Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
06/04/2024, 01:48
Static task
static1
Behavioral task
behavioral1
Sample
b301e75b8e912087b505604a2a2f23577631d69514bad1c8223b81adc8a37911.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
b301e75b8e912087b505604a2a2f23577631d69514bad1c8223b81adc8a37911.exe
Resource
win10v2004-20231215-en
General
-
Target
b301e75b8e912087b505604a2a2f23577631d69514bad1c8223b81adc8a37911.exe
-
Size
319KB
-
MD5
535b9dd057abf2df643aa19e09763911
-
SHA1
a3014dec836317a85a647de84f1607aca4f17f9b
-
SHA256
b301e75b8e912087b505604a2a2f23577631d69514bad1c8223b81adc8a37911
-
SHA512
ecb8357a19199fe6e5a1787bd61449b8d2c5a73f47958380beb492b0520337a44ec5044d1ed1b74cb5448d426a8b3e09f74421f072d624ccc6985c2755931a01
-
SSDEEP
6144:oAecbuBQy7Sb0riExpMMF9yyjeEUxmLSOBMvNOzc3m/JSrSrrwZsPHItIPG:becyG+F9yynUazcW/JCM8Uot
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" svhost.exe -
UPX dump on OEP (original entry point) 19 IoCs
resource yara_rule behavioral2/memory/1452-0-0x0000000000400000-0x00000000004C0000-memory.dmp UPX behavioral2/files/0x00080000000231f5-3.dat UPX behavioral2/files/0x00080000000231f6-103.dat UPX behavioral2/memory/1452-767-0x0000000000400000-0x00000000004C0000-memory.dmp UPX behavioral2/memory/876-1317-0x0000000000400000-0x00000000004C0000-memory.dmp UPX behavioral2/memory/876-2374-0x0000000000400000-0x00000000004C0000-memory.dmp UPX behavioral2/memory/876-2646-0x0000000000400000-0x00000000004C0000-memory.dmp UPX behavioral2/memory/876-3436-0x0000000000400000-0x00000000004C0000-memory.dmp UPX behavioral2/memory/876-4761-0x0000000000400000-0x00000000004C0000-memory.dmp UPX behavioral2/memory/876-5815-0x0000000000400000-0x00000000004C0000-memory.dmp UPX behavioral2/memory/876-6880-0x0000000000400000-0x00000000004C0000-memory.dmp UPX behavioral2/memory/876-7938-0x0000000000400000-0x00000000004C0000-memory.dmp UPX behavioral2/memory/876-8994-0x0000000000400000-0x00000000004C0000-memory.dmp UPX behavioral2/memory/876-10313-0x0000000000400000-0x00000000004C0000-memory.dmp UPX behavioral2/memory/876-11374-0x0000000000400000-0x00000000004C0000-memory.dmp UPX behavioral2/memory/876-12435-0x0000000000400000-0x00000000004C0000-memory.dmp UPX behavioral2/memory/876-13496-0x0000000000400000-0x00000000004C0000-memory.dmp UPX behavioral2/memory/876-14816-0x0000000000400000-0x00000000004C0000-memory.dmp UPX behavioral2/memory/876-15879-0x0000000000400000-0x00000000004C0000-memory.dmp UPX -
Executes dropped EXE 1 IoCs
pid Process 876 svhost.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\p: svhost.exe File opened (read-only) \??\s: svhost.exe File opened (read-only) \??\u: svhost.exe File opened (read-only) \??\e: svhost.exe File opened (read-only) \??\g: svhost.exe File opened (read-only) \??\k: svhost.exe File opened (read-only) \??\l: svhost.exe File opened (read-only) \??\n: svhost.exe File opened (read-only) \??\x: svhost.exe File opened (read-only) \??\r: svhost.exe File opened (read-only) \??\v: svhost.exe File opened (read-only) \??\y: svhost.exe File opened (read-only) \??\a: svhost.exe File opened (read-only) \??\h: svhost.exe File opened (read-only) \??\j: svhost.exe File opened (read-only) \??\o: svhost.exe File opened (read-only) \??\q: svhost.exe File opened (read-only) \??\t: svhost.exe File opened (read-only) \??\z: svhost.exe File opened (read-only) \??\b: svhost.exe File opened (read-only) \??\i: svhost.exe File opened (read-only) \??\m: svhost.exe File opened (read-only) \??\w: svhost.exe -
AutoIT Executable 16 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/1452-767-0x0000000000400000-0x00000000004C0000-memory.dmp autoit_exe behavioral2/memory/876-1317-0x0000000000400000-0x00000000004C0000-memory.dmp autoit_exe behavioral2/memory/876-2374-0x0000000000400000-0x00000000004C0000-memory.dmp autoit_exe behavioral2/memory/876-2646-0x0000000000400000-0x00000000004C0000-memory.dmp autoit_exe behavioral2/memory/876-3436-0x0000000000400000-0x00000000004C0000-memory.dmp autoit_exe behavioral2/memory/876-4761-0x0000000000400000-0x00000000004C0000-memory.dmp autoit_exe behavioral2/memory/876-5815-0x0000000000400000-0x00000000004C0000-memory.dmp autoit_exe behavioral2/memory/876-6880-0x0000000000400000-0x00000000004C0000-memory.dmp autoit_exe behavioral2/memory/876-7938-0x0000000000400000-0x00000000004C0000-memory.dmp autoit_exe behavioral2/memory/876-8994-0x0000000000400000-0x00000000004C0000-memory.dmp autoit_exe behavioral2/memory/876-10313-0x0000000000400000-0x00000000004C0000-memory.dmp autoit_exe behavioral2/memory/876-11374-0x0000000000400000-0x00000000004C0000-memory.dmp autoit_exe behavioral2/memory/876-12435-0x0000000000400000-0x00000000004C0000-memory.dmp autoit_exe behavioral2/memory/876-13496-0x0000000000400000-0x00000000004C0000-memory.dmp autoit_exe behavioral2/memory/876-14816-0x0000000000400000-0x00000000004C0000-memory.dmp autoit_exe behavioral2/memory/876-15879-0x0000000000400000-0x00000000004C0000-memory.dmp autoit_exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\Driver.db svhost.exe File created C:\Windows\svhost.exe b301e75b8e912087b505604a2a2f23577631d69514bad1c8223b81adc8a37911.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1452 b301e75b8e912087b505604a2a2f23577631d69514bad1c8223b81adc8a37911.exe 1452 b301e75b8e912087b505604a2a2f23577631d69514bad1c8223b81adc8a37911.exe 876 svhost.exe 876 svhost.exe 876 svhost.exe 876 svhost.exe 876 svhost.exe 876 svhost.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 876 svhost.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1452 b301e75b8e912087b505604a2a2f23577631d69514bad1c8223b81adc8a37911.exe 1452 b301e75b8e912087b505604a2a2f23577631d69514bad1c8223b81adc8a37911.exe 876 svhost.exe 876 svhost.exe 1452 b301e75b8e912087b505604a2a2f23577631d69514bad1c8223b81adc8a37911.exe 876 svhost.exe 1452 b301e75b8e912087b505604a2a2f23577631d69514bad1c8223b81adc8a37911.exe 876 svhost.exe 1452 b301e75b8e912087b505604a2a2f23577631d69514bad1c8223b81adc8a37911.exe 876 svhost.exe 1452 b301e75b8e912087b505604a2a2f23577631d69514bad1c8223b81adc8a37911.exe 876 svhost.exe 1452 b301e75b8e912087b505604a2a2f23577631d69514bad1c8223b81adc8a37911.exe 876 svhost.exe 1452 b301e75b8e912087b505604a2a2f23577631d69514bad1c8223b81adc8a37911.exe 876 svhost.exe 1452 b301e75b8e912087b505604a2a2f23577631d69514bad1c8223b81adc8a37911.exe 876 svhost.exe 1452 b301e75b8e912087b505604a2a2f23577631d69514bad1c8223b81adc8a37911.exe 876 svhost.exe 876 svhost.exe 1452 b301e75b8e912087b505604a2a2f23577631d69514bad1c8223b81adc8a37911.exe 1452 b301e75b8e912087b505604a2a2f23577631d69514bad1c8223b81adc8a37911.exe 876 svhost.exe 876 svhost.exe 876 svhost.exe 876 svhost.exe 876 svhost.exe 876 svhost.exe 876 svhost.exe 876 svhost.exe 876 svhost.exe 876 svhost.exe 876 svhost.exe 876 svhost.exe 876 svhost.exe 876 svhost.exe 876 svhost.exe 876 svhost.exe 876 svhost.exe 876 svhost.exe 876 svhost.exe 876 svhost.exe 876 svhost.exe 876 svhost.exe 876 svhost.exe 876 svhost.exe 876 svhost.exe 876 svhost.exe 876 svhost.exe 876 svhost.exe 876 svhost.exe 876 svhost.exe 876 svhost.exe 876 svhost.exe 876 svhost.exe 876 svhost.exe 876 svhost.exe 876 svhost.exe 876 svhost.exe 876 svhost.exe 876 svhost.exe 876 svhost.exe 876 svhost.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 1452 b301e75b8e912087b505604a2a2f23577631d69514bad1c8223b81adc8a37911.exe 1452 b301e75b8e912087b505604a2a2f23577631d69514bad1c8223b81adc8a37911.exe 876 svhost.exe 876 svhost.exe 1452 b301e75b8e912087b505604a2a2f23577631d69514bad1c8223b81adc8a37911.exe 876 svhost.exe 1452 b301e75b8e912087b505604a2a2f23577631d69514bad1c8223b81adc8a37911.exe 876 svhost.exe 1452 b301e75b8e912087b505604a2a2f23577631d69514bad1c8223b81adc8a37911.exe 876 svhost.exe 1452 b301e75b8e912087b505604a2a2f23577631d69514bad1c8223b81adc8a37911.exe 876 svhost.exe 1452 b301e75b8e912087b505604a2a2f23577631d69514bad1c8223b81adc8a37911.exe 876 svhost.exe 1452 b301e75b8e912087b505604a2a2f23577631d69514bad1c8223b81adc8a37911.exe 876 svhost.exe 1452 b301e75b8e912087b505604a2a2f23577631d69514bad1c8223b81adc8a37911.exe 876 svhost.exe 1452 b301e75b8e912087b505604a2a2f23577631d69514bad1c8223b81adc8a37911.exe 876 svhost.exe 876 svhost.exe 1452 b301e75b8e912087b505604a2a2f23577631d69514bad1c8223b81adc8a37911.exe 1452 b301e75b8e912087b505604a2a2f23577631d69514bad1c8223b81adc8a37911.exe 876 svhost.exe 876 svhost.exe 876 svhost.exe 876 svhost.exe 876 svhost.exe 876 svhost.exe 876 svhost.exe 876 svhost.exe 876 svhost.exe 876 svhost.exe 876 svhost.exe 876 svhost.exe 876 svhost.exe 876 svhost.exe 876 svhost.exe 876 svhost.exe 876 svhost.exe 876 svhost.exe 876 svhost.exe 876 svhost.exe 876 svhost.exe 876 svhost.exe 876 svhost.exe 876 svhost.exe 876 svhost.exe 876 svhost.exe 876 svhost.exe 876 svhost.exe 876 svhost.exe 876 svhost.exe 876 svhost.exe 876 svhost.exe 876 svhost.exe 876 svhost.exe 876 svhost.exe 876 svhost.exe 876 svhost.exe 876 svhost.exe 876 svhost.exe 876 svhost.exe 876 svhost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1452 wrote to memory of 876 1452 b301e75b8e912087b505604a2a2f23577631d69514bad1c8223b81adc8a37911.exe 83 PID 1452 wrote to memory of 876 1452 b301e75b8e912087b505604a2a2f23577631d69514bad1c8223b81adc8a37911.exe 83 PID 1452 wrote to memory of 876 1452 b301e75b8e912087b505604a2a2f23577631d69514bad1c8223b81adc8a37911.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\b301e75b8e912087b505604a2a2f23577631d69514bad1c8223b81adc8a37911.exe"C:\Users\Admin\AppData\Local\Temp\b301e75b8e912087b505604a2a2f23577631d69514bad1c8223b81adc8a37911.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Windows\svhost.exeC:\Windows\svhost.exe2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:876
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82B
MD5c2d2dc50dca8a2bfdc8e2d59dfa5796d
SHA17a6150fc53244e28d1bcea437c0c9d276c41ccad
SHA256b2d38b3f122cfcf3cecabf0dfe2ab9c4182416d6961ae43f1eebee489cf3c960
SHA5126cfdd08729de9ee9d1f5d8fcd859144d32ddc0a9e7074202a7d03d3795bdf0027a074a6aa54f451d4166024c134b27c55c7142170e64d979d86c13801f937ce4
-
Filesize
319KB
MD54df4352ce55449b6ca6e33885fa2844f
SHA129f5cea2282d316c8b0080fa98d9f5847dcb286f
SHA256d6c6b4b07bfbd563ff896ed1f5f768f25708a5b3fb885f4327a2fdd54d73e9de
SHA51203712db4de30595208182a571927844c0f327b5427a200cb93f763da7f9e0ffcf8a2186ecf993aa595c5269a55fd25450aabb406a10d1995355d6388fdff4fcb
-
Filesize
319KB
MD5f5ef79ee24118e1bd27cb9c23cd9b117
SHA1303a6bfbafeb0570e3e25ed46af775b3c6c872e6
SHA2567f6a4f4a9486415233720bac4326e16904e271cddfbb53db50566edf27b8d19f
SHA51253efb86e30703ee45116d37a8b2b1ddebb5588e86ab05ec398144959c5a96e2e8b037ec21487b876bd68124dc3feca9f7950e240097b0a0e5eccebfed424e3a5