Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    144s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/02/2024, 05:05

General

  • Target

    8e49407f818f9f343010ec948ceb32c3.exe

  • Size

    52KB

  • MD5

    8e49407f818f9f343010ec948ceb32c3

  • SHA1

    9bd466b756cf4454437f5cdde4443dd3a8222017

  • SHA256

    279a90f79f05c36134a542ba4297df3799fc4869818828d1768d47a34b53deef

  • SHA512

    9fe5b174e1b384a989037212f7e7041ff9154eb0a06ec3b17907abdd25bcc6bf6af69395104d0ce693c1016cbcea588042fa661209a6d5f5ed47a2e3d3190923

  • SSDEEP

    768:2iln/zREBzqhn4AiWUzrfbispgN3crB58Zez57tpydMUq:h1EB65fUzrjiFM15eW7KdMz

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Modifies firewall policy service 2 TTPs 4 IoCs
  • Executes dropped EXE 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8e49407f818f9f343010ec948ceb32c3.exe
    "C:\Users\Admin\AppData\Local\Temp\8e49407f818f9f343010ec948ceb32c3.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1908
    • C:\Users\Admin\AppData\Local\Temp\8e49407f818f9f343010ec948ceb32c3.exe
      C:\Users\Admin\AppData\Local\Temp\8e49407f818f9f343010ec948ceb32c3.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4392
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy "C:\Users\Admin\AppData\Local\Temp\8e49407f818f9f343010ec948ceb32c3.exe" "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
          PID:4928
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3168
          • C:\Users\Admin\AppData\Local\Temp\svchost.exe
            C:\Users\Admin\AppData\Local\Temp\svchost.exe
            4⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:4972
            • C:\Users\Admin\AppData\Local\Temp\svchost.exe
              C:\Users\Admin\AppData\Local\Temp\svchost.exe
              5⤵
              • Modifies WinLogon for persistence
              • Modifies firewall policy service
              • Executes dropped EXE
              PID:3544

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\svchost.exe

      Filesize

      52KB

      MD5

      8e49407f818f9f343010ec948ceb32c3

      SHA1

      9bd466b756cf4454437f5cdde4443dd3a8222017

      SHA256

      279a90f79f05c36134a542ba4297df3799fc4869818828d1768d47a34b53deef

      SHA512

      9fe5b174e1b384a989037212f7e7041ff9154eb0a06ec3b17907abdd25bcc6bf6af69395104d0ce693c1016cbcea588042fa661209a6d5f5ed47a2e3d3190923

    • memory/3544-19-0x0000000000400000-0x000000000040C000-memory.dmp

      Filesize

      48KB

    • memory/3544-22-0x0000000000400000-0x000000000040C000-memory.dmp

      Filesize

      48KB

    • memory/4392-2-0x0000000000400000-0x000000000040C000-memory.dmp

      Filesize

      48KB

    • memory/4392-3-0x0000000000400000-0x000000000040C000-memory.dmp

      Filesize

      48KB

    • memory/4392-4-0x0000000000400000-0x000000000040C000-memory.dmp

      Filesize

      48KB

    • memory/4392-5-0x0000000000400000-0x000000000040C000-memory.dmp

      Filesize

      48KB

    • memory/4392-8-0x0000000000400000-0x000000000040C000-memory.dmp

      Filesize

      48KB