Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
169s -
max time network
217s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 03:07
Static task
static1
Behavioral task
behavioral1
Sample
25c3d1158567521f180fda6fa3918b1f.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
25c3d1158567521f180fda6fa3918b1f.exe
Resource
win10v2004-20231215-en
General
-
Target
25c3d1158567521f180fda6fa3918b1f.exe
-
Size
355KB
-
MD5
25c3d1158567521f180fda6fa3918b1f
-
SHA1
e1f8b032f2c3a732acc99db12c53cb662046ad20
-
SHA256
cb911a654c52a48d72d70016a5cea17ca4810373910411a1f3a7a5a87f5a4dbf
-
SHA512
2797b837627ab56dcb55e940862dfdf52c4c047f0f8ee412eac139e89c45b566be2421b0d7bf67ddb4ae35fa345feb6a6760b8c64a669b19736fba14377db7e3
-
SSDEEP
6144:f3EmWPDNND9yRPzLq+YXFqaZiMLic9kzVd7EAC4TSs9EiS:cmWhND9yJz+b1FcMLmp2ATTSsdS
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 3128 svchost.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\d46e910c = "NŸx\x13U+P»1\x0fàÌ”\x0e´$)ï¾X®²‡T\u0081\x17b°‘,aÌ]\x05dä¼¥=Üädô]¤Då\x1cÕÕÖd\rþü~ulÔ~|äd\x16D¤åµl|6eeå&œ\x04Å”\u008dL”5u,]\x1dT\x15,Æü\x04”lL6>ülT\x05\x05eµM\x05Df\rÎ\x04u”\u00ad|l½l”ô\u00adî>-|ÜL„–¼ÆE|Uí¬Fô\u008d¬]¤D-LD¬œEÔ\fìäü,Í\r\x1c]\x15Ì\r–®¾þ\x164”¶vô&þ6Œî<Å4Ì<ž\x16Tî”v´\x05&œ]\x1cí\x0e¬”6\u008dtäŒÄ\x1cD\x1cÖŒæ\f¥œÍ\x14>\fU\fÔôîÕ\x04\x16¥íœ¶¤\u009dD5„ž5ä\x14>t]¶.\x15=Ln†õýå\x15vD\x1cD\x15ÕD" 25c3d1158567521f180fda6fa3918b1f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\d46e910c = "NŸx\x13U+P»1\x0fàÌ”\x0e´$)ï¾X®²‡T\u0081\x17b°‘,aÌ]\x05dä¼¥=Üädô]¤Då\x1cÕÕÖd\rþü~ulÔ~|äd\x16D¤åµl|6eeå&œ\x04Å”\u008dL”5u,]\x1dT\x15,Æü\x04”lL6>ülT\x05\x05eµM\x05Df\rÎ\x04u”\u00ad|l½l”ô\u00adî>-|ÜL„–¼ÆE|Uí¬Fô\u008d¬]¤D-LD¬œEÔ\fìäü,Í\r\x1c]\x15Ì\r–®¾þ\x164”¶vô&þ6Œî<Å4Ì<ž\x16Tî”v´\x05&œ]\x1cí\x0e¬”6\u008dtäŒÄ\x1cD\x1cÖŒæ\f¥œÍ\x14>\fU\fÔôîÕ\x04\x16¥íœ¶¤\u009dD5„ž5ä\x14>t]¶.\x15=Ln†õýå\x15vD\x1cD\x15ÕD" svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe 25c3d1158567521f180fda6fa3918b1f.exe File opened for modification C:\Windows\apppatch\svchost.exe 25c3d1158567521f180fda6fa3918b1f.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4752 25c3d1158567521f180fda6fa3918b1f.exe 4752 25c3d1158567521f180fda6fa3918b1f.exe 4752 25c3d1158567521f180fda6fa3918b1f.exe 4752 25c3d1158567521f180fda6fa3918b1f.exe 4752 25c3d1158567521f180fda6fa3918b1f.exe 4752 25c3d1158567521f180fda6fa3918b1f.exe 4752 25c3d1158567521f180fda6fa3918b1f.exe 4752 25c3d1158567521f180fda6fa3918b1f.exe 3128 svchost.exe 3128 svchost.exe 3128 svchost.exe 3128 svchost.exe 3128 svchost.exe 3128 svchost.exe 3128 svchost.exe 3128 svchost.exe 3128 svchost.exe 3128 svchost.exe 3128 svchost.exe 3128 svchost.exe 3128 svchost.exe 3128 svchost.exe 3128 svchost.exe 3128 svchost.exe 3128 svchost.exe 3128 svchost.exe 3128 svchost.exe 3128 svchost.exe 3128 svchost.exe 3128 svchost.exe 3128 svchost.exe 3128 svchost.exe 3128 svchost.exe 3128 svchost.exe 3128 svchost.exe 3128 svchost.exe 3128 svchost.exe 3128 svchost.exe 3128 svchost.exe 3128 svchost.exe 3128 svchost.exe 3128 svchost.exe 3128 svchost.exe 3128 svchost.exe 3128 svchost.exe 3128 svchost.exe 3128 svchost.exe 3128 svchost.exe 3128 svchost.exe 3128 svchost.exe 3128 svchost.exe 3128 svchost.exe 3128 svchost.exe 3128 svchost.exe 3128 svchost.exe 3128 svchost.exe 3128 svchost.exe 3128 svchost.exe 3128 svchost.exe 3128 svchost.exe 3128 svchost.exe 3128 svchost.exe 3128 svchost.exe 3128 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4752 25c3d1158567521f180fda6fa3918b1f.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4752 wrote to memory of 3128 4752 25c3d1158567521f180fda6fa3918b1f.exe 90 PID 4752 wrote to memory of 3128 4752 25c3d1158567521f180fda6fa3918b1f.exe 90 PID 4752 wrote to memory of 3128 4752 25c3d1158567521f180fda6fa3918b1f.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\25c3d1158567521f180fda6fa3918b1f.exe"C:\Users\Admin\AppData\Local\Temp\25c3d1158567521f180fda6fa3918b1f.exe"1⤵
- Modifies WinLogon
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- Suspicious behavior: EnumeratesProcesses
PID:3128
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD57f964e1036a61ed36ac8cc149b7f0d55
SHA130582bd613f9449a1243edc94f614734476bfd30
SHA256502a4e79b32d46392e558283538ecf61515bdd30c314c222dd0a2cfdb6d90cbd
SHA512857a09521246a7cdc327f804c87eeff4b15e5748854ca9cd9a0c0f213411e7b0a0e4bbd3d06e94e19fa7611e7dcaff2ab14a8d12da865ca1151503fdf8271d37
-
Filesize
593B
MD5926512864979bc27cf187f1de3f57aff
SHA1acdeb9d6187932613c7fa08eaf28f0cd8116f4b5
SHA256b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f
SHA512f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b
-
Filesize
2KB
MD5a8fdd0012e6998420474a0c0669327c4
SHA1aa0b687e766c259a247c16677f4c631ce542fc6e
SHA25685a0119ffb919c7b1157dabbc8e40897f97ce6544f89931e503564966057d5d6
SHA512bd834b7119f51ef0c741d2c0696e449e13a003140ad631f5e272130cac2d30f8cb25a5e76cc415ddf6208ee920efed6c7c33519b8f1bd02dd4ae8d3f39e926f5
-
Filesize
22KB
MD5148ec1fe0244e01293df8a4bf40a1a43
SHA1739a19705ac4b1e78ec1dc10025702dae116123a
SHA25627d0df63ba0c3c8ca125c34d46d5b03e5be7d1762e409b5d6c9c458931613f40
SHA5127afc6d886858d7938bc0b6b72c58b1a0322f7f90b872a5cd753e82af9560e7d8d4c31343f60af33c392681da1ed51525b6924287a131981c58a7d571680616ff
-
Filesize
92KB
MD53ec4e221f505b50ee504f28feeb924b1
SHA1ac68a31549043904363ce0149cfac6f135bc28bd
SHA2562c552fd696f05673ca76118ee72e6c5c4e5efd1e6db238e8290318631880151d
SHA5125a375f7d940b5180095fdebd711eace0077df2a49438b4c9a098f45025595a84a660feb3a0d9c4c6afc06eb91d27497088ff87ba73413462f0e870920e7dc349
-
Filesize
481B
MD5e42ec375d95a0374dd55125136be6611
SHA1b7ddf8f9d9c918bfe728e5e0549556447d20a3fb
SHA2565421eecb70efdb73b708076d58dd55ae76c33c37ce96bb881ea3c19adea4c210
SHA512025b9b7ee39b7be5f5d7a671725e7008f07cba085a7ed8c7d98e17fa01017e273f2cc2b4078478265bb85f4bbccc0dc843a2f0a80b6704532e07c7c5cf7e33a1
-
Filesize
355KB
MD5daf15618f08c9c3b2f3f01657dd1b282
SHA1d4d50c1fdac00527afb8334e9b747787e68795bc
SHA256fda2e017164f77fad22123e46d90a8965d0dc781da80a17363a8127487258b52
SHA512baf434c80002ef6b41380d82f236aa5da3673c58b4a9cd5481f4e7ab79b9ced15f0bac06c0021c85e573e4e0b4234ea0af265229c2e5fa6fcc672b681e9821d5