Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
02/05/2024, 04:00
Static task
static1
Behavioral task
behavioral1
Sample
d1926fbcb9555d8d6cb824a5f95e06612bbfc82d948346221612607f62999cb4.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d1926fbcb9555d8d6cb824a5f95e06612bbfc82d948346221612607f62999cb4.exe
Resource
win10v2004-20240419-en
General
-
Target
d1926fbcb9555d8d6cb824a5f95e06612bbfc82d948346221612607f62999cb4.exe
-
Size
138KB
-
MD5
dc99061f09b1d84db24373c14a80dcf3
-
SHA1
2e1291768bd9485f7a598bc070cdbfba89eb52f9
-
SHA256
d1926fbcb9555d8d6cb824a5f95e06612bbfc82d948346221612607f62999cb4
-
SHA512
7a7bfc486f02cf2e64c8977da5ccea1a10cd11885ebfc697019d35a5e12a01dea643ed92734421a2f702126dfe1a2c72aacdf29ccd48cad4aeb20015aa953675
-
SSDEEP
1536:rC2/fYuPfbESFYXRWhpKRycRd57JkIqFHhzm4hWru/BzihhMN45MF5FvHP132xPT:r7YubEwYXRWhpAJUHhzm4hUukS6Kmecd
Malware Config
Signatures
-
Stops running service(s) 3 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 2548 smss.exe -
Loads dropped DLL 2 IoCs
pid Process 1656 d1926fbcb9555d8d6cb824a5f95e06612bbfc82d948346221612607f62999cb4.exe 1656 d1926fbcb9555d8d6cb824a5f95e06612bbfc82d948346221612607f62999cb4.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\1230\smss.exe d1926fbcb9555d8d6cb824a5f95e06612bbfc82d948346221612607f62999cb4.exe File opened for modification C:\Windows\SysWOW64\1230\smss.exe smss.exe File opened for modification C:\Windows\SysWOW64\Service.exe smss.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2604 sc.exe 2852 sc.exe 2572 sc.exe 3024 sc.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1656 d1926fbcb9555d8d6cb824a5f95e06612bbfc82d948346221612607f62999cb4.exe 2548 smss.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1656 wrote to memory of 2604 1656 d1926fbcb9555d8d6cb824a5f95e06612bbfc82d948346221612607f62999cb4.exe 28 PID 1656 wrote to memory of 2604 1656 d1926fbcb9555d8d6cb824a5f95e06612bbfc82d948346221612607f62999cb4.exe 28 PID 1656 wrote to memory of 2604 1656 d1926fbcb9555d8d6cb824a5f95e06612bbfc82d948346221612607f62999cb4.exe 28 PID 1656 wrote to memory of 2604 1656 d1926fbcb9555d8d6cb824a5f95e06612bbfc82d948346221612607f62999cb4.exe 28 PID 1656 wrote to memory of 3024 1656 d1926fbcb9555d8d6cb824a5f95e06612bbfc82d948346221612607f62999cb4.exe 30 PID 1656 wrote to memory of 3024 1656 d1926fbcb9555d8d6cb824a5f95e06612bbfc82d948346221612607f62999cb4.exe 30 PID 1656 wrote to memory of 3024 1656 d1926fbcb9555d8d6cb824a5f95e06612bbfc82d948346221612607f62999cb4.exe 30 PID 1656 wrote to memory of 3024 1656 d1926fbcb9555d8d6cb824a5f95e06612bbfc82d948346221612607f62999cb4.exe 30 PID 1656 wrote to memory of 2548 1656 d1926fbcb9555d8d6cb824a5f95e06612bbfc82d948346221612607f62999cb4.exe 32 PID 1656 wrote to memory of 2548 1656 d1926fbcb9555d8d6cb824a5f95e06612bbfc82d948346221612607f62999cb4.exe 32 PID 1656 wrote to memory of 2548 1656 d1926fbcb9555d8d6cb824a5f95e06612bbfc82d948346221612607f62999cb4.exe 32 PID 1656 wrote to memory of 2548 1656 d1926fbcb9555d8d6cb824a5f95e06612bbfc82d948346221612607f62999cb4.exe 32 PID 2548 wrote to memory of 2572 2548 smss.exe 33 PID 2548 wrote to memory of 2572 2548 smss.exe 33 PID 2548 wrote to memory of 2572 2548 smss.exe 33 PID 2548 wrote to memory of 2572 2548 smss.exe 33 PID 2548 wrote to memory of 2852 2548 smss.exe 35 PID 2548 wrote to memory of 2852 2548 smss.exe 35 PID 2548 wrote to memory of 2852 2548 smss.exe 35 PID 2548 wrote to memory of 2852 2548 smss.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\d1926fbcb9555d8d6cb824a5f95e06612bbfc82d948346221612607f62999cb4.exe"C:\Users\Admin\AppData\Local\Temp\d1926fbcb9555d8d6cb824a5f95e06612bbfc82d948346221612607f62999cb4.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe stop SharedAccess2⤵
- Launches sc.exe
PID:2604
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe stop wscsvc2⤵
- Launches sc.exe
PID:3024
-
-
C:\Windows\SysWOW64\1230\smss.exeC:\Windows\system32\1230\smss.exe -d2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe stop SharedAccess3⤵
- Launches sc.exe
PID:2572
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe stop wscsvc3⤵
- Launches sc.exe
PID:2852
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
138KB
MD51cc1ba09b988d99edf90c76e9e197622
SHA1f3e83b021b4ad95ed7208eab79e2bc8ea485b968
SHA256dca0a57e344bcb65bb3085924681b1430d0a3d4745b2b8971155a903ad53b9e6
SHA5125bb16bb69c087ecebb01fe0476183ece6063009f67815ffa70272683b7e59e05b4805a53680a39771cc6d7b7009a81e00be1340fb2979997746758c1384a7344