Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 12:54
Static task
static1
Behavioral task
behavioral1
Sample
36dc5d703aa8c14058f96671fa749d18.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
36dc5d703aa8c14058f96671fa749d18.exe
Resource
win10v2004-20231222-en
General
-
Target
36dc5d703aa8c14058f96671fa749d18.exe
-
Size
64KB
-
MD5
36dc5d703aa8c14058f96671fa749d18
-
SHA1
ee18ac063f3a8073cce2a0a8d2981d0c7051fd71
-
SHA256
3f01fbea1c3b83ffb5acef7208ee4012bbee6fee237ed1c1196bb247858257fe
-
SHA512
88ab7072b5b93b07551e35baf94d31050039d45f113971dd713c39b2540a284b7ff30b652e75768a4e451710486d8d0ac516a4dcabdfc60c371c4cc2cc503176
-
SSDEEP
1536:orH0Srs6+3ns8LQsD2yif7iWgzF5PjBS6sxwfz:orH1K88TD2/fmJlVL
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2384 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2720 svohcst.exe 2776 svohcst.exe -
Loads dropped DLL 3 IoCs
pid Process 2384 cmd.exe 2384 cmd.exe 2720 svohcst.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Download = "C:\\Users\\Admin\\AppData\\Local\\Temp\\svohcst.exe" svohcst.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 2372 36dc5d703aa8c14058f96671fa749d18.exe 2224 36dc5d703aa8c14058f96671fa749d18.exe 2720 svohcst.exe 2776 svohcst.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 2776 svohcst.exe 2776 svohcst.exe 2776 svohcst.exe 2776 svohcst.exe 2776 svohcst.exe 2776 svohcst.exe 2776 svohcst.exe 2776 svohcst.exe 2776 svohcst.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2372 wrote to memory of 2224 2372 36dc5d703aa8c14058f96671fa749d18.exe 28 PID 2372 wrote to memory of 2224 2372 36dc5d703aa8c14058f96671fa749d18.exe 28 PID 2372 wrote to memory of 2224 2372 36dc5d703aa8c14058f96671fa749d18.exe 28 PID 2372 wrote to memory of 2224 2372 36dc5d703aa8c14058f96671fa749d18.exe 28 PID 2224 wrote to memory of 2384 2224 36dc5d703aa8c14058f96671fa749d18.exe 29 PID 2224 wrote to memory of 2384 2224 36dc5d703aa8c14058f96671fa749d18.exe 29 PID 2224 wrote to memory of 2384 2224 36dc5d703aa8c14058f96671fa749d18.exe 29 PID 2224 wrote to memory of 2384 2224 36dc5d703aa8c14058f96671fa749d18.exe 29 PID 2384 wrote to memory of 2720 2384 cmd.exe 31 PID 2384 wrote to memory of 2720 2384 cmd.exe 31 PID 2384 wrote to memory of 2720 2384 cmd.exe 31 PID 2384 wrote to memory of 2720 2384 cmd.exe 31 PID 2720 wrote to memory of 2776 2720 svohcst.exe 32 PID 2720 wrote to memory of 2776 2720 svohcst.exe 32 PID 2720 wrote to memory of 2776 2720 svohcst.exe 32 PID 2720 wrote to memory of 2776 2720 svohcst.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\36dc5d703aa8c14058f96671fa749d18.exe"C:\Users\Admin\AppData\Local\Temp\36dc5d703aa8c14058f96671fa749d18.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\36dc5d703aa8c14058f96671fa749d18.exeC:\Users\Admin\AppData\Local\Temp\36dc5d703aa8c14058f96671fa749d18.exe2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\run.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Users\Admin\AppData\Local\Temp\svohcst.exe"C:\Users\Admin\AppData\Local\Temp\svohcst.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Users\Admin\AppData\Local\Temp\svohcst.exeC:\Users\Admin\AppData\Local\Temp\svohcst.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2776
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
238B
MD5c3683660766aca9dc14c7812398a5a87
SHA126c41b8ebe62e7f63c9f41f3fed5eb2222e890cd
SHA256edee4c5db4ede0ce1777b5c77f228bac8bce1cc51d5cf193ab6e81a36c36566a
SHA51295f8bf3aac9d1e4e3c5cc88f8f1814b5ab799952da982a666bf21d1a7fb67ee0d9814ed09cbff221a4a18da436b1cc6f519b6c87d0548cc321e8586afec44d0e
-
Filesize
64KB
MD536dc5d703aa8c14058f96671fa749d18
SHA1ee18ac063f3a8073cce2a0a8d2981d0c7051fd71
SHA2563f01fbea1c3b83ffb5acef7208ee4012bbee6fee237ed1c1196bb247858257fe
SHA51288ab7072b5b93b07551e35baf94d31050039d45f113971dd713c39b2540a284b7ff30b652e75768a4e451710486d8d0ac516a4dcabdfc60c371c4cc2cc503176