Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
16/03/2024, 08:44
Static task
static1
Behavioral task
behavioral1
Sample
cd9ccb3e7af60cb025e7b219fa417028.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
cd9ccb3e7af60cb025e7b219fa417028.exe
Resource
win10v2004-20240226-en
General
-
Target
cd9ccb3e7af60cb025e7b219fa417028.exe
-
Size
379KB
-
MD5
cd9ccb3e7af60cb025e7b219fa417028
-
SHA1
17c91cb6345a5d37330ba73305f546166114fe2e
-
SHA256
336e0323e0a9004fd9ea30eb348d0b669ed70c7a61c77c51d6485525e03d535d
-
SHA512
b0b85789a9160c2974063169b20c2f7add837aa244449c4c0cfcddddb6d0e579caa35f4a95526b05b34197fd4d4566a8a878bb123a83763a2b9b320489e79ee2
-
SSDEEP
6144:Sg0Vb/ZPiiFvbPidy5tgsLzpBNWP1ZCOLkErCaehJou58o3jo4eVH:wbhPii5iyxLzNsZxLkHhJpqo3hep
Malware Config
Signatures
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 4204 netsh.exe -
Stops running service(s) 3 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 4060 update.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\pcn.exe = "C:\\WINDOWS\\pcn.exe" update.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\svchosts.exe = "C:\\WINDOWS\\msagent\\agtintl\\svchosts.exe" cd9ccb3e7af60cb025e7b219fa417028.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\pcn.exe = "C:\\WINDOWS\\pcn.exe" cd9ccb3e7af60cb025e7b219fa417028.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\svchosts.exe = "C:\\WINDOWS\\msagent\\agtintl\\svchosts.exe" update.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\WINDOWS\ice.bat cd9ccb3e7af60cb025e7b219fa417028.exe File created C:\WINDOWS\msagent\agtintl\update.exe cd9ccb3e7af60cb025e7b219fa417028.exe File opened for modification C:\WINDOWS\msagent\agtintl\update.exe cd9ccb3e7af60cb025e7b219fa417028.exe -
Launches sc.exe 6 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 452 sc.exe 4324 sc.exe 3396 sc.exe 4440 sc.exe 1584 sc.exe 2656 sc.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 1680 wrote to memory of 3096 1680 cd9ccb3e7af60cb025e7b219fa417028.exe 89 PID 1680 wrote to memory of 3096 1680 cd9ccb3e7af60cb025e7b219fa417028.exe 89 PID 1680 wrote to memory of 3096 1680 cd9ccb3e7af60cb025e7b219fa417028.exe 89 PID 3096 wrote to memory of 4204 3096 cmd.exe 91 PID 3096 wrote to memory of 4204 3096 cmd.exe 91 PID 3096 wrote to memory of 4204 3096 cmd.exe 91 PID 3096 wrote to memory of 452 3096 cmd.exe 95 PID 3096 wrote to memory of 452 3096 cmd.exe 95 PID 3096 wrote to memory of 452 3096 cmd.exe 95 PID 3096 wrote to memory of 4324 3096 cmd.exe 96 PID 3096 wrote to memory of 4324 3096 cmd.exe 96 PID 3096 wrote to memory of 4324 3096 cmd.exe 96 PID 3096 wrote to memory of 3396 3096 cmd.exe 97 PID 3096 wrote to memory of 3396 3096 cmd.exe 97 PID 3096 wrote to memory of 3396 3096 cmd.exe 97 PID 3096 wrote to memory of 4440 3096 cmd.exe 98 PID 3096 wrote to memory of 4440 3096 cmd.exe 98 PID 3096 wrote to memory of 4440 3096 cmd.exe 98 PID 3096 wrote to memory of 1584 3096 cmd.exe 99 PID 3096 wrote to memory of 1584 3096 cmd.exe 99 PID 3096 wrote to memory of 1584 3096 cmd.exe 99 PID 3096 wrote to memory of 2656 3096 cmd.exe 100 PID 3096 wrote to memory of 2656 3096 cmd.exe 100 PID 3096 wrote to memory of 2656 3096 cmd.exe 100 PID 1680 wrote to memory of 4060 1680 cd9ccb3e7af60cb025e7b219fa417028.exe 102 PID 1680 wrote to memory of 4060 1680 cd9ccb3e7af60cb025e7b219fa417028.exe 102 PID 1680 wrote to memory of 4060 1680 cd9ccb3e7af60cb025e7b219fa417028.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\cd9ccb3e7af60cb025e7b219fa417028.exe"C:\Users\Admin\AppData\Local\Temp\cd9ccb3e7af60cb025e7b219fa417028.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\WINDOWS\ice.bat2⤵
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\Windows\SysWOW64\netsh.exenetsh firewall set notifications Disable3⤵
- Modifies Windows Firewall
PID:4204
-
-
C:\Windows\SysWOW64\sc.exesc stop SharedAccess3⤵
- Launches sc.exe
PID:452
-
-
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= disabled3⤵
- Launches sc.exe
PID:4324
-
-
C:\Windows\SysWOW64\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:3396
-
-
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= disabled3⤵
- Launches sc.exe
PID:4440
-
-
C:\Windows\SysWOW64\sc.exesc stop wscsvc3⤵
- Launches sc.exe
PID:1584
-
-
C:\Windows\SysWOW64\sc.exesc config wscsvc start= disabled3⤵
- Launches sc.exe
PID:2656
-
-
-
C:\WINDOWS\msagent\agtintl\update.exeC:\WINDOWS\msagent\agtintl\update.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4060
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
223B
MD51604ad01e735f096a9494f3d1590865e
SHA18894a9efeb44f1c1af4bc09c7d13b19718edfc16
SHA256d40c23e8e65973f2c387e268a0ac7dd3a4358f724cbe3aa51e1fb05c8a837dcf
SHA51258cfb7cb142d0507990f7e60d2cb83eb0395466feba2985569189ea1b62063cd261647a002fcc89af423a12a6ea498735a0887f19498129d7e257e71e289819c
-
Filesize
379KB
MD5cd9ccb3e7af60cb025e7b219fa417028
SHA117c91cb6345a5d37330ba73305f546166114fe2e
SHA256336e0323e0a9004fd9ea30eb348d0b669ed70c7a61c77c51d6485525e03d535d
SHA512b0b85789a9160c2974063169b20c2f7add837aa244449c4c0cfcddddb6d0e579caa35f4a95526b05b34197fd4d4566a8a878bb123a83763a2b9b320489e79ee2