1404 12bee5a0f409509a09d5042769cea45e.exe 1404 12bee5a0f409509a09d5042769cea45e.exe 3904 svhost.exe 3904 svhost.exe 3904 svhost.exe 3904 svhost.exe 3904 svhost.exe 3904 svhost.exe 3904 svhost.exe 3904 svhost.exe 3904 svhost.exe 3904 svhost.exe 3904 svhost.exe 3904 svhost.exe 3904 svhost.exe 3904 svhost.exe 3904 svhost.exe 3904 svhost.exe 3904 svhost.exe 3904 svhost.exe 3904 svhost.exe 3904 svhost.exe 3904 svhost.exe 3904 svhost.exe 3904 svhost.exe 3904 svhost.exe 3904 svhost.exe 3904 svhost.exe 3904 svhost.exe 3904 svhost.exe 3904 svhost.exe 3904 svhost.exe 3904 svhost.exe 3904 svhost.exe 3904 svhost.exe 3904 svhost.exe 3904 svhost.exe 3904 svhost.exe 3904 svhost.exe 3904 svhost.exe 3904 svhost.exe 3904 svhost.exe 3904 svhost.exe 3904 svhost.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 1404 12bee5a0f409509a09d5042769cea45e.exe 1404 12bee5a0f409509a09d5042769cea45e.exe 3904 svhost.exe 3904 svhost.exe 1404 12bee5a0f409509a09d5042769cea45e.exe 3904 svhost.exe 1404 12bee5a0f409509a09d5042769cea45e.exe 3904 svhost.exe 1404 12bee5a0f409509a09d5042769cea45e.exe 3904 svhost.exe 1404 12bee5a0f409509a09d5042769cea45e.exe 3904 svhost.exe 1404 12bee5a0f409509a09d5042769cea45e.exe 3904 svhost.exe 1404 12bee5a0f409509a09d5042769cea45e.exe 3904 svhost.exe 1404 12bee5a0f409509a09d5042769cea45e.exe 3904 svhost.exe 1404 12bee5a0f409509a09d5042769cea45e.exe 3904 svhost.exe 1404 12bee5a0f409509a09d5042769cea45e.exe 1404 12bee5a0f409509a09d5042769cea45e.exe 3904 svhost.exe 3904 svhost.exe 3904 svhost.exe 3904 svhost.exe 3904 svhost.exe 3904 svhost.exe 3904 svhost.exe 3904 svhost.exe 3904 svhost.exe 3904 svhost.exe 3904 svhost.exe 3904 svhost.exe 3904 svhost.exe 3904 svhost.exe 3904 svhost.exe 3904 svhost.exe 3904 svhost.exe 3904 svhost.exe 3904 svhost.exe 3904 svhost.exe 3904 svhost.exe 3904 svhost.exe 3904 svhost.exe 3904 svhost.exe 3904 svhost.exe 3904 svhost.exe 3904 svhost.exe 3904 svhost.exe 3904 svhost.exe 3904 svhost.exe 3904 svhost.exe 3904 svhost.exe 3904 svhost.exe 3904 svhost.exe 3904 svhost.exe 3904 svhost.exe 3904 svhost.exe 3904 svhost.exe 3904 svhost.exe 3904 svhost.exe 3904 svhost.exe 3904 svhost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1404 wrote to memory of 3904 1404 12bee5a0f409509a09d5042769cea45e.exe 26 PID 1404 wrote to memory of 3904 1404 12bee5a0f409509a09d5042769cea45e.exe 26 PID 1404 wrote to memory of 3904 1404 12bee5a0f409509a09d5042769cea45e.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\12bee5a0f409509a09d5042769cea45e.exe"C:\Users\Admin\AppData\Local\Temp\12bee5a0f409509a09d5042769cea45e.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Windows\svhost.exeC:\Windows\svhost.exe2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3904
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD57ed25b3935692eae54f1a805c0716747
SHA17eb96445627ff701b72e579a89cc3c26b9514595
SHA256c4d2f4c863866c3af50fe0d416541217ddc72ccd20d15f393da558beb835b4b4
SHA5121801ebab4e43d46d5aac94cbf0e87f6063bfd6d72d699b7c049f2dd0ed2d2e62cd715de590e5512da653b7f2921c21b9bfaf24e46b79ea3e2c3c9be5797eb150
-
Filesize
893KB
MD5a01c6382f1f29a40f2a5902d63982796
SHA15d16511f70d808805895a8866aba635dff71d2b4
SHA25676a4b7adb9a8bccc3bca5af9aee77b3c4c753bf790fc4ef6d5a7c51902a8c8b3
SHA5121eee0150756807b168cb6b85b3e4c2d44b1e903159624c220a33002e5b0ec1c91e4d94dc483e24e64bbc7b5d22614419cb2ee4726cd148722c19d9d3147e6881