Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
128s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23/04/2024, 22:18
Static task
static1
Behavioral task
behavioral1
Sample
c013cd06032da64dd47a420d0715d2b4aae285d75d577902ea778c1885123b60.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c013cd06032da64dd47a420d0715d2b4aae285d75d577902ea778c1885123b60.exe
Resource
win10v2004-20240412-en
General
-
Target
c013cd06032da64dd47a420d0715d2b4aae285d75d577902ea778c1885123b60.exe
-
Size
1.1MB
-
MD5
4acd69ee204daeb9d798de8a184fbb0e
-
SHA1
36f010700608ff701d76db6ce338e2d9158bd5bb
-
SHA256
c013cd06032da64dd47a420d0715d2b4aae285d75d577902ea778c1885123b60
-
SHA512
654265153c4aef0a6bc42a9796af41627fc22a99ad457479f8d81db25e534e99da0f63435bc77d670b09dbe01d61f4e5d703922b6ff19a57e00679e54505da3d
-
SSDEEP
24576:aH0dl8myX9BBT2QoXFkrzkmmlSgRDko0lG4Z8r7Qfbkiu5Qd:aCaClSFlG4ZM7QzM2
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2472 svchcst.exe -
Executes dropped EXE 1 IoCs
pid Process 2472 svchcst.exe -
Loads dropped DLL 2 IoCs
pid Process 2920 WScript.exe 2920 WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 63 IoCs
pid Process 1624 c013cd06032da64dd47a420d0715d2b4aae285d75d577902ea778c1885123b60.exe 1624 c013cd06032da64dd47a420d0715d2b4aae285d75d577902ea778c1885123b60.exe 2472 svchcst.exe 2472 svchcst.exe 2472 svchcst.exe 2472 svchcst.exe 2472 svchcst.exe 2472 svchcst.exe 2472 svchcst.exe 2472 svchcst.exe 2472 svchcst.exe 2472 svchcst.exe 2472 svchcst.exe 2472 svchcst.exe 2472 svchcst.exe 2472 svchcst.exe 2472 svchcst.exe 2472 svchcst.exe 2472 svchcst.exe 2472 svchcst.exe 2472 svchcst.exe 2472 svchcst.exe 2472 svchcst.exe 2472 svchcst.exe 2472 svchcst.exe 2472 svchcst.exe 2472 svchcst.exe 2472 svchcst.exe 2472 svchcst.exe 2472 svchcst.exe 2472 svchcst.exe 2472 svchcst.exe 2472 svchcst.exe 2472 svchcst.exe 2472 svchcst.exe 2472 svchcst.exe 2472 svchcst.exe 2472 svchcst.exe 2472 svchcst.exe 2472 svchcst.exe 2472 svchcst.exe 2472 svchcst.exe 2472 svchcst.exe 2472 svchcst.exe 2472 svchcst.exe 2472 svchcst.exe 2472 svchcst.exe 2472 svchcst.exe 2472 svchcst.exe 2472 svchcst.exe 2472 svchcst.exe 2472 svchcst.exe 2472 svchcst.exe 2472 svchcst.exe 2472 svchcst.exe 2472 svchcst.exe 2472 svchcst.exe 2472 svchcst.exe 2472 svchcst.exe 2472 svchcst.exe 2472 svchcst.exe 2472 svchcst.exe 2472 svchcst.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1624 c013cd06032da64dd47a420d0715d2b4aae285d75d577902ea778c1885123b60.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1624 c013cd06032da64dd47a420d0715d2b4aae285d75d577902ea778c1885123b60.exe 1624 c013cd06032da64dd47a420d0715d2b4aae285d75d577902ea778c1885123b60.exe 2472 svchcst.exe 2472 svchcst.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1624 wrote to memory of 3052 1624 c013cd06032da64dd47a420d0715d2b4aae285d75d577902ea778c1885123b60.exe 28 PID 1624 wrote to memory of 3052 1624 c013cd06032da64dd47a420d0715d2b4aae285d75d577902ea778c1885123b60.exe 28 PID 1624 wrote to memory of 3052 1624 c013cd06032da64dd47a420d0715d2b4aae285d75d577902ea778c1885123b60.exe 28 PID 1624 wrote to memory of 3052 1624 c013cd06032da64dd47a420d0715d2b4aae285d75d577902ea778c1885123b60.exe 28 PID 1624 wrote to memory of 2920 1624 c013cd06032da64dd47a420d0715d2b4aae285d75d577902ea778c1885123b60.exe 29 PID 1624 wrote to memory of 2920 1624 c013cd06032da64dd47a420d0715d2b4aae285d75d577902ea778c1885123b60.exe 29 PID 1624 wrote to memory of 2920 1624 c013cd06032da64dd47a420d0715d2b4aae285d75d577902ea778c1885123b60.exe 29 PID 1624 wrote to memory of 2920 1624 c013cd06032da64dd47a420d0715d2b4aae285d75d577902ea778c1885123b60.exe 29 PID 2920 wrote to memory of 2472 2920 WScript.exe 31 PID 2920 wrote to memory of 2472 2920 WScript.exe 31 PID 2920 wrote to memory of 2472 2920 WScript.exe 31 PID 2920 wrote to memory of 2472 2920 WScript.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\c013cd06032da64dd47a420d0715d2b4aae285d75d577902ea778c1885123b60.exe"C:\Users\Admin\AppData\Local\Temp\c013cd06032da64dd47a420d0715d2b4aae285d75d577902ea778c1885123b60.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:3052
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵PID:2864
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Deletes itself
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2472
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
753B
MD513f20ee00bff95601cd03d066ebea9f0
SHA1619dfd028a7dd84c1363cab93417d7bf481315cd
SHA2560d64337186891e1cbb0454631ac0f42c2a17159fa28c7f0790167a7fb58eca86
SHA512d459981cc43ea8f36a04a5747791571731a8c1a127a5ce00b9b9732b3d91798124a025bc9c89b536f6c7fdff71ba7367364434472be6999623dded20dccc96d7
-
Filesize
1.1MB
MD5ab2bee433cb9ac8b1acf4bf2745f1b8f
SHA1846491aa237d676d626a53999b9741e112406cca
SHA2566ff738c121e2af3b335d78edfb2584ae047a392dc90191fdabac3af597040831
SHA512fe81c82c953214899f1c3c3ef89e52d9a5b27d59ade6b7466239b301436b376b9cf93b8f129ee4f2330a22ea344f8af50b9bb03424f2e98bcb60173407b5ebab