Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06/03/2024, 13:10
Static task
static1
Behavioral task
behavioral1
Sample
b77a65cb83a48b7dc5ce27859b7df5a8.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b77a65cb83a48b7dc5ce27859b7df5a8.exe
Resource
win10v2004-20240226-en
General
-
Target
b77a65cb83a48b7dc5ce27859b7df5a8.exe
-
Size
204KB
-
MD5
b77a65cb83a48b7dc5ce27859b7df5a8
-
SHA1
53c01879011875968c492e0a62f65d9f3435f109
-
SHA256
a01209d4b882bf08c9e9a2a2a9c77fa1b3cdfb87c1b33930049c3566b22f8bae
-
SHA512
493922f4f825dbc8bc71baee0681a711b46ad1f0634d21220f1bb44c345018e579eae30890a6f213761303daa376b6c678c11ab55939f615b59baf008422918e
-
SSDEEP
3072:Uu5d+CraZJOJQ7Nl9Q6dTnmkiwgwWfN4+uj64Oj3:SvkQWQmCV45uj64O
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3380 svch0st.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Administrador de Tareas = "C:\\Users\\Admin\\AppData\\Roaming\\svch0st.exe" b77a65cb83a48b7dc5ce27859b7df5a8.exe Set value (str) \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Administrador de Tareas = "C:\\Users\\Admin\\AppData\\Roaming\\svch0st.exe" svch0st.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4832 b77a65cb83a48b7dc5ce27859b7df5a8.exe 3380 svch0st.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4832 wrote to memory of 3380 4832 b77a65cb83a48b7dc5ce27859b7df5a8.exe 90 PID 4832 wrote to memory of 3380 4832 b77a65cb83a48b7dc5ce27859b7df5a8.exe 90 PID 4832 wrote to memory of 3380 4832 b77a65cb83a48b7dc5ce27859b7df5a8.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\b77a65cb83a48b7dc5ce27859b7df5a8.exe"C:\Users\Admin\AppData\Local\Temp\b77a65cb83a48b7dc5ce27859b7df5a8.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Users\Admin\AppData\Roaming\svch0st.exeC:\Users\Admin\AppData\Roaming\svch0st.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:3380
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70B
MD56101bc3b396c63f1f6518c47d0dd3197
SHA1bf3990f91b266bd7d6fb93e17d54b4adba79100a
SHA25654197866f9c6d0ee94863bf976b4573520019dc7f85d9060fcfe6cdd8e7a211e
SHA512556146bfc7b6cf3711dc7abcca7c446a0ea420d9cfed23111f9eca1b97ed04cee7e02ad4a0c8f350132086b8b516fee9803728366b6f1dafd7b7804118ec280b
-
Filesize
204KB
MD5b77a65cb83a48b7dc5ce27859b7df5a8
SHA153c01879011875968c492e0a62f65d9f3435f109
SHA256a01209d4b882bf08c9e9a2a2a9c77fa1b3cdfb87c1b33930049c3566b22f8bae
SHA512493922f4f825dbc8bc71baee0681a711b46ad1f0634d21220f1bb44c345018e579eae30890a6f213761303daa376b6c678c11ab55939f615b59baf008422918e