Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    19/01/2024, 15:44

General

  • Target

    6801b835572c1736b2aeb6e55b7c88c6.exe

  • Size

    54KB

  • MD5

    6801b835572c1736b2aeb6e55b7c88c6

  • SHA1

    9ff46580d7d9258f8c10766c288ad355ea4398bc

  • SHA256

    3e24b23721c3655a5148eaf5ff23e398730e9f270307d14d5452f165732a5054

  • SHA512

    152b4bcf5b8f4a72a76dbda2c997e38a58827a8edb9e031e750b8d2d2553a600d3b00091cbf37af1b27b3222fa7a68e971b5d6829c06d5167cc95da1aa47d807

  • SSDEEP

    1536:6vQqZwQUxtwILj8zMs/jtI7iG43yf6KpVi:6xwhxZLwzM1YyfRVi

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6801b835572c1736b2aeb6e55b7c88c6.exe
    "C:\Users\Admin\AppData\Local\Temp\6801b835572c1736b2aeb6e55b7c88c6.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1420
    • C:\Windows\SVCH0ST.exe
      C:\Windows\SVCH0ST.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2992

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SVCH0ST.exe

    Filesize

    54KB

    MD5

    6801b835572c1736b2aeb6e55b7c88c6

    SHA1

    9ff46580d7d9258f8c10766c288ad355ea4398bc

    SHA256

    3e24b23721c3655a5148eaf5ff23e398730e9f270307d14d5452f165732a5054

    SHA512

    152b4bcf5b8f4a72a76dbda2c997e38a58827a8edb9e031e750b8d2d2553a600d3b00091cbf37af1b27b3222fa7a68e971b5d6829c06d5167cc95da1aa47d807

  • memory/1420-9-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/2992-16-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/2992-17-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/2992-12-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/2992-13-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/2992-14-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/2992-15-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/2992-10-0x00000000001B0000-0x00000000001C7000-memory.dmp

    Filesize

    92KB

  • memory/2992-11-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/2992-18-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/2992-19-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/2992-20-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/2992-21-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/2992-22-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/2992-23-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/2992-24-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB