Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
28/02/2024, 14:17
Static task
static1
Behavioral task
behavioral1
Sample
ac1661cb3ae9edd40955afacb8c6f80d.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
ac1661cb3ae9edd40955afacb8c6f80d.exe
Resource
win10v2004-20240226-en
General
-
Target
ac1661cb3ae9edd40955afacb8c6f80d.exe
-
Size
51KB
-
MD5
ac1661cb3ae9edd40955afacb8c6f80d
-
SHA1
b1e19ca4d0ebe509b121ac2d75a92f29aec08d9f
-
SHA256
568e942e0a1091158fd3ad3f2b8fb497bc6c8996ea0e5ff1fd0dd04fadfba31d
-
SHA512
cd91723e79f495c328f3bfdebf1b3c9fb9b898445f5bf6e0be0128f5e11d61fb8b3662da847760cbdabaa5f9115c005c7722fabc0787c3f604cb188b0554bf2a
-
SSDEEP
768:WFh4uM71ea1nSlCZL2z/Ig5eOH0KHTqbb7Ky2HFf41aSFB9jEjgz4xQ:WIpvozwVq0KzRy2H13g/Ejgv
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\Windows Update System = "C:\\Users\\Admin\\AppData\\Roaming\\svchots.exe" svchots.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List svchots.exe -
Executes dropped EXE 2 IoCs
pid Process 2716 svchots.exe 2588 svchots.exe -
Loads dropped DLL 3 IoCs
pid Process 2596 ac1661cb3ae9edd40955afacb8c6f80d.exe 2596 ac1661cb3ae9edd40955afacb8c6f80d.exe 2716 svchots.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Update System = "C:\\Users\\Admin\\AppData\\Roaming\\svchots.exe" svchots.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Update System = "C:\\Users\\Admin\\AppData\\Roaming\\svchots.exe" svchots.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2084 set thread context of 2596 2084 ac1661cb3ae9edd40955afacb8c6f80d.exe 28 PID 2716 set thread context of 2588 2716 svchots.exe 30 -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 2596 ac1661cb3ae9edd40955afacb8c6f80d.exe 2588 svchots.exe 2588 svchots.exe 2588 svchots.exe 2588 svchots.exe 2588 svchots.exe 2588 svchots.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2084 ac1661cb3ae9edd40955afacb8c6f80d.exe 2084 ac1661cb3ae9edd40955afacb8c6f80d.exe 2716 svchots.exe 2716 svchots.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2084 wrote to memory of 2596 2084 ac1661cb3ae9edd40955afacb8c6f80d.exe 28 PID 2084 wrote to memory of 2596 2084 ac1661cb3ae9edd40955afacb8c6f80d.exe 28 PID 2084 wrote to memory of 2596 2084 ac1661cb3ae9edd40955afacb8c6f80d.exe 28 PID 2084 wrote to memory of 2596 2084 ac1661cb3ae9edd40955afacb8c6f80d.exe 28 PID 2084 wrote to memory of 2596 2084 ac1661cb3ae9edd40955afacb8c6f80d.exe 28 PID 2084 wrote to memory of 2596 2084 ac1661cb3ae9edd40955afacb8c6f80d.exe 28 PID 2084 wrote to memory of 2596 2084 ac1661cb3ae9edd40955afacb8c6f80d.exe 28 PID 2084 wrote to memory of 2596 2084 ac1661cb3ae9edd40955afacb8c6f80d.exe 28 PID 2084 wrote to memory of 2596 2084 ac1661cb3ae9edd40955afacb8c6f80d.exe 28 PID 2084 wrote to memory of 2596 2084 ac1661cb3ae9edd40955afacb8c6f80d.exe 28 PID 2596 wrote to memory of 2716 2596 ac1661cb3ae9edd40955afacb8c6f80d.exe 29 PID 2596 wrote to memory of 2716 2596 ac1661cb3ae9edd40955afacb8c6f80d.exe 29 PID 2596 wrote to memory of 2716 2596 ac1661cb3ae9edd40955afacb8c6f80d.exe 29 PID 2596 wrote to memory of 2716 2596 ac1661cb3ae9edd40955afacb8c6f80d.exe 29 PID 2716 wrote to memory of 2588 2716 svchots.exe 30 PID 2716 wrote to memory of 2588 2716 svchots.exe 30 PID 2716 wrote to memory of 2588 2716 svchots.exe 30 PID 2716 wrote to memory of 2588 2716 svchots.exe 30 PID 2716 wrote to memory of 2588 2716 svchots.exe 30 PID 2716 wrote to memory of 2588 2716 svchots.exe 30 PID 2716 wrote to memory of 2588 2716 svchots.exe 30 PID 2716 wrote to memory of 2588 2716 svchots.exe 30 PID 2716 wrote to memory of 2588 2716 svchots.exe 30 PID 2716 wrote to memory of 2588 2716 svchots.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\ac1661cb3ae9edd40955afacb8c6f80d.exe"C:\Users\Admin\AppData\Local\Temp\ac1661cb3ae9edd40955afacb8c6f80d.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Users\Admin\AppData\Local\Temp\ac1661cb3ae9edd40955afacb8c6f80d.exeC:\Users\Admin\AppData\Local\Temp\ac1661cb3ae9edd40955afacb8c6f80d.exe2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Users\Admin\AppData\Roaming\svchots.exe"C:\Users\Admin\AppData\Roaming\svchots.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Users\Admin\AppData\Roaming\svchots.exeC:\Users\Admin\AppData\Roaming\svchots.exe4⤵
- Modifies firewall policy service
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:2588
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7B
MD5ba9bf05693b9fa202d922dd43a08f281
SHA1d5244a331aad290f924ed5ed8c070d65d2e0633e
SHA25624e6654bfd1ab85bebb1f721a4be46e6fdb9ea8974d14442d3aaecd1f971fcbb
SHA51232f2d0cd55c93caf5f3ccc41256d316565bb4faa36b88388ba9177bd55320d851af71517e9254e348d61d8630324cec0d175a400207c75cc06205caaf7ca51a6
-
Filesize
51KB
MD5ac1661cb3ae9edd40955afacb8c6f80d
SHA1b1e19ca4d0ebe509b121ac2d75a92f29aec08d9f
SHA256568e942e0a1091158fd3ad3f2b8fb497bc6c8996ea0e5ff1fd0dd04fadfba31d
SHA512cd91723e79f495c328f3bfdebf1b3c9fb9b898445f5bf6e0be0128f5e11d61fb8b3662da847760cbdabaa5f9115c005c7722fabc0787c3f604cb188b0554bf2a