Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12/02/2024, 14:17
Static task
static1
Behavioral task
behavioral1
Sample
975b62dab787e8d2e537dd35950b2540.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
975b62dab787e8d2e537dd35950b2540.exe
Resource
win10v2004-20231215-en
General
-
Target
975b62dab787e8d2e537dd35950b2540.exe
-
Size
355KB
-
MD5
975b62dab787e8d2e537dd35950b2540
-
SHA1
463aaf6aaaa1534ebd1894fab50cebca5bc90bd4
-
SHA256
ff33c207cdf78dc7f1b8f3ba6998054439aaf1ad0608dbaed0b51e376da26caa
-
SHA512
99a948999b390d161c411a324e3811a65c07c547c0f761cde7a96cc94be9a9d331a691eacbaf5b9bbef0106470be2bcea87d8908f4b4ae67dc00d23b2e298cd3
-
SSDEEP
6144:w3EmWPDNND9yRPzLq+YXFqaZiMLic9kzVd7EAC4TSs9EiS:LmWhND9yJz+b1FcMLmp2ATTSsdS
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2768 svchost.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\9b327461 = "ÀÙM”\"7§vÄÈ\u008dJë\x13³à‡ Óõ=\x16õ9÷2ý?»\x18ÍA[1q#y™ûY›Aé™–Èî³³QQcVQ!\v\x01É£\u0090)è\u0090³6x\u0081A\x13P;¹»Áað£sÃI!ÛÙ‰³\u00a0þa¹N™!\u0081é˜ø\t\u0081ø1A\x16N‘Ûëá6‰S;‰»ƒP1I)£q;™SóAYvA[\x1ec\vXY;!\u0090YÓã¹Ûñ[1á«Æqö~©)°ë\u0090\x01S±†\x01¹1ѱæƒ1!\x19qˆY\x1b[+¡ÛÉy¡\t@ƒŽÓQ™™Éó1`9±–ë~‘ƒÙqQ`ƒ‘\x11[›óFƒ9\x1bÛñy8\x18)™9áƒÃá‰û\x01»+Û!{¡ÃQÁFëA‘Ë{\x13[\v¹q+8бƒ\x19q󃃶" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\9b327461 = "ÀÙM”\"7§vÄÈ\u008dJë\x13³à‡ Óõ=\x16õ9÷2ý?»\x18ÍA[1q#y™ûY›Aé™–Èî³³QQcVQ!\v\x01É£\u0090)è\u0090³6x\u0081A\x13P;¹»Áað£sÃI!ÛÙ‰³\u00a0þa¹N™!\u0081é˜ø\t\u0081ø1A\x16N‘Ûëá6‰S;‰»ƒP1I)£q;™SóAYvA[\x1ec\vXY;!\u0090YÓã¹Ûñ[1á«Æqö~©)°ë\u0090\x01S±†\x01¹1ѱæƒ1!\x19qˆY\x1b[+¡ÛÉy¡\t@ƒŽÓQ™™Éó1`9±–ë~‘ƒÙqQ`ƒ‘\x11[›óFƒ9\x1bÛñy8\x18)™9áƒÃá‰û\x01»+Û!{¡ÃQÁFëA‘Ë{\x13[\v¹q+8бƒ\x19q󃃶" 975b62dab787e8d2e537dd35950b2540.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe 975b62dab787e8d2e537dd35950b2540.exe File opened for modification C:\Windows\apppatch\svchost.exe 975b62dab787e8d2e537dd35950b2540.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1012 975b62dab787e8d2e537dd35950b2540.exe 1012 975b62dab787e8d2e537dd35950b2540.exe 1012 975b62dab787e8d2e537dd35950b2540.exe 1012 975b62dab787e8d2e537dd35950b2540.exe 1012 975b62dab787e8d2e537dd35950b2540.exe 1012 975b62dab787e8d2e537dd35950b2540.exe 1012 975b62dab787e8d2e537dd35950b2540.exe 1012 975b62dab787e8d2e537dd35950b2540.exe 2768 svchost.exe 2768 svchost.exe 2768 svchost.exe 2768 svchost.exe 2768 svchost.exe 2768 svchost.exe 2768 svchost.exe 2768 svchost.exe 2768 svchost.exe 2768 svchost.exe 2768 svchost.exe 2768 svchost.exe 2768 svchost.exe 2768 svchost.exe 2768 svchost.exe 2768 svchost.exe 2768 svchost.exe 2768 svchost.exe 2768 svchost.exe 2768 svchost.exe 2768 svchost.exe 2768 svchost.exe 2768 svchost.exe 2768 svchost.exe 2768 svchost.exe 2768 svchost.exe 2768 svchost.exe 2768 svchost.exe 2768 svchost.exe 2768 svchost.exe 2768 svchost.exe 2768 svchost.exe 2768 svchost.exe 2768 svchost.exe 2768 svchost.exe 2768 svchost.exe 2768 svchost.exe 2768 svchost.exe 2768 svchost.exe 2768 svchost.exe 2768 svchost.exe 2768 svchost.exe 2768 svchost.exe 2768 svchost.exe 2768 svchost.exe 2768 svchost.exe 2768 svchost.exe 2768 svchost.exe 2768 svchost.exe 2768 svchost.exe 2768 svchost.exe 2768 svchost.exe 2768 svchost.exe 2768 svchost.exe 2768 svchost.exe 2768 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1012 975b62dab787e8d2e537dd35950b2540.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1012 wrote to memory of 2768 1012 975b62dab787e8d2e537dd35950b2540.exe 84 PID 1012 wrote to memory of 2768 1012 975b62dab787e8d2e537dd35950b2540.exe 84 PID 1012 wrote to memory of 2768 1012 975b62dab787e8d2e537dd35950b2540.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\975b62dab787e8d2e537dd35950b2540.exe"C:\Users\Admin\AppData\Local\Temp\975b62dab787e8d2e537dd35950b2540.exe"1⤵
- Modifies WinLogon
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1012 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- Suspicious behavior: EnumeratesProcesses
PID:2768
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
315B
MD5b0e58b5c7f1a13dc54919f55661a957e
SHA19575c07248ff0257e88e7a053b421e067a6e9f81
SHA2568167c759b25907ab300486653a68223495399f7b4c5d62c7432e9e000df514f8
SHA5127e736a9627f84490cdb7ed1adbe3a905a74c2aedbec161cfe800ec6f3fd0ab5263583987e421a703fab1b373d1e7388e34d4d974e7b53518e874a473e061a7ca
-
Filesize
593B
MD5926512864979bc27cf187f1de3f57aff
SHA1acdeb9d6187932613c7fa08eaf28f0cd8116f4b5
SHA256b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f
SHA512f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b
-
Filesize
1KB
MD518e0f6c3d215f87d8e8dc25a29992544
SHA15dc3531d54519275645ee4d074a07edd4b99da4b
SHA2561ad44704ee9243880e16bd08a9abdf7fd9e92509d2c175ca2f636892cef4ce35
SHA512cb7f362e07406ca10c93bb386ee8b3d6f0fbbd2d495c44841f266d74fa41e53b50b45bd93b48ae843cb756ee064094295d53d0a5441b2726364221e0e9622e99
-
Filesize
481B
MD5675b88ddd3e49b805c8c9d4b8bd82b92
SHA11bb1a0f46d3e1f320c609dfbae9ce47becf551f5
SHA256b1bfd6a6f066b3f6b03e9c39820252595c6237f28046d85e3af4fe4675de3a13
SHA5120804797e4c999c7de48c1f09121715e3a6db9a55ca06034501a29831b6c65c7fa37b2c2f2b5c58edbf885883a9ddcdfa4cb397460b17177fcc794675d5058f01
-
Filesize
355KB
MD5e08ca45a6570fdfc22f61c33c9c3614f
SHA1203fb19e320ec08176c3a87ca91d16ee0024fb6e
SHA2563c75f33ce41a4687d514518c36206c5f21bf4952beefc45accd3c3e80e3bdf9d
SHA5121207dfafd3e05b6386f1c2b30ba773af3d882844f689496c0a807c36ad3cfa7df03650da6c5b6223792911038022de878619ff596e2a069af9f720fee9eb0197