Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
17/01/2024, 22:25
Static task
static1
Behavioral task
behavioral1
Sample
63c457f491126c17dcce5cd5105bc660.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
63c457f491126c17dcce5cd5105bc660.exe
Resource
win10v2004-20231215-en
General
-
Target
63c457f491126c17dcce5cd5105bc660.exe
-
Size
29KB
-
MD5
63c457f491126c17dcce5cd5105bc660
-
SHA1
affbd7c32916a0bf0bb881424b1074dc0c44eb7a
-
SHA256
9e298f797a9272e30316fc14dada452d0c32988708e96974fabaad3bc834fffd
-
SHA512
ff2aa41b608f62f161ad41aaad7ea677d6e0b386c7247d64dcdbe4ed1b60523fd75370aec572385ea6f2b50e14b195c141d054ea72294053fdc08678a96b40c0
-
SSDEEP
768:Ikb9lbBEns+m1v9Nseq+XeYvWMpzroUTtO9h1HQ/:Ikb9lbOnsj1vFqUzvnQ6Eh1
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2776 svhost32.exe -
Loads dropped DLL 2 IoCs
pid Process 2776 svhost32.exe 2776 svhost32.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\dllwm.dll svhost32.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\svhost32.exe 63c457f491126c17dcce5cd5105bc660.exe File opened for modification C:\Program Files\svhost32.exe 63c457f491126c17dcce5cd5105bc660.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5044 63c457f491126c17dcce5cd5105bc660.exe 5044 63c457f491126c17dcce5cd5105bc660.exe 5044 63c457f491126c17dcce5cd5105bc660.exe 5044 63c457f491126c17dcce5cd5105bc660.exe 5044 63c457f491126c17dcce5cd5105bc660.exe 5044 63c457f491126c17dcce5cd5105bc660.exe 5044 63c457f491126c17dcce5cd5105bc660.exe 5044 63c457f491126c17dcce5cd5105bc660.exe 5044 63c457f491126c17dcce5cd5105bc660.exe 5044 63c457f491126c17dcce5cd5105bc660.exe 5044 63c457f491126c17dcce5cd5105bc660.exe 5044 63c457f491126c17dcce5cd5105bc660.exe 5044 63c457f491126c17dcce5cd5105bc660.exe 5044 63c457f491126c17dcce5cd5105bc660.exe 5044 63c457f491126c17dcce5cd5105bc660.exe 5044 63c457f491126c17dcce5cd5105bc660.exe 5044 63c457f491126c17dcce5cd5105bc660.exe 5044 63c457f491126c17dcce5cd5105bc660.exe 5044 63c457f491126c17dcce5cd5105bc660.exe 5044 63c457f491126c17dcce5cd5105bc660.exe 2776 svhost32.exe 2776 svhost32.exe 2776 svhost32.exe 2776 svhost32.exe 2776 svhost32.exe 2776 svhost32.exe 2776 svhost32.exe 2776 svhost32.exe 2776 svhost32.exe 2776 svhost32.exe 2776 svhost32.exe 2776 svhost32.exe 2776 svhost32.exe 2776 svhost32.exe 2776 svhost32.exe 2776 svhost32.exe 2776 svhost32.exe 2776 svhost32.exe 2776 svhost32.exe 2776 svhost32.exe 2776 svhost32.exe 2776 svhost32.exe 2776 svhost32.exe 2776 svhost32.exe 2776 svhost32.exe 2776 svhost32.exe 2776 svhost32.exe 2776 svhost32.exe 2776 svhost32.exe 2776 svhost32.exe 2776 svhost32.exe 2776 svhost32.exe 2776 svhost32.exe 2776 svhost32.exe 2776 svhost32.exe 2776 svhost32.exe 2776 svhost32.exe 2776 svhost32.exe 2776 svhost32.exe 2776 svhost32.exe 2776 svhost32.exe 2776 svhost32.exe 2776 svhost32.exe 2776 svhost32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2776 svhost32.exe 2776 svhost32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5044 wrote to memory of 2776 5044 63c457f491126c17dcce5cd5105bc660.exe 85 PID 5044 wrote to memory of 2776 5044 63c457f491126c17dcce5cd5105bc660.exe 85 PID 5044 wrote to memory of 2776 5044 63c457f491126c17dcce5cd5105bc660.exe 85 PID 5044 wrote to memory of 4616 5044 63c457f491126c17dcce5cd5105bc660.exe 86 PID 5044 wrote to memory of 4616 5044 63c457f491126c17dcce5cd5105bc660.exe 86 PID 5044 wrote to memory of 4616 5044 63c457f491126c17dcce5cd5105bc660.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\63c457f491126c17dcce5cd5105bc660.exe"C:\Users\Admin\AppData\Local\Temp\63c457f491126c17dcce5cd5105bc660.exe"1⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Program Files\svhost32.exe"C:\Program Files\svhost32.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2776
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$c684F.tmp.bat2⤵PID:4616
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29KB
MD563c457f491126c17dcce5cd5105bc660
SHA1affbd7c32916a0bf0bb881424b1074dc0c44eb7a
SHA2569e298f797a9272e30316fc14dada452d0c32988708e96974fabaad3bc834fffd
SHA512ff2aa41b608f62f161ad41aaad7ea677d6e0b386c7247d64dcdbe4ed1b60523fd75370aec572385ea6f2b50e14b195c141d054ea72294053fdc08678a96b40c0
-
Filesize
233B
MD57c936900adbd0dce43a030fcd8d99a25
SHA164532111f82391a8dd321dd3c5dbe82868ab513d
SHA2560010e81d07342d80b3d99f1370301e896e8949ff4fcf5a9db3397287223f8581
SHA512c55c1f1ef03c49257a7bd5f3d3cca346e69cd72219ca81370f2b55e6650e084b8191b9b46ce2cc51addc3836f9edf378501b88e20e1d93074aeb8c18a5ecbe41
-
Filesize
32KB
MD5cabe2b9ebba497c6ccb89ca1d3f7f08c
SHA174664143dd330734178216eba39e1d52d2657100
SHA256ad2fdab1ff8a36840424884b259b4f1dec35196d99043359e0f89684a547cfb9
SHA51206f9894bad794f5f8d7a777efdac137aab33f8d23832d0910d887a8eb0e8e27b51b9bfa5af31ee91fb832e88cde8197d9411ba9595ef67dd61019ee77f9a8444