Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
30/04/2024, 19:49
Static task
static1
Behavioral task
behavioral1
Sample
20bf75ec79b517943833f117a12421ff8b31cd4dd1c818f463bb35f0e1753c12.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
20bf75ec79b517943833f117a12421ff8b31cd4dd1c818f463bb35f0e1753c12.exe
Resource
win10v2004-20240419-en
General
-
Target
20bf75ec79b517943833f117a12421ff8b31cd4dd1c818f463bb35f0e1753c12.exe
-
Size
204KB
-
MD5
75f8ce733b4af79554b4b84c643980ad
-
SHA1
4531f769404ed38bdf19195a1354e4a0ac8b4064
-
SHA256
20bf75ec79b517943833f117a12421ff8b31cd4dd1c818f463bb35f0e1753c12
-
SHA512
b35e4ab5a9d48fb71c8e66d225b4613c4ed0dddf765f6884faeefea03412a1b0ae65c0dfb16cbd247371a182100b2e1f9dffbbfd7b70b06ecc91f20a41cc326d
-
SSDEEP
3072:UdGaTPrrIGvvyy8dHSi+OcGMrOpOVKdOyMbkrWRdg+E2uEPczTinJhV+p9GEVFU/:OGazIc6TVBMrOpzeJEsuirSGEMpgE
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1508 svchost.exe -
Modifies WinLogon 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\7fbc8e3a = "C:\\Windows\\apppatch\\svchost.exe" 20bf75ec79b517943833f117a12421ff8b31cd4dd1c818f463bb35f0e1753c12.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe 20bf75ec79b517943833f117a12421ff8b31cd4dd1c818f463bb35f0e1753c12.exe File opened for modification C:\Windows\apppatch\svchost.exe 20bf75ec79b517943833f117a12421ff8b31cd4dd1c818f463bb35f0e1753c12.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000_Classes\Local Settings\MuiCache svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1296 20bf75ec79b517943833f117a12421ff8b31cd4dd1c818f463bb35f0e1753c12.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeSecurityPrivilege 1296 20bf75ec79b517943833f117a12421ff8b31cd4dd1c818f463bb35f0e1753c12.exe Token: SeSecurityPrivilege 1296 20bf75ec79b517943833f117a12421ff8b31cd4dd1c818f463bb35f0e1753c12.exe Token: SeSecurityPrivilege 1508 svchost.exe Token: SeSecurityPrivilege 1508 svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1296 wrote to memory of 1508 1296 20bf75ec79b517943833f117a12421ff8b31cd4dd1c818f463bb35f0e1753c12.exe 84 PID 1296 wrote to memory of 1508 1296 20bf75ec79b517943833f117a12421ff8b31cd4dd1c818f463bb35f0e1753c12.exe 84 PID 1296 wrote to memory of 1508 1296 20bf75ec79b517943833f117a12421ff8b31cd4dd1c818f463bb35f0e1753c12.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\20bf75ec79b517943833f117a12421ff8b31cd4dd1c818f463bb35f0e1753c12.exe"C:\Users\Admin\AppData\Local\Temp\20bf75ec79b517943833f117a12421ff8b31cd4dd1c818f463bb35f0e1753c12.exe"1⤵
- Modifies WinLogon
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1508
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
204KB
MD5c272d827f33ff53faecdabba68ec4045
SHA1074b64b71d4fcdb938354a3fa9235391bfed849f
SHA25609a450b9eb4931904d00881d6bcc298085bde79d5901e1aaf7de16f73dfc24c8
SHA5129b6bf8e496eceb076d6110631f2b3d1434b2249c8ff4111159cd0d197cfad61405b2deb710db1d1c44cef28cec5a7a93b24ee7b4ab9e82e701508385ed209e58