Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07/03/2024, 21:29
Static task
static1
Behavioral task
behavioral1
Sample
b9b44181c55a4a2f5653722e5812be76.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b9b44181c55a4a2f5653722e5812be76.exe
Resource
win10v2004-20240226-en
General
-
Target
b9b44181c55a4a2f5653722e5812be76.exe
-
Size
281KB
-
MD5
b9b44181c55a4a2f5653722e5812be76
-
SHA1
7d200a3d64963790cd5950bb629578660190e3b9
-
SHA256
2a94a1ecb6792a192319e9b49aaacfd60890d2b389097fef981179535c97ed78
-
SHA512
45482addf2155e0006ae7c5a723bee55721f9e3f78bc704372c7c316c8fd08191f986ba1ce3626182af1d261c33e0534308c4b3b957caefdfe2cc158c6cd7f41
-
SSDEEP
6144:4CITJiDTUNDNiAN6ETLu7auxCoJaxdVKU4wB3cf9CD:Fws3WpN6sqWSBJU4whcf9CD
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 1784 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 1932 b9b44181c55a4a2f5653722e5812be76.exe 1932 b9b44181c55a4a2f5653722e5812be76.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\67ce77cf = "C:\\Windows\\apppatch\\svchost.exe" b9b44181c55a4a2f5653722e5812be76.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\67ce77cf = "C:\\Windows\\apppatch\\svchost.exe" svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe b9b44181c55a4a2f5653722e5812be76.exe File opened for modification C:\Windows\apppatch\svchost.exe b9b44181c55a4a2f5653722e5812be76.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 svchost.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 svchost.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1784 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1932 b9b44181c55a4a2f5653722e5812be76.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1932 wrote to memory of 1784 1932 b9b44181c55a4a2f5653722e5812be76.exe 28 PID 1932 wrote to memory of 1784 1932 b9b44181c55a4a2f5653722e5812be76.exe 28 PID 1932 wrote to memory of 1784 1932 b9b44181c55a4a2f5653722e5812be76.exe 28 PID 1932 wrote to memory of 1784 1932 b9b44181c55a4a2f5653722e5812be76.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\b9b44181c55a4a2f5653722e5812be76.exe"C:\Users\Admin\AppData\Local\Temp\b9b44181c55a4a2f5653722e5812be76.exe"1⤵
- Loads dropped DLL
- Modifies WinLogon
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:1784
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\L9PN2QMY\IEBVNWRB.htm
Filesize162B
MD54f8e702cc244ec5d4de32740c0ecbd97
SHA13adb1f02d5b6054de0046e367c1d687b6cdf7aff
SHA2569e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a
SHA51221047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f
-
Filesize
438KB
MD5923d8dee83ac7bdcbb87dea917cace7d
SHA1e035bb954889adafc6e3dbec9b397c0984f56cfc
SHA256a07e353700ef5076f613fd0ae8d781fd67f97ee7fe1423f46008bce85c89d4b8
SHA5124ef3dd38fb8d040279ee99068ea58298fdc4b9e091f00f16b6e9792d8a85ff68fd13d086edeed2fc3d95cb3fe149b48d200baec8f69fa52ca511826614998139
-
Filesize
438KB
MD526b85537201315710e4331547f11766a
SHA1d8c74d2041bc3fb56a62a8eea252667cef8741c1
SHA256ae0771709de42ca53957b4b0b98182455bc693d48c7b0aa2d475857a74856dc4
SHA5122071875a048d8ce510817b99bfb367e223b5630e5cc1a9511cc5be6b5187114ada27234588a2aa45c60bcb530cca58284d6aa4aa98c3e56a39d95f123a8a3698
-
Filesize
281KB
MD50a3e630010ed8ecd40c3b92c281308ab
SHA1d9c2fddde6b0b5761a9eb55006b8e70382b20cdf
SHA256706f511c69d19ac6b6dbd652f470068e6bf9218ebc598400f568f5e1b708d302
SHA5122d5c0bb1312ba222af2faa03d85d3671a9b88b19c07dff2978e6bda824d50396435f8513b1383454cafeb70ac789c30fb7df9de8dea29e79201e6af6d6e588d8
-
Filesize
249KB
MD54911ca898331693ec9dcfbe92f285da7
SHA1a0502605202728981cac3e473118a1ec59f69fe2
SHA256c1983509a4ddf75592079f8329b8c52bf1c53031c7b89d53bbd65407464126e4
SHA51235ff20bdbcfd057b09d247dedbe1307ec411d58af57bf315038185a5c932d1dd4737b0624f918cc60cb952ce04b09b91a8e0d937a931cb38430f29c48af1693f