Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
04/02/2024, 05:05
Static task
static1
Behavioral task
behavioral1
Sample
8e49407f818f9f343010ec948ceb32c3.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
8e49407f818f9f343010ec948ceb32c3.exe
Resource
win10v2004-20231215-en
General
-
Target
8e49407f818f9f343010ec948ceb32c3.exe
-
Size
52KB
-
MD5
8e49407f818f9f343010ec948ceb32c3
-
SHA1
9bd466b756cf4454437f5cdde4443dd3a8222017
-
SHA256
279a90f79f05c36134a542ba4297df3799fc4869818828d1768d47a34b53deef
-
SHA512
9fe5b174e1b384a989037212f7e7041ff9154eb0a06ec3b17907abdd25bcc6bf6af69395104d0ce693c1016cbcea588042fa661209a6d5f5ed47a2e3d3190923
-
SSDEEP
768:2iln/zREBzqhn4AiWUzrfbispgN3crB58Zez57tpydMUq:h1EB65fUzrjiFM15eW7KdMz
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.exe" svchost.exe -
Modifies firewall policy service 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications svchost.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\svchost.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.exe:*:Enabled:svchost.exe" svchost.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List svchost.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile svchost.exe -
Executes dropped EXE 2 IoCs
pid Process 4972 svchost.exe 3544 svchost.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1908 set thread context of 4392 1908 8e49407f818f9f343010ec948ceb32c3.exe 84 PID 4972 set thread context of 3544 4972 svchost.exe 90 -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1908 8e49407f818f9f343010ec948ceb32c3.exe 4972 svchost.exe -
Suspicious use of WriteProcessMemory 35 IoCs
description pid Process procid_target PID 1908 wrote to memory of 4392 1908 8e49407f818f9f343010ec948ceb32c3.exe 84 PID 1908 wrote to memory of 4392 1908 8e49407f818f9f343010ec948ceb32c3.exe 84 PID 1908 wrote to memory of 4392 1908 8e49407f818f9f343010ec948ceb32c3.exe 84 PID 1908 wrote to memory of 4392 1908 8e49407f818f9f343010ec948ceb32c3.exe 84 PID 1908 wrote to memory of 4392 1908 8e49407f818f9f343010ec948ceb32c3.exe 84 PID 1908 wrote to memory of 4392 1908 8e49407f818f9f343010ec948ceb32c3.exe 84 PID 1908 wrote to memory of 4392 1908 8e49407f818f9f343010ec948ceb32c3.exe 84 PID 1908 wrote to memory of 4392 1908 8e49407f818f9f343010ec948ceb32c3.exe 84 PID 1908 wrote to memory of 4392 1908 8e49407f818f9f343010ec948ceb32c3.exe 84 PID 1908 wrote to memory of 4392 1908 8e49407f818f9f343010ec948ceb32c3.exe 84 PID 1908 wrote to memory of 4392 1908 8e49407f818f9f343010ec948ceb32c3.exe 84 PID 1908 wrote to memory of 4392 1908 8e49407f818f9f343010ec948ceb32c3.exe 84 PID 1908 wrote to memory of 4392 1908 8e49407f818f9f343010ec948ceb32c3.exe 84 PID 4392 wrote to memory of 4928 4392 8e49407f818f9f343010ec948ceb32c3.exe 85 PID 4392 wrote to memory of 4928 4392 8e49407f818f9f343010ec948ceb32c3.exe 85 PID 4392 wrote to memory of 4928 4392 8e49407f818f9f343010ec948ceb32c3.exe 85 PID 4392 wrote to memory of 3168 4392 8e49407f818f9f343010ec948ceb32c3.exe 87 PID 4392 wrote to memory of 3168 4392 8e49407f818f9f343010ec948ceb32c3.exe 87 PID 4392 wrote to memory of 3168 4392 8e49407f818f9f343010ec948ceb32c3.exe 87 PID 3168 wrote to memory of 4972 3168 cmd.exe 89 PID 3168 wrote to memory of 4972 3168 cmd.exe 89 PID 3168 wrote to memory of 4972 3168 cmd.exe 89 PID 4972 wrote to memory of 3544 4972 svchost.exe 90 PID 4972 wrote to memory of 3544 4972 svchost.exe 90 PID 4972 wrote to memory of 3544 4972 svchost.exe 90 PID 4972 wrote to memory of 3544 4972 svchost.exe 90 PID 4972 wrote to memory of 3544 4972 svchost.exe 90 PID 4972 wrote to memory of 3544 4972 svchost.exe 90 PID 4972 wrote to memory of 3544 4972 svchost.exe 90 PID 4972 wrote to memory of 3544 4972 svchost.exe 90 PID 4972 wrote to memory of 3544 4972 svchost.exe 90 PID 4972 wrote to memory of 3544 4972 svchost.exe 90 PID 4972 wrote to memory of 3544 4972 svchost.exe 90 PID 4972 wrote to memory of 3544 4972 svchost.exe 90 PID 4972 wrote to memory of 3544 4972 svchost.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\8e49407f818f9f343010ec948ceb32c3.exe"C:\Users\Admin\AppData\Local\Temp\8e49407f818f9f343010ec948ceb32c3.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Users\Admin\AppData\Local\Temp\8e49407f818f9f343010ec948ceb32c3.exeC:\Users\Admin\AppData\Local\Temp\8e49407f818f9f343010ec948ceb32c3.exe2⤵
- Suspicious use of WriteProcessMemory
PID:4392 -
C:\Windows\SysWOW64\cmd.execmd /c copy "C:\Users\Admin\AppData\Local\Temp\8e49407f818f9f343010ec948ceb32c3.exe" "C:\Users\Admin\AppData\Local\Temp\svchost.exe"3⤵PID:4928
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\svchost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\svchost.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\svchost.exe5⤵
- Modifies WinLogon for persistence
- Modifies firewall policy service
- Executes dropped EXE
PID:3544
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
52KB
MD58e49407f818f9f343010ec948ceb32c3
SHA19bd466b756cf4454437f5cdde4443dd3a8222017
SHA256279a90f79f05c36134a542ba4297df3799fc4869818828d1768d47a34b53deef
SHA5129fe5b174e1b384a989037212f7e7041ff9154eb0a06ec3b17907abdd25bcc6bf6af69395104d0ce693c1016cbcea588042fa661209a6d5f5ed47a2e3d3190923