Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
02/05/2024, 04:00
Static task
static1
Behavioral task
behavioral1
Sample
d1926fbcb9555d8d6cb824a5f95e06612bbfc82d948346221612607f62999cb4.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d1926fbcb9555d8d6cb824a5f95e06612bbfc82d948346221612607f62999cb4.exe
Resource
win10v2004-20240419-en
General
-
Target
d1926fbcb9555d8d6cb824a5f95e06612bbfc82d948346221612607f62999cb4.exe
-
Size
138KB
-
MD5
dc99061f09b1d84db24373c14a80dcf3
-
SHA1
2e1291768bd9485f7a598bc070cdbfba89eb52f9
-
SHA256
d1926fbcb9555d8d6cb824a5f95e06612bbfc82d948346221612607f62999cb4
-
SHA512
7a7bfc486f02cf2e64c8977da5ccea1a10cd11885ebfc697019d35a5e12a01dea643ed92734421a2f702126dfe1a2c72aacdf29ccd48cad4aeb20015aa953675
-
SSDEEP
1536:rC2/fYuPfbESFYXRWhpKRycRd57JkIqFHhzm4hWru/BzihhMN45MF5FvHP132xPT:r7YubEwYXRWhpAJUHhzm4hUukS6Kmecd
Malware Config
Signatures
-
Stops running service(s) 3 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 4356 smss.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\1230\smss.exe d1926fbcb9555d8d6cb824a5f95e06612bbfc82d948346221612607f62999cb4.exe File opened for modification C:\Windows\SysWOW64\1230\smss.exe smss.exe File opened for modification C:\Windows\SysWOW64\Service.exe smss.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1296 sc.exe 3828 sc.exe 636 sc.exe 1924 sc.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1768 d1926fbcb9555d8d6cb824a5f95e06612bbfc82d948346221612607f62999cb4.exe 4356 smss.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1768 wrote to memory of 1296 1768 d1926fbcb9555d8d6cb824a5f95e06612bbfc82d948346221612607f62999cb4.exe 83 PID 1768 wrote to memory of 1296 1768 d1926fbcb9555d8d6cb824a5f95e06612bbfc82d948346221612607f62999cb4.exe 83 PID 1768 wrote to memory of 1296 1768 d1926fbcb9555d8d6cb824a5f95e06612bbfc82d948346221612607f62999cb4.exe 83 PID 1768 wrote to memory of 3828 1768 d1926fbcb9555d8d6cb824a5f95e06612bbfc82d948346221612607f62999cb4.exe 85 PID 1768 wrote to memory of 3828 1768 d1926fbcb9555d8d6cb824a5f95e06612bbfc82d948346221612607f62999cb4.exe 85 PID 1768 wrote to memory of 3828 1768 d1926fbcb9555d8d6cb824a5f95e06612bbfc82d948346221612607f62999cb4.exe 85 PID 1768 wrote to memory of 4356 1768 d1926fbcb9555d8d6cb824a5f95e06612bbfc82d948346221612607f62999cb4.exe 87 PID 1768 wrote to memory of 4356 1768 d1926fbcb9555d8d6cb824a5f95e06612bbfc82d948346221612607f62999cb4.exe 87 PID 1768 wrote to memory of 4356 1768 d1926fbcb9555d8d6cb824a5f95e06612bbfc82d948346221612607f62999cb4.exe 87 PID 4356 wrote to memory of 636 4356 smss.exe 88 PID 4356 wrote to memory of 636 4356 smss.exe 88 PID 4356 wrote to memory of 636 4356 smss.exe 88 PID 4356 wrote to memory of 1924 4356 smss.exe 90 PID 4356 wrote to memory of 1924 4356 smss.exe 90 PID 4356 wrote to memory of 1924 4356 smss.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\d1926fbcb9555d8d6cb824a5f95e06612bbfc82d948346221612607f62999cb4.exe"C:\Users\Admin\AppData\Local\Temp\d1926fbcb9555d8d6cb824a5f95e06612bbfc82d948346221612607f62999cb4.exe"1⤵
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe stop SharedAccess2⤵
- Launches sc.exe
PID:1296
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe stop wscsvc2⤵
- Launches sc.exe
PID:3828
-
-
C:\Windows\SysWOW64\1230\smss.exeC:\Windows\system32\1230\smss.exe -d2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4356 -
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe stop SharedAccess3⤵
- Launches sc.exe
PID:636
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe stop wscsvc3⤵
- Launches sc.exe
PID:1924
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
138KB
MD5d6ee1a1ab8bcd10ec89655d67d79d324
SHA1f9a58bc0ef3fb555a039877b3e46c24fb81c77cd
SHA256f1fdeaf4293f5abdba6c89733af5acca27594fb8a94654ffb3e69dbbb7e6d474
SHA512fd7798bc62211718204d087b19fcee5e37a6434a0755d8ee56e912aca13a8f0924f2fe34559119779e15abd5696ced0c11468c93d4cd570fe5ab3b23d7bd7d7b