Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 12:54
Static task
static1
Behavioral task
behavioral1
Sample
36dc5d703aa8c14058f96671fa749d18.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
36dc5d703aa8c14058f96671fa749d18.exe
Resource
win10v2004-20231222-en
General
-
Target
36dc5d703aa8c14058f96671fa749d18.exe
-
Size
64KB
-
MD5
36dc5d703aa8c14058f96671fa749d18
-
SHA1
ee18ac063f3a8073cce2a0a8d2981d0c7051fd71
-
SHA256
3f01fbea1c3b83ffb5acef7208ee4012bbee6fee237ed1c1196bb247858257fe
-
SHA512
88ab7072b5b93b07551e35baf94d31050039d45f113971dd713c39b2540a284b7ff30b652e75768a4e451710486d8d0ac516a4dcabdfc60c371c4cc2cc503176
-
SSDEEP
1536:orH0Srs6+3ns8LQsD2yif7iWgzF5PjBS6sxwfz:orH1K88TD2/fmJlVL
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3064 svohcst.exe 4408 svohcst.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Download = "C:\\Users\\Admin\\AppData\\Local\\Temp\\svohcst.exe" svohcst.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 4872 36dc5d703aa8c14058f96671fa749d18.exe 1360 36dc5d703aa8c14058f96671fa749d18.exe 3064 svohcst.exe 4408 svohcst.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 4408 svohcst.exe 4408 svohcst.exe 4408 svohcst.exe 4408 svohcst.exe 4408 svohcst.exe 4408 svohcst.exe 4408 svohcst.exe 4408 svohcst.exe 4408 svohcst.exe 4408 svohcst.exe 4408 svohcst.exe 4408 svohcst.exe 4408 svohcst.exe 4408 svohcst.exe 4408 svohcst.exe 4408 svohcst.exe 4408 svohcst.exe 4408 svohcst.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4872 wrote to memory of 1360 4872 36dc5d703aa8c14058f96671fa749d18.exe 15 PID 4872 wrote to memory of 1360 4872 36dc5d703aa8c14058f96671fa749d18.exe 15 PID 4872 wrote to memory of 1360 4872 36dc5d703aa8c14058f96671fa749d18.exe 15 PID 1360 wrote to memory of 3604 1360 36dc5d703aa8c14058f96671fa749d18.exe 20 PID 1360 wrote to memory of 3604 1360 36dc5d703aa8c14058f96671fa749d18.exe 20 PID 1360 wrote to memory of 3604 1360 36dc5d703aa8c14058f96671fa749d18.exe 20 PID 3604 wrote to memory of 3064 3604 cmd.exe 18 PID 3604 wrote to memory of 3064 3604 cmd.exe 18 PID 3604 wrote to memory of 3064 3604 cmd.exe 18 PID 3064 wrote to memory of 4408 3064 svohcst.exe 17 PID 3064 wrote to memory of 4408 3064 svohcst.exe 17 PID 3064 wrote to memory of 4408 3064 svohcst.exe 17
Processes
-
C:\Users\Admin\AppData\Local\Temp\36dc5d703aa8c14058f96671fa749d18.exe"C:\Users\Admin\AppData\Local\Temp\36dc5d703aa8c14058f96671fa749d18.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:4872 -
C:\Users\Admin\AppData\Local\Temp\36dc5d703aa8c14058f96671fa749d18.exeC:\Users\Admin\AppData\Local\Temp\36dc5d703aa8c14058f96671fa749d18.exe2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\run.bat3⤵
- Suspicious use of WriteProcessMemory
PID:3604
-
-
-
C:\Users\Admin\AppData\Local\Temp\svohcst.exeC:\Users\Admin\AppData\Local\Temp\svohcst.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4408
-
C:\Users\Admin\AppData\Local\Temp\svohcst.exe"C:\Users\Admin\AppData\Local\Temp\svohcst.exe"1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:3064
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
238B
MD5c3683660766aca9dc14c7812398a5a87
SHA126c41b8ebe62e7f63c9f41f3fed5eb2222e890cd
SHA256edee4c5db4ede0ce1777b5c77f228bac8bce1cc51d5cf193ab6e81a36c36566a
SHA51295f8bf3aac9d1e4e3c5cc88f8f1814b5ab799952da982a666bf21d1a7fb67ee0d9814ed09cbff221a4a18da436b1cc6f519b6c87d0548cc321e8586afec44d0e
-
Filesize
25KB
MD5f9ede5ef1f05d46e377930783068f469
SHA1117143591182c2053c65250239ce9b15a7acb796
SHA256620d97cc3c8d924a327e56db0546519a3c5dadd99a3a57bbf09aa97ab2b7b4ae
SHA5128b93e8e0469dfaec76172ec2a5c42bbdd13b2617551a79d4a0e70afb59d1c7a72ba0fc7946dbb9440e186bd2d00cf7f090da6d2bdc9cb5e9842976c37106470a
-
Filesize
64KB
MD536dc5d703aa8c14058f96671fa749d18
SHA1ee18ac063f3a8073cce2a0a8d2981d0c7051fd71
SHA2563f01fbea1c3b83ffb5acef7208ee4012bbee6fee237ed1c1196bb247858257fe
SHA51288ab7072b5b93b07551e35baf94d31050039d45f113971dd713c39b2540a284b7ff30b652e75768a4e451710486d8d0ac516a4dcabdfc60c371c4cc2cc503176