Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 05:12
Behavioral task
behavioral1
Sample
29820a8b2a993ac010e1e9b0bf6dbc9f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
29820a8b2a993ac010e1e9b0bf6dbc9f.exe
Resource
win10v2004-20231222-en
General
-
Target
29820a8b2a993ac010e1e9b0bf6dbc9f.exe
-
Size
27KB
-
MD5
29820a8b2a993ac010e1e9b0bf6dbc9f
-
SHA1
22966700d03bbab7c22285ce31d8c67e67379b42
-
SHA256
31238cb3888840bd69869bb53ab1188043f2799225423f670daeeaafb1466228
-
SHA512
21f6b95e1dc2dd69fdcd907f2d16f73f87a75859b2185095f60ae642c62bab7a3f6ed7fbb6b0c19fa19535d8bacf840aca3a9395624b9ba6bd5a5e9016b4710b
-
SSDEEP
768:yD7YnnG1l4QYyPxSd0hH69N6QoKZniMp7jS:yYGDHYyJSCaCQhZiqfS
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3000 svhost.exe -
Loads dropped DLL 2 IoCs
pid Process 2976 29820a8b2a993ac010e1e9b0bf6dbc9f.exe 2976 29820a8b2a993ac010e1e9b0bf6dbc9f.exe -
resource yara_rule behavioral1/memory/2976-0-0x0000000000400000-0x0000000000413000-memory.dmp upx behavioral1/memory/3000-11-0x0000000000400000-0x0000000000413000-memory.dmp upx behavioral1/memory/2976-9-0x0000000000400000-0x0000000000413000-memory.dmp upx behavioral1/files/0x000d00000001232b-7.dat upx behavioral1/files/0x000d00000001232b-2.dat upx behavioral1/memory/3000-12-0x0000000000400000-0x0000000000413000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\.mscsbl = "C:\\Windows\\system\\svhost.exe" 29820a8b2a993ac010e1e9b0bf6dbc9f.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\system\svhost.exe 29820a8b2a993ac010e1e9b0bf6dbc9f.exe File opened for modification C:\Windows\system\svhost.exe 29820a8b2a993ac010e1e9b0bf6dbc9f.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2976 wrote to memory of 3000 2976 29820a8b2a993ac010e1e9b0bf6dbc9f.exe 28 PID 2976 wrote to memory of 3000 2976 29820a8b2a993ac010e1e9b0bf6dbc9f.exe 28 PID 2976 wrote to memory of 3000 2976 29820a8b2a993ac010e1e9b0bf6dbc9f.exe 28 PID 2976 wrote to memory of 3000 2976 29820a8b2a993ac010e1e9b0bf6dbc9f.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\29820a8b2a993ac010e1e9b0bf6dbc9f.exe"C:\Users\Admin\AppData\Local\Temp\29820a8b2a993ac010e1e9b0bf6dbc9f.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Windows\system\svhost.exeC:\Windows\system\svhost.exe2⤵
- Executes dropped EXE
PID:3000
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
27KB
MD529820a8b2a993ac010e1e9b0bf6dbc9f
SHA122966700d03bbab7c22285ce31d8c67e67379b42
SHA25631238cb3888840bd69869bb53ab1188043f2799225423f670daeeaafb1466228
SHA51221f6b95e1dc2dd69fdcd907f2d16f73f87a75859b2185095f60ae642c62bab7a3f6ed7fbb6b0c19fa19535d8bacf840aca3a9395624b9ba6bd5a5e9016b4710b