Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
18/01/2024, 02:04
Behavioral task
behavioral1
Sample
643201ca1a12ab1b96b3ad5ed440f3cb.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
643201ca1a12ab1b96b3ad5ed440f3cb.exe
Resource
win10v2004-20231222-en
General
-
Target
643201ca1a12ab1b96b3ad5ed440f3cb.exe
-
Size
76KB
-
MD5
643201ca1a12ab1b96b3ad5ed440f3cb
-
SHA1
01063eed5ba44818f19dd4dcd2422537a1d4c25c
-
SHA256
7ed6a448d0dfb0257f4edb80393d25c771302157280d5895ed5df7b7584709ae
-
SHA512
da77979b53245a47286133a3adb1d5ecbdcb4364e612411de9847660adbb6319f172d9a97f4ac309637c22cc480211f3b6928669eb31146221671c7c32cae59e
-
SSDEEP
768:AItfy70OJGRJxwLoImIvKRx+MhvxUImcYaq1cwganRMTQYsl0uJGLJxsLoI:ZI0OJ3PKyMXucYDcGRMTlsl0uJJ
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 643201ca1a12ab1b96b3ad5ed440f3cb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Windows Reg Services = "C:\\Windows\\system32\\ffservice.exe" 643201ca1a12ab1b96b3ad5ed440f3cb.exe -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{a75aed00-d7bf-11d1-9947-00c0Cf98bbc9}\StubPath = "C:\\Windows\\system32\\lservice.exe" 643201ca1a12ab1b96b3ad5ed440f3cb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{a75aed00-d7bf-11d1-9947-00c0Cf98bbc9} 643201ca1a12ab1b96b3ad5ed440f3cb.exe -
resource yara_rule behavioral1/memory/2172-0-0x0000000000400000-0x0000000000413000-memory.dmp aspack_v212_v242 behavioral1/files/0x0031000000016caa-5.dat aspack_v212_v242 behavioral1/memory/2172-11-0x00000000003A0000-0x00000000003B3000-memory.dmp aspack_v212_v242 behavioral1/memory/2172-18-0x0000000000400000-0x0000000000413000-memory.dmp aspack_v212_v242 behavioral1/memory/3032-19-0x0000000000400000-0x0000000000413000-memory.dmp aspack_v212_v242 -
Executes dropped EXE 1 IoCs
pid Process 3032 wservice.exe -
Loads dropped DLL 2 IoCs
pid Process 2172 643201ca1a12ab1b96b3ad5ed440f3cb.exe 2172 643201ca1a12ab1b96b3ad5ed440f3cb.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Reg Services = "C:\\Windows\\system32\\ffservice.exe" 643201ca1a12ab1b96b3ad5ed440f3cb.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Reg Services = "C:\\Windows\\system32\\ffservice.exe" 643201ca1a12ab1b96b3ad5ed440f3cb.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\wservice.exe 643201ca1a12ab1b96b3ad5ed440f3cb.exe File created C:\Windows\SysWOW64\lservice.exe 643201ca1a12ab1b96b3ad5ed440f3cb.exe File opened for modification C:\Windows\SysWOW64\lservice.exe 643201ca1a12ab1b96b3ad5ed440f3cb.exe File created C:\Windows\SysWOW64\ffservice.exe 643201ca1a12ab1b96b3ad5ed440f3cb.exe File opened for modification C:\Windows\SysWOW64\ffservice.exe 643201ca1a12ab1b96b3ad5ed440f3cb.exe File created C:\Windows\SysWOW64\wservice.exe 643201ca1a12ab1b96b3ad5ed440f3cb.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2172 643201ca1a12ab1b96b3ad5ed440f3cb.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2172 wrote to memory of 3032 2172 643201ca1a12ab1b96b3ad5ed440f3cb.exe 28 PID 2172 wrote to memory of 3032 2172 643201ca1a12ab1b96b3ad5ed440f3cb.exe 28 PID 2172 wrote to memory of 3032 2172 643201ca1a12ab1b96b3ad5ed440f3cb.exe 28 PID 2172 wrote to memory of 3032 2172 643201ca1a12ab1b96b3ad5ed440f3cb.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\643201ca1a12ab1b96b3ad5ed440f3cb.exe"C:\Users\Admin\AppData\Local\Temp\643201ca1a12ab1b96b3ad5ed440f3cb.exe"1⤵
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\SysWOW64\wservice.exeC:\Windows\system32\wservice.exe -s2⤵
- Executes dropped EXE
PID:3032
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76KB
MD5643201ca1a12ab1b96b3ad5ed440f3cb
SHA101063eed5ba44818f19dd4dcd2422537a1d4c25c
SHA2567ed6a448d0dfb0257f4edb80393d25c771302157280d5895ed5df7b7584709ae
SHA512da77979b53245a47286133a3adb1d5ecbdcb4364e612411de9847660adbb6319f172d9a97f4ac309637c22cc480211f3b6928669eb31146221671c7c32cae59e