Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
02/05/2024, 16:15
Static task
static1
Behavioral task
behavioral1
Sample
42ea7f19aae5a3df04a7e8a33e222440d2d8faa1531aa40737ca0df849e0a132.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
42ea7f19aae5a3df04a7e8a33e222440d2d8faa1531aa40737ca0df849e0a132.exe
Resource
win10v2004-20240419-en
General
-
Target
42ea7f19aae5a3df04a7e8a33e222440d2d8faa1531aa40737ca0df849e0a132.exe
-
Size
1.1MB
-
MD5
0f4268c4d39ce5d7ef01ac965b2b765d
-
SHA1
bcbe8942b62b9d62d6f824f3b596375a193f5964
-
SHA256
42ea7f19aae5a3df04a7e8a33e222440d2d8faa1531aa40737ca0df849e0a132
-
SHA512
1c1c8da46dd688f6970579c9e58e84b4c838d01c56e9ff6da3dcee36b67a4441bb40bd3466c65d255253a69c9106b04d0d49095f0076aaec3d0ada83ff019bff
-
SSDEEP
24576:aH0dl8myX9Bg42QoXFkrzkmplSgRDYo0lG4Z8r7Qfbkiu5Qi:acallSllG4ZM7QzMx
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2392 svchcst.exe -
Executes dropped EXE 11 IoCs
pid Process 2392 svchcst.exe 2716 svchcst.exe 1152 svchcst.exe 1052 svchcst.exe 1124 svchcst.exe 1472 svchcst.exe 2836 svchcst.exe 2552 svchcst.exe 2492 svchcst.exe 1452 svchcst.exe 1584 svchcst.exe -
Loads dropped DLL 15 IoCs
pid Process 2496 WScript.exe 2496 WScript.exe 2148 WScript.exe 1228 WScript.exe 1228 WScript.exe 1228 WScript.exe 776 WScript.exe 3024 WScript.exe 808 WScript.exe 3052 WScript.exe 3052 WScript.exe 2676 WScript.exe 240 WScript.exe 240 WScript.exe 2676 WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2896 42ea7f19aae5a3df04a7e8a33e222440d2d8faa1531aa40737ca0df849e0a132.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2716 svchcst.exe 2716 svchcst.exe 2716 svchcst.exe 2716 svchcst.exe 2716 svchcst.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2896 42ea7f19aae5a3df04a7e8a33e222440d2d8faa1531aa40737ca0df849e0a132.exe -
Suspicious use of SetWindowsHookEx 24 IoCs
pid Process 2896 42ea7f19aae5a3df04a7e8a33e222440d2d8faa1531aa40737ca0df849e0a132.exe 2896 42ea7f19aae5a3df04a7e8a33e222440d2d8faa1531aa40737ca0df849e0a132.exe 2392 svchcst.exe 2392 svchcst.exe 2716 svchcst.exe 2716 svchcst.exe 1152 svchcst.exe 1152 svchcst.exe 1052 svchcst.exe 1052 svchcst.exe 1124 svchcst.exe 1124 svchcst.exe 1472 svchcst.exe 1472 svchcst.exe 2836 svchcst.exe 2836 svchcst.exe 2552 svchcst.exe 2552 svchcst.exe 2492 svchcst.exe 2492 svchcst.exe 1584 svchcst.exe 1584 svchcst.exe 1452 svchcst.exe 1452 svchcst.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2896 wrote to memory of 2496 2896 42ea7f19aae5a3df04a7e8a33e222440d2d8faa1531aa40737ca0df849e0a132.exe 28 PID 2896 wrote to memory of 2496 2896 42ea7f19aae5a3df04a7e8a33e222440d2d8faa1531aa40737ca0df849e0a132.exe 28 PID 2896 wrote to memory of 2496 2896 42ea7f19aae5a3df04a7e8a33e222440d2d8faa1531aa40737ca0df849e0a132.exe 28 PID 2896 wrote to memory of 2496 2896 42ea7f19aae5a3df04a7e8a33e222440d2d8faa1531aa40737ca0df849e0a132.exe 28 PID 2496 wrote to memory of 2392 2496 WScript.exe 30 PID 2496 wrote to memory of 2392 2496 WScript.exe 30 PID 2496 wrote to memory of 2392 2496 WScript.exe 30 PID 2496 wrote to memory of 2392 2496 WScript.exe 30 PID 2392 wrote to memory of 2148 2392 svchcst.exe 31 PID 2392 wrote to memory of 2148 2392 svchcst.exe 31 PID 2392 wrote to memory of 2148 2392 svchcst.exe 31 PID 2392 wrote to memory of 2148 2392 svchcst.exe 31 PID 2148 wrote to memory of 2716 2148 WScript.exe 32 PID 2148 wrote to memory of 2716 2148 WScript.exe 32 PID 2148 wrote to memory of 2716 2148 WScript.exe 32 PID 2148 wrote to memory of 2716 2148 WScript.exe 32 PID 2716 wrote to memory of 1228 2716 svchcst.exe 33 PID 2716 wrote to memory of 1228 2716 svchcst.exe 33 PID 2716 wrote to memory of 1228 2716 svchcst.exe 33 PID 2716 wrote to memory of 1228 2716 svchcst.exe 33 PID 1228 wrote to memory of 1152 1228 WScript.exe 34 PID 1228 wrote to memory of 1152 1228 WScript.exe 34 PID 1228 wrote to memory of 1152 1228 WScript.exe 34 PID 1228 wrote to memory of 1152 1228 WScript.exe 34 PID 1152 wrote to memory of 2872 1152 svchcst.exe 35 PID 1152 wrote to memory of 2872 1152 svchcst.exe 35 PID 1152 wrote to memory of 2872 1152 svchcst.exe 35 PID 1152 wrote to memory of 2872 1152 svchcst.exe 35 PID 1228 wrote to memory of 1052 1228 WScript.exe 36 PID 1228 wrote to memory of 1052 1228 WScript.exe 36 PID 1228 wrote to memory of 1052 1228 WScript.exe 36 PID 1228 wrote to memory of 1052 1228 WScript.exe 36 PID 1052 wrote to memory of 776 1052 svchcst.exe 37 PID 1052 wrote to memory of 776 1052 svchcst.exe 37 PID 1052 wrote to memory of 776 1052 svchcst.exe 37 PID 1052 wrote to memory of 776 1052 svchcst.exe 37 PID 776 wrote to memory of 1124 776 WScript.exe 38 PID 776 wrote to memory of 1124 776 WScript.exe 38 PID 776 wrote to memory of 1124 776 WScript.exe 38 PID 776 wrote to memory of 1124 776 WScript.exe 38 PID 1124 wrote to memory of 3024 1124 svchcst.exe 39 PID 1124 wrote to memory of 3024 1124 svchcst.exe 39 PID 1124 wrote to memory of 3024 1124 svchcst.exe 39 PID 1124 wrote to memory of 3024 1124 svchcst.exe 39 PID 3024 wrote to memory of 1472 3024 WScript.exe 40 PID 3024 wrote to memory of 1472 3024 WScript.exe 40 PID 3024 wrote to memory of 1472 3024 WScript.exe 40 PID 3024 wrote to memory of 1472 3024 WScript.exe 40 PID 1472 wrote to memory of 808 1472 svchcst.exe 41 PID 1472 wrote to memory of 808 1472 svchcst.exe 41 PID 1472 wrote to memory of 808 1472 svchcst.exe 41 PID 1472 wrote to memory of 808 1472 svchcst.exe 41 PID 808 wrote to memory of 2836 808 WScript.exe 44 PID 808 wrote to memory of 2836 808 WScript.exe 44 PID 808 wrote to memory of 2836 808 WScript.exe 44 PID 808 wrote to memory of 2836 808 WScript.exe 44 PID 2836 wrote to memory of 3052 2836 svchcst.exe 45 PID 2836 wrote to memory of 3052 2836 svchcst.exe 45 PID 2836 wrote to memory of 3052 2836 svchcst.exe 45 PID 2836 wrote to memory of 3052 2836 svchcst.exe 45 PID 2552 wrote to memory of 2676 2552 svchcst.exe 47 PID 2552 wrote to memory of 2676 2552 svchcst.exe 47 PID 2552 wrote to memory of 2676 2552 svchcst.exe 47 PID 2552 wrote to memory of 2676 2552 svchcst.exe 47
Processes
-
C:\Users\Admin\AppData\Local\Temp\42ea7f19aae5a3df04a7e8a33e222440d2d8faa1531aa40737ca0df849e0a132.exe"C:\Users\Admin\AppData\Local\Temp\42ea7f19aae5a3df04a7e8a33e222440d2d8faa1531aa40737ca0df849e0a132.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Deletes itself
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"6⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"8⤵PID:2872
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"8⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:776 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"10⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"11⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"12⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"13⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"14⤵
- Loads dropped DLL
PID:3052 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"15⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"16⤵
- Loads dropped DLL
PID:2676 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"17⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1584
-
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"15⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2492 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"16⤵
- Loads dropped DLL
PID:240 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"17⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1452
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92B
MD567b9b3e2ded7086f393ebbc36c5e7bca
SHA1e6299d0450b9a92a18cc23b5704a2b475652c790
SHA25644063c266686263f14cd2a83fee124fb3e61a9171a6aab69709464f49511011d
SHA512826fbc9481f46b1ae3db828a665c55c349023caf563e6e8c17321f5f3af3e4c3914955db6f0eebfc6defe561315435d47310b4d0499ab9c2c85bb61264dedc09
-
Filesize
696B
MD551b2348c37bbedcb127fa176820f5ea2
SHA16e70ca09179127890e64c4ffa345b2af573c39fa
SHA2567b37f5580068bfba5583d762d9b64c8ee6468a9e064547f230757c4be595bd02
SHA5120f9755ae0408b0dd6e1279bfa8c5dfbe63b3775a81a3c5b342c5e56e7521d292b0c4e94053e6fa0c3da233f3af60aae2dc28749f991ea81fd9bf2627698a343e
-
Filesize
696B
MD56cefcde7a292edfc29b3882cdeb23dba
SHA13588db649319258acc78049555e0c587aae5dcf1
SHA2564fc01d17db5185ecf506bb8ad2665dc04fbc85d9b55282b364687c5c82689251
SHA51214f7f31813f271f8ab4c58ad06504769900ae075915db76882bce80dfaa82bb76bc6c40fa76f6eae4f3c65d2311a702d5581510ea5ade452ea8b6f957da1684c
-
Filesize
696B
MD5251a70f0c55d02e74e34c409c5795274
SHA1b0eb587b5e8d597ef801848722b790692d804be2
SHA256f5397f02a6c8c59bc9869c0e5c726c096a69c84ad7f0934608fdbd8bc7e5b9f3
SHA512023cca65a97265961790183f43605fb3dd47426049f2152e5ed90d2daed98607d1e215cb8cabf54d7d2068f7a86d3b01b1d101823e8ed1acfb09076e69b67c71
-
Filesize
753B
MD5e326324faca8cb1cfcb9252580cf626d
SHA1af067ed16663ea24e673fed1bfc2d7bbee4a8a7f
SHA2568324a5b82a431d8cc9309bcb1bec607b61d28cd9d6e0bd4b72919c792c58eb74
SHA512657f76811ecd2d090feecf004117563ec6874ebff0373257a41a87f6b48fa592fd1a438cd260bd4e7b22ffdce0ef3b8ece74143cb51210a27165a798faa5cc4c
-
Filesize
696B
MD53be529c48598ce74c5871846d63ca15c
SHA193bb8e6882b776b47589ffa48116e17c98071383
SHA256f9f80c033a3cb1e2e9a8aa108427d6985dd2a08c2bea70e4dda2309f03ab7b2a
SHA512e848a532aa9acfddfb754e081353660af23f3d0ee7720f6162fc5e8a2104d98b7be8aa461ea274a311634ae3b5b0bd219731da7d6b43c3b381de56d03bb43608
-
Filesize
696B
MD58364c7b31d7cc2ff033d43e692633d35
SHA18c51dd902e1739104aff48093aecb669522fea1f
SHA2567ac0c74de647ef78ef6fffba49310f3c9c1b7d9ad19121d3502ec03c6e412a42
SHA5120615c03be93f2b8cadfa7f0fca0ec6a790728d61980a9cd5edc372c99d3d73c5bdd1e6abfc055d4bd7ff2a2aa67f6fd5221c0d0479e33ac6736522fdc0572571
-
Filesize
696B
MD506a252a9516053e44ec8e64f1ebf0533
SHA129ac97e0cdade946c4feb81ad3f78d70953a2277
SHA2566b8a799c3d4b977adb7220f6790b2ac09080ca3ccde5a2c33c83b33ea905928c
SHA5120775aabeef7c910e03efc40f96143025a2ee3544dd656c78d09ef63c85d040037752aabe72fdf3b636ee31422ae8de01b73c85e27247203d5efc1635eaf15b2d
-
Filesize
696B
MD55f762b3b2477d92959f29d768008d453
SHA1ceaa2b37d64bcffd7f862a75e1d0fb06edbddb97
SHA2565827d14409ed9f3361d81904d50e067223457590dda163a680ce4216e495a3d5
SHA512fd1445d89a0fa5d185ce51442c402d9906fa8bf7c1458a862568ad0649dfa22c5f90ed243b98339ec9706541d244b0217f1cd05e715dc49067e059fe08d80420
-
Filesize
696B
MD57d2c3f227d42fae4a5b7fbcb491b74e3
SHA1c1271bbd86747cc709b694ba9579a68b5e75a17c
SHA2569353a2f27a61e571c5bc92ccc1046c1059c5fad8e1e2cafe63a9cc73e1169c33
SHA51250330ad733975966b32fbedffb99a25cd13004d685e5788ef11f1f0fedfc62658e3e8f5ed0030fe60ecb02ba95ffa7d440c067a1e164cc3bc02ac5008b6a27d3
-
Filesize
696B
MD581911744d71ed066085116eec2026095
SHA147cfe383cd90c80f367d20667fa26cd160507a8f
SHA2563154f7fe0c77b8441733285f257a444605ca5badb1148288aa7275033f75d3f5
SHA512e64925ee682737251c7d5f42a378a4f6c23a50a07a6811882547567725b59c172da356b235afc977d4c1e8209f5c1ba696b9dd54e7739f67a71c099c031d7396
-
Filesize
1.1MB
MD53aa60704bd603617324c451feebac6f3
SHA18ef09d9e4f2dffedba8d8eeade3894219b38e01d
SHA256425f49ccd468e89848e100b74ad29277c811d3736cffad44ca09d5701024f074
SHA51290941e69a062def01c2137c22cd708af02a3cd533ebd883f3c7f65ccea90725b6faa292b6ca04c1471bb626f8eeae7b367ae85a141c4a0ec69e49973b7a32645
-
Filesize
1.1MB
MD584a9e1e1430f12ad6630afc1aa87a5d9
SHA11608345ade8cec5a1b022ca022f63573ee86f83b
SHA256828288fface35edf7e13a02e332c99b443471731227a7db482693bfe78da3b44
SHA512556753633a2ccd73ba9b03eba8a47ed2fb7b00f72dfc885458ba6040ee5a8ff7a4791ec3c5a29382560ed0770bff90e12eaeb6c7e3c622e29497c69b55a19a0a
-
Filesize
1.1MB
MD56b35b7ac09049cd9fbed013753a0fbbe
SHA1ef75b88e36e84e63e93d76d672264a1b03efa8e1
SHA25670739803b6a3d1f0290846a3e550f91fe696039c3924149290963a0ffb36457f
SHA51246ac203419783ecd1a0b40f67310d8e91838f6a0808549dd8d5ffa582c7c8d851dafad1fc3e94ccf021894070f03b2977a4e677ce631110b2eca5d8926e1fb16