Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
24/05/2024, 19:07
Static task
static1
Behavioral task
behavioral1
Sample
17c32ce142873391c8a97127926af2d46f68013d4645ee681dbbf2ccfe2a0093.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
17c32ce142873391c8a97127926af2d46f68013d4645ee681dbbf2ccfe2a0093.exe
Resource
win10v2004-20240426-en
General
-
Target
17c32ce142873391c8a97127926af2d46f68013d4645ee681dbbf2ccfe2a0093.exe
-
Size
211KB
-
MD5
4bac063010f7d1fd0533da5140835b67
-
SHA1
17a4a802dc09b433740fe43f4c3c3f5b5b6e7a91
-
SHA256
17c32ce142873391c8a97127926af2d46f68013d4645ee681dbbf2ccfe2a0093
-
SHA512
9808378dbf5939e88d6ea1601d49385c48aa8ef4f1a55f267f3c0989e007c2d71adfa953965e06b4fbd39da6d32fd6dbd893f27403a5712a12b508f4408d18cf
-
SSDEEP
6144:KmKVGe1XIpQiU/ma3MB8hH2Tkp6bYnWcZVol0N5TzQ3:M71YpQiU/RcO1VQInVob
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1044 svchost.exe -
Modifies WinLogon 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\d22405e1 = "C:\\Windows\\apppatch\\svchost.exe" 17c32ce142873391c8a97127926af2d46f68013d4645ee681dbbf2ccfe2a0093.exe -
Drops file in Program Files directory 36 IoCs
description ioc Process File created C:\Program Files (x86)\Windows Defender\galyqaz.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\winsta.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\dll\winsta.pdb svchost.exe File created C:\Program Files (x86)\Windows Defender\vocyzit.com svchost.exe File created C:\Program Files (x86)\Windows Defender\gatyfus.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qetyhyg.com svchost.exe File created C:\Program Files (x86)\Windows Defender\galynuh.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vofycot.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lygyvuj.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\symbols\dll\wkernelbase.pdb svchost.exe File created C:\Program Files (x86)\Windows Defender\qetyfuv.com svchost.exe File created C:\Program Files (x86)\Windows Defender\pupycag.com svchost.exe File created C:\Program Files (x86)\Windows Defender\gadyciz.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\symbols\dll\winsta.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\WinSCard.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\dll\WinSCard.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\symbols\DLL\wkernel32.pdb svchost.exe File created C:\Program Files (x86)\Windows Defender\vonypom.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\dll\wrpcrt4.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\symbols\dll\wrpcrt4.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\DLL\wkernel32.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\wntdll.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\symbols\dll\wntdll.pdb svchost.exe File created C:\Program Files (x86)\Windows Defender\qegyval.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\wrpcrt4.pdb svchost.exe File created C:\Program Files (x86)\Windows Defender\qexyhuv.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lyxynyx.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\wkernelbase.pdb svchost.exe File created C:\Program Files (x86)\Windows Defender\gahyhiz.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\dll\wkernelbase.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\symbols\dll\WinSCard.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\wkernel32.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\dll\wntdll.pdb svchost.exe File created C:\Program Files (x86)\Windows Defender\lymyxid.com svchost.exe File created C:\Program Files (x86)\Windows Defender\gahyqah.com svchost.exe File created C:\Program Files (x86)\Windows Defender\pupydeq.com svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\apppatch\svchost.exe 17c32ce142873391c8a97127926af2d46f68013d4645ee681dbbf2ccfe2a0093.exe File created C:\Windows\apppatch\svchost.exe 17c32ce142873391c8a97127926af2d46f68013d4645ee681dbbf2ccfe2a0093.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Local Settings\MuiCache svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1044 svchost.exe 1044 svchost.exe 1044 svchost.exe 1044 svchost.exe 1044 svchost.exe 1044 svchost.exe 1044 svchost.exe 1044 svchost.exe 1044 svchost.exe 1044 svchost.exe 1044 svchost.exe 1044 svchost.exe 1044 svchost.exe 1044 svchost.exe 1044 svchost.exe 1044 svchost.exe 1044 svchost.exe 1044 svchost.exe 1044 svchost.exe 1044 svchost.exe 1044 svchost.exe 1044 svchost.exe 1044 svchost.exe 1044 svchost.exe 1044 svchost.exe 1044 svchost.exe 1044 svchost.exe 1044 svchost.exe 1044 svchost.exe 1044 svchost.exe 1044 svchost.exe 1044 svchost.exe 1044 svchost.exe 1044 svchost.exe 1044 svchost.exe 1044 svchost.exe 1044 svchost.exe 1044 svchost.exe 1044 svchost.exe 1044 svchost.exe 1044 svchost.exe 1044 svchost.exe 1044 svchost.exe 1044 svchost.exe 1044 svchost.exe 1044 svchost.exe 1044 svchost.exe 1044 svchost.exe 1044 svchost.exe 1044 svchost.exe 1044 svchost.exe 1044 svchost.exe 1044 svchost.exe 1044 svchost.exe 1044 svchost.exe 1044 svchost.exe 1044 svchost.exe 1044 svchost.exe 1044 svchost.exe 1044 svchost.exe 1044 svchost.exe 1044 svchost.exe 1044 svchost.exe 1044 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1476 17c32ce142873391c8a97127926af2d46f68013d4645ee681dbbf2ccfe2a0093.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeSecurityPrivilege 1476 17c32ce142873391c8a97127926af2d46f68013d4645ee681dbbf2ccfe2a0093.exe Token: SeSecurityPrivilege 1476 17c32ce142873391c8a97127926af2d46f68013d4645ee681dbbf2ccfe2a0093.exe Token: SeSecurityPrivilege 1044 svchost.exe Token: SeSecurityPrivilege 1044 svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1476 wrote to memory of 1044 1476 17c32ce142873391c8a97127926af2d46f68013d4645ee681dbbf2ccfe2a0093.exe 83 PID 1476 wrote to memory of 1044 1476 17c32ce142873391c8a97127926af2d46f68013d4645ee681dbbf2ccfe2a0093.exe 83 PID 1476 wrote to memory of 1044 1476 17c32ce142873391c8a97127926af2d46f68013d4645ee681dbbf2ccfe2a0093.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\17c32ce142873391c8a97127926af2d46f68013d4645ee681dbbf2ccfe2a0093.exe"C:\Users\Admin\AppData\Local\Temp\17c32ce142873391c8a97127926af2d46f68013d4645ee681dbbf2ccfe2a0093.exe"1⤵
- Modifies WinLogon
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1044
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168B
MD5d57e3a550060f85d44a175139ea23021
SHA12c5cb3428a322c9709a34d04dd86fe7628f8f0a6
SHA25643edf068d34276e8ade4113d4d7207de19fc98a2ae1c07298e593edae2a8774c
SHA5120364fe6a010fce7a3f4a6344c84468c64b20fd131f3160fc649db78f1075ba52d8a1c4496e50dbe27c357e01ee52e94cdcda8f7927cba28d5f2f45b9da690063
-
Filesize
211KB
MD57cbc139cb40f6acfb6d4a1e723ec3c3d
SHA197ad29c42f1d63a83721ec2fc66d349ab3753038
SHA2569be94941dea9e5ccc6089d971dd9f742a9f026f8ada43e82056bb45ae7b634cc
SHA512ab109b94251bcbf900b04bcccc74902afeaca53e270ad764374e0401a4aa366c93eb5bade16ab3e21fb08cf3020b2f159bbefd42168afeea2d068b966ee20d17