Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
13/03/2024, 20:43
Static task
static1
Behavioral task
behavioral1
Sample
7799b8a83ebaf56f0ef947a59b9b1a30d887d006aa18e2f65d4c01d169481318.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7799b8a83ebaf56f0ef947a59b9b1a30d887d006aa18e2f65d4c01d169481318.exe
Resource
win10v2004-20240226-en
General
-
Target
7799b8a83ebaf56f0ef947a59b9b1a30d887d006aa18e2f65d4c01d169481318.exe
-
Size
205KB
-
MD5
3f09dd853dd62d494aef22d8986b1fb5
-
SHA1
fc57d05184220ee8681fde8eda7da40df38ea82a
-
SHA256
7799b8a83ebaf56f0ef947a59b9b1a30d887d006aa18e2f65d4c01d169481318
-
SHA512
9b8164af1787938c679ad44d4730a138d531fbd5764b4a0b57961eea468792d2ba7d285cfca027618702353b56de779c0bfdb1bdb1ec00a03df31851b32576d5
-
SSDEEP
3072:r7VD4DUHnNZkfOP6sfIOpJ9C3hPlGxt1UhRkgyankTIzfwAYzWcXCyqT36zhRRKy:lzHnMLm5GNGxHUhtnkdpHqTKzhh8i
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 408 svchost.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\596fd5bb = "C:\\Windows\\apppatch\\svchost.exe" 7799b8a83ebaf56f0ef947a59b9b1a30d887d006aa18e2f65d4c01d169481318.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\596fd5bb = "C:\\Windows\\apppatch\\svchost.exe" svchost.exe -
Drops file in Program Files directory 34 IoCs
description ioc Process File created C:\Program Files (x86)\Windows Defender\vonypom.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\vonypom.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\lymyxid.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\qexyhuv.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\qetyfuv.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\vojyqem.com svchost.exe File created C:\Program Files (x86)\Windows Defender\pupydeq.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\vocyzit.com svchost.exe File created C:\Program Files (x86)\Windows Defender\gadyciz.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\pupycag.com svchost.exe File created C:\Program Files (x86)\Windows Defender\galynuh.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\vofycot.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qetyfuv.com svchost.exe File created C:\Program Files (x86)\Windows Defender\gahyqah.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\galyqaz.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\pupydeq.com svchost.exe File created C:\Program Files (x86)\Windows Defender\pupycag.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\lyxynyx.com svchost.exe File created C:\Program Files (x86)\Windows Defender\volykit.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vocyzit.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lyxynyx.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qexyhuv.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lymyxid.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lysyfyj.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\galynuh.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qetyhyg.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\volykit.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\lysyfyj.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vojyqem.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\gadyciz.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vofycot.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\gahyqah.com svchost.exe File created C:\Program Files (x86)\Windows Defender\galyqaz.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\qetyhyg.com svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe 7799b8a83ebaf56f0ef947a59b9b1a30d887d006aa18e2f65d4c01d169481318.exe File opened for modification C:\Windows\apppatch\svchost.exe 7799b8a83ebaf56f0ef947a59b9b1a30d887d006aa18e2f65d4c01d169481318.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 408 svchost.exe 408 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4632 7799b8a83ebaf56f0ef947a59b9b1a30d887d006aa18e2f65d4c01d169481318.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4632 wrote to memory of 408 4632 7799b8a83ebaf56f0ef947a59b9b1a30d887d006aa18e2f65d4c01d169481318.exe 89 PID 4632 wrote to memory of 408 4632 7799b8a83ebaf56f0ef947a59b9b1a30d887d006aa18e2f65d4c01d169481318.exe 89 PID 4632 wrote to memory of 408 4632 7799b8a83ebaf56f0ef947a59b9b1a30d887d006aa18e2f65d4c01d169481318.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\7799b8a83ebaf56f0ef947a59b9b1a30d887d006aa18e2f65d4c01d169481318.exe"C:\Users\Admin\AppData\Local\Temp\7799b8a83ebaf56f0ef947a59b9b1a30d887d006aa18e2f65d4c01d169481318.exe"1⤵
- Modifies WinLogon
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:408
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22KB
MD55bc08dc33bf3da5ae8ec3f1e2348355b
SHA1910484632987957748237d5cfd4db0ffcbe2f146
SHA25696584c52cd49d4f8dabcae86e734ed191455ac60b3a7dc84dc3574681602208d
SHA5125db256fede72d17e4b7e5964ad66f6348e3c64be0306ba41c348d9ecd4f20350c70103c802c923eba0e5fd730357256e48b66ec7069c9ced1addea78a20a7131
-
Filesize
593B
MD5926512864979bc27cf187f1de3f57aff
SHA1acdeb9d6187932613c7fa08eaf28f0cd8116f4b5
SHA256b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f
SHA512f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b
-
Filesize
2KB
MD54ea840e63ccd1da472a68acd756b7d0f
SHA1f6bd5edd19285b4aa49a710dbae5da93d6ad7374
SHA2560e50ca03f2808aa185223162b7c334100ae96c5cfb7912deb1fe6802bf50b55f
SHA5120eb733bceb30df2159102bef9b31877b8553af1861a204f2818e421dfff6bab58dd24e3f0e9dca976d4feeff2d351f90e3e0106e3ec49d163328ade930e33485
-
Filesize
168B
MD5d57e3a550060f85d44a175139ea23021
SHA12c5cb3428a322c9709a34d04dd86fe7628f8f0a6
SHA25643edf068d34276e8ade4113d4d7207de19fc98a2ae1c07298e593edae2a8774c
SHA5120364fe6a010fce7a3f4a6344c84468c64b20fd131f3160fc649db78f1075ba52d8a1c4496e50dbe27c357e01ee52e94cdcda8f7927cba28d5f2f45b9da690063
-
Filesize
205KB
MD55d1503bad27f71e008e18834a637b093
SHA119be88c1c9d297011d809776a5d663e5e3fdfd89
SHA256fb596d5f2a1e4427e790d32d08c22b684fc2df314569b66aa85570de4c59a37c
SHA512d04d081249823e2acc2e83de4801a13c5b51e113e5a1fe0c9d45c90c7aa38a2f3698678813b7c9edc799aa035f9cff5892a671890fb9b658c7523b215ac6e437