Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
14/03/2024, 09:05
Static task
static1
Behavioral task
behavioral1
Sample
c83b3b4c5f291166d4cde0a99544fa3b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c83b3b4c5f291166d4cde0a99544fa3b.exe
Resource
win10v2004-20240226-en
General
-
Target
c83b3b4c5f291166d4cde0a99544fa3b.exe
-
Size
110KB
-
MD5
c83b3b4c5f291166d4cde0a99544fa3b
-
SHA1
4152b20fac52ecbbe6c833d1cee0b1b16fde55b6
-
SHA256
a484b9176fd8e829c2cc1431b58104a0ebf30689fd711a2668cef79190c9fe2f
-
SHA512
94ed80d44c7e3babfce4360fd617aa7406a854375d2040e36691240709785185dd59270d8aef57010db8e4cbc6511c0fd2c86064bef6127a03293dc61d3a8d09
-
SSDEEP
3072:v1DN/FdTN43femJOBvNgH2T723dztZzv6vQElv:zF7+2mABvNgkitztZjm
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\Windows\\svchost.exe" svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 4492 svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\svchost.exe c83b3b4c5f291166d4cde0a99544fa3b.exe File created C:\Windows\svchost.exe c83b3b4c5f291166d4cde0a99544fa3b.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3932 wrote to memory of 4492 3932 c83b3b4c5f291166d4cde0a99544fa3b.exe 91 PID 3932 wrote to memory of 4492 3932 c83b3b4c5f291166d4cde0a99544fa3b.exe 91 PID 3932 wrote to memory of 4492 3932 c83b3b4c5f291166d4cde0a99544fa3b.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\c83b3b4c5f291166d4cde0a99544fa3b.exe"C:\Users\Admin\AppData\Local\Temp\c83b3b4c5f291166d4cde0a99544fa3b.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3932 -
C:\Windows\svchost.exeC:\Windows\svchost.exe 472 "C:\Users\Admin\AppData\Local\Temp\c83b3b4c5f291166d4cde0a99544fa3b.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
PID:4492
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
110KB
MD5c83b3b4c5f291166d4cde0a99544fa3b
SHA14152b20fac52ecbbe6c833d1cee0b1b16fde55b6
SHA256a484b9176fd8e829c2cc1431b58104a0ebf30689fd711a2668cef79190c9fe2f
SHA51294ed80d44c7e3babfce4360fd617aa7406a854375d2040e36691240709785185dd59270d8aef57010db8e4cbc6511c0fd2c86064bef6127a03293dc61d3a8d09