Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
30/05/2024, 20:37
Static task
static1
Behavioral task
behavioral1
Sample
3edf3f59075b85db9196de07fa00903bccb90cb6bf576a6f7501264b23ffd3b3.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
3edf3f59075b85db9196de07fa00903bccb90cb6bf576a6f7501264b23ffd3b3.exe
Resource
win10v2004-20240426-en
General
-
Target
3edf3f59075b85db9196de07fa00903bccb90cb6bf576a6f7501264b23ffd3b3.exe
-
Size
1.1MB
-
MD5
c304d3d5061d72d4b4afd4e855e40cc1
-
SHA1
257437f98910d6ba849d580cd4d2ea9b0a6af4a7
-
SHA256
3edf3f59075b85db9196de07fa00903bccb90cb6bf576a6f7501264b23ffd3b3
-
SHA512
6b7799538163cb3dfb7a39155c19734734e884315455ed764f2bbb95b6c78e7d91413be040c205f438facd07cf94fe9f4450590282ea1365753ca2e8718cb39d
-
SSDEEP
24576:aH0dl8myX9Bg42QoXFkrzkmplSgRDYo0lG4Z8r7Qfbkiu5QT:acallSllG4ZM7QzMU
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2132 svchcst.exe -
Executes dropped EXE 11 IoCs
pid Process 2132 svchcst.exe 2696 svchcst.exe 2256 svchcst.exe 3060 svchcst.exe 1428 svchcst.exe 452 svchcst.exe 1580 svchcst.exe 1536 svchcst.exe 2572 svchcst.exe 1876 svchcst.exe 1900 svchcst.exe -
Loads dropped DLL 12 IoCs
pid Process 2520 WScript.exe 2520 WScript.exe 2668 WScript.exe 812 WScript.exe 812 WScript.exe 2352 WScript.exe 2352 WScript.exe 1220 WScript.exe 1584 WScript.exe 976 WScript.exe 2404 WScript.exe 976 WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1636 3edf3f59075b85db9196de07fa00903bccb90cb6bf576a6f7501264b23ffd3b3.exe 2132 svchcst.exe 2132 svchcst.exe 2132 svchcst.exe 2132 svchcst.exe 2132 svchcst.exe 2132 svchcst.exe 2132 svchcst.exe 2132 svchcst.exe 2132 svchcst.exe 2132 svchcst.exe 2132 svchcst.exe 2132 svchcst.exe 2132 svchcst.exe 2132 svchcst.exe 2132 svchcst.exe 2132 svchcst.exe 2132 svchcst.exe 2132 svchcst.exe 2132 svchcst.exe 2132 svchcst.exe 2132 svchcst.exe 2132 svchcst.exe 2132 svchcst.exe 2132 svchcst.exe 2132 svchcst.exe 2132 svchcst.exe 2132 svchcst.exe 2132 svchcst.exe 2132 svchcst.exe 2132 svchcst.exe 2132 svchcst.exe 2132 svchcst.exe 2132 svchcst.exe 2132 svchcst.exe 2132 svchcst.exe 2132 svchcst.exe 2132 svchcst.exe 2132 svchcst.exe 2132 svchcst.exe 2132 svchcst.exe 2132 svchcst.exe 2132 svchcst.exe 2132 svchcst.exe 2132 svchcst.exe 2132 svchcst.exe 2132 svchcst.exe 2132 svchcst.exe 2132 svchcst.exe 2132 svchcst.exe 2132 svchcst.exe 2132 svchcst.exe 2132 svchcst.exe 2132 svchcst.exe 2132 svchcst.exe 2132 svchcst.exe 2132 svchcst.exe 2132 svchcst.exe 2132 svchcst.exe 2696 svchcst.exe 2696 svchcst.exe 2696 svchcst.exe 2696 svchcst.exe 2696 svchcst.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1636 3edf3f59075b85db9196de07fa00903bccb90cb6bf576a6f7501264b23ffd3b3.exe -
Suspicious use of SetWindowsHookEx 24 IoCs
pid Process 1636 3edf3f59075b85db9196de07fa00903bccb90cb6bf576a6f7501264b23ffd3b3.exe 1636 3edf3f59075b85db9196de07fa00903bccb90cb6bf576a6f7501264b23ffd3b3.exe 2132 svchcst.exe 2132 svchcst.exe 2696 svchcst.exe 2696 svchcst.exe 2256 svchcst.exe 2256 svchcst.exe 3060 svchcst.exe 3060 svchcst.exe 1428 svchcst.exe 1428 svchcst.exe 452 svchcst.exe 452 svchcst.exe 1580 svchcst.exe 1580 svchcst.exe 1536 svchcst.exe 1536 svchcst.exe 2572 svchcst.exe 2572 svchcst.exe 1876 svchcst.exe 1876 svchcst.exe 1900 svchcst.exe 1900 svchcst.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1636 wrote to memory of 2520 1636 3edf3f59075b85db9196de07fa00903bccb90cb6bf576a6f7501264b23ffd3b3.exe 28 PID 1636 wrote to memory of 2520 1636 3edf3f59075b85db9196de07fa00903bccb90cb6bf576a6f7501264b23ffd3b3.exe 28 PID 1636 wrote to memory of 2520 1636 3edf3f59075b85db9196de07fa00903bccb90cb6bf576a6f7501264b23ffd3b3.exe 28 PID 1636 wrote to memory of 2520 1636 3edf3f59075b85db9196de07fa00903bccb90cb6bf576a6f7501264b23ffd3b3.exe 28 PID 2520 wrote to memory of 2132 2520 WScript.exe 30 PID 2520 wrote to memory of 2132 2520 WScript.exe 30 PID 2520 wrote to memory of 2132 2520 WScript.exe 30 PID 2520 wrote to memory of 2132 2520 WScript.exe 30 PID 2132 wrote to memory of 2668 2132 svchcst.exe 31 PID 2132 wrote to memory of 2668 2132 svchcst.exe 31 PID 2132 wrote to memory of 2668 2132 svchcst.exe 31 PID 2132 wrote to memory of 2668 2132 svchcst.exe 31 PID 2668 wrote to memory of 2696 2668 WScript.exe 32 PID 2668 wrote to memory of 2696 2668 WScript.exe 32 PID 2668 wrote to memory of 2696 2668 WScript.exe 32 PID 2668 wrote to memory of 2696 2668 WScript.exe 32 PID 2696 wrote to memory of 812 2696 svchcst.exe 33 PID 2696 wrote to memory of 812 2696 svchcst.exe 33 PID 2696 wrote to memory of 812 2696 svchcst.exe 33 PID 2696 wrote to memory of 812 2696 svchcst.exe 33 PID 812 wrote to memory of 2256 812 WScript.exe 34 PID 812 wrote to memory of 2256 812 WScript.exe 34 PID 812 wrote to memory of 2256 812 WScript.exe 34 PID 812 wrote to memory of 2256 812 WScript.exe 34 PID 2256 wrote to memory of 1360 2256 svchcst.exe 35 PID 2256 wrote to memory of 1360 2256 svchcst.exe 35 PID 2256 wrote to memory of 1360 2256 svchcst.exe 35 PID 2256 wrote to memory of 1360 2256 svchcst.exe 35 PID 812 wrote to memory of 3060 812 WScript.exe 36 PID 812 wrote to memory of 3060 812 WScript.exe 36 PID 812 wrote to memory of 3060 812 WScript.exe 36 PID 812 wrote to memory of 3060 812 WScript.exe 36 PID 3060 wrote to memory of 2352 3060 svchcst.exe 37 PID 3060 wrote to memory of 2352 3060 svchcst.exe 37 PID 3060 wrote to memory of 2352 3060 svchcst.exe 37 PID 3060 wrote to memory of 2352 3060 svchcst.exe 37 PID 2352 wrote to memory of 1428 2352 WScript.exe 38 PID 2352 wrote to memory of 1428 2352 WScript.exe 38 PID 2352 wrote to memory of 1428 2352 WScript.exe 38 PID 2352 wrote to memory of 1428 2352 WScript.exe 38 PID 1428 wrote to memory of 1764 1428 svchcst.exe 39 PID 1428 wrote to memory of 1764 1428 svchcst.exe 39 PID 1428 wrote to memory of 1764 1428 svchcst.exe 39 PID 1428 wrote to memory of 1764 1428 svchcst.exe 39 PID 2352 wrote to memory of 452 2352 WScript.exe 40 PID 2352 wrote to memory of 452 2352 WScript.exe 40 PID 2352 wrote to memory of 452 2352 WScript.exe 40 PID 2352 wrote to memory of 452 2352 WScript.exe 40 PID 452 wrote to memory of 1220 452 svchcst.exe 41 PID 452 wrote to memory of 1220 452 svchcst.exe 41 PID 452 wrote to memory of 1220 452 svchcst.exe 41 PID 452 wrote to memory of 1220 452 svchcst.exe 41 PID 1220 wrote to memory of 1580 1220 WScript.exe 42 PID 1220 wrote to memory of 1580 1220 WScript.exe 42 PID 1220 wrote to memory of 1580 1220 WScript.exe 42 PID 1220 wrote to memory of 1580 1220 WScript.exe 42 PID 1580 wrote to memory of 1584 1580 svchcst.exe 43 PID 1580 wrote to memory of 1584 1580 svchcst.exe 43 PID 1580 wrote to memory of 1584 1580 svchcst.exe 43 PID 1580 wrote to memory of 1584 1580 svchcst.exe 43 PID 1584 wrote to memory of 1536 1584 WScript.exe 46 PID 1584 wrote to memory of 1536 1584 WScript.exe 46 PID 1584 wrote to memory of 1536 1584 WScript.exe 46 PID 1584 wrote to memory of 1536 1584 WScript.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\3edf3f59075b85db9196de07fa00903bccb90cb6bf576a6f7501264b23ffd3b3.exe"C:\Users\Admin\AppData\Local\Temp\3edf3f59075b85db9196de07fa00903bccb90cb6bf576a6f7501264b23ffd3b3.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Deletes itself
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"6⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:812 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"8⤵PID:1360
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"8⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"10⤵PID:1764
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"10⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"11⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"12⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"13⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1536 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"14⤵
- Loads dropped DLL
PID:976 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"15⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2572 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"16⤵
- Loads dropped DLL
PID:2404 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"17⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1876
-
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"15⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1900
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92B
MD567b9b3e2ded7086f393ebbc36c5e7bca
SHA1e6299d0450b9a92a18cc23b5704a2b475652c790
SHA25644063c266686263f14cd2a83fee124fb3e61a9171a6aab69709464f49511011d
SHA512826fbc9481f46b1ae3db828a665c55c349023caf563e6e8c17321f5f3af3e4c3914955db6f0eebfc6defe561315435d47310b4d0499ab9c2c85bb61264dedc09
-
Filesize
696B
MD553586000e76ee6942df430b8716b4616
SHA197afd48071b6043c0a04b823875956b98a8d33bd
SHA256486e66f5aafdb179f41e1d1f39c8fb5662bfad43d5d53dfa89405a04b0d42d69
SHA5123a9a94289a667899d5ba7db41486854b9234929ecaa9d9aaff3188740cc084c0a633702be218f4b1a8afbfbd8a4e1a892eebbdfde1a7d3fb9c27c3482aa03bd7
-
Filesize
696B
MD5321085c6e57a8455a3e915906a6c160b
SHA19cd284183cd00b8ed9766cf5ba4433bd041c381e
SHA2560d5abb9f989e8b184b17b159987cacb4be04d476a85a3c684e797cdbded810cb
SHA512030c762c6548c28805fb3f9d97ed98ff958a379fb5142b7ba6c4cb2a8dd7a59051135e649abd6c16320361b10c374e4a1003c802560fcc244849089255fb7722
-
Filesize
696B
MD51931659cf1a0b565c26fde26192e60ea
SHA1290204916cf2bd320dd6af5de4fea33f4b987a23
SHA2568d4ff60de30d55f81dda162ccf8ad556e3a1c9a9e20260d8a767def90595191a
SHA5129a90635a350ecaf5d4f9c5787f4079e90d6e2983b87e8dc6db38a2d0121e68422d2fc8c7e322c0b6556cd92870713380edf55950260e9369350e96d4603f390e
-
Filesize
696B
MD55c256ba320c7487a2c3cdb62bea97bb5
SHA12a28e5d7bd4483a40fb6035f1ec6fcf1d66cb2fc
SHA256854aeaf6ba44537fc01088f8c336552a1aab4c6df84938d241c8616b6f0802e4
SHA512bb55f293471dda9b074664d4cf2dad094f8f0c2479c1fd754dd85199d1d1b1012cfa3b050711ac0b59368d6bf1756cfcadcaff1e47d4f103a093a0b77782fdc0
-
Filesize
696B
MD538a699d07d8879db6356427ad5568cde
SHA1a13f87e47243e126c2ea20018877fbeac913a320
SHA25633039fb8b50833ea2836de980992405e10426ad862007f2fef2a96147dccc7bb
SHA512b5373577a397c0eb493b1173f0fa5a583fe10b986eced439f39997707622fdb54dad7f39311c0148da02b9f0eda2c097d6d9e98b6a7c7d4aa5996e7cc5f4791d
-
Filesize
696B
MD5619955d43a58558c766025119a5a66cb
SHA1cfb43d2b9cb68699667ca8d4929e71b25ed115ab
SHA256a129bff17a859b7b2d6681f519c985c661797dd508ac249d30f02a0a78858cee
SHA51220f9499cddf2fb824365830736255a1dce689da0e94fa8e999ee4e28883e65637410710ea01204b5f3d48213f697461288da2b7a535511da87f848b1e6e83bc6
-
Filesize
696B
MD5a66ca64afe431b7c50358bd05ba54e34
SHA1f34d905ac06b3c07f936352bff4db70469f5057c
SHA2563a2a423d9df888fadef3786fdbf7fb0125eb8e1d08b22a707b6efa4bc00b7f43
SHA51290ea8413b1fce013f8e902e0e3efbbfd1ec30c7f26ca2fb05e390a847d22a1181eeb60dccf6e3f8fec5aeff2568506977ab47018a54d328078ab14407f3eeb09
-
Filesize
696B
MD55ef4272f4d6f345fc8cc1b2f059c81b4
SHA178bcb559f775d70e10396e1d6d7b95c28d2645d1
SHA25619f8d5209b4a5789cdfd5b67cb0b9f6c3546c62912bcb1ef1c69a15602beb652
SHA512002693255c600456d965b5a7e36f780deec4d80cd9fe56f7f974b8762e2b140002a1dabf4b059d6163c9cc00a0e1e9da71899e13347fb4bb2985bbc7058469cb
-
Filesize
753B
MD53e86f749bcbe62b1cf41e339ed67530e
SHA1f8a0743056db0941f4717b7b0b5073fb7b89f03b
SHA256737b946210cbabfba1eab3fd49a759af99bbf4fe559bc17b582a46794d8c08a3
SHA512ac9c36a761acf757d6687eab6aba3a5d4187ae5beb785147f631e879dc691a98bd7904960f260749484aef93f9fe269fbb4245ac33340c02fa7cb0f95ceea89f
-
Filesize
696B
MD58364c7b31d7cc2ff033d43e692633d35
SHA18c51dd902e1739104aff48093aecb669522fea1f
SHA2567ac0c74de647ef78ef6fffba49310f3c9c1b7d9ad19121d3502ec03c6e412a42
SHA5120615c03be93f2b8cadfa7f0fca0ec6a790728d61980a9cd5edc372c99d3d73c5bdd1e6abfc055d4bd7ff2a2aa67f6fd5221c0d0479e33ac6736522fdc0572571
-
Filesize
1.1MB
MD5dafa93a3241387542b37d8d1100d6c38
SHA1a2f23652470438276c43ecd0eddd7b0e5b4b6633
SHA256d7b50ab84ee7166aa1321e620e8f0d906e4c3f7db7fb4a1217d14025b6cbe127
SHA512109cae713b2f96cfc1bf58193f4d3e89058b9979b1e1145f1b1ee73010828700db93feab8f81daedab7ad71fb5ddbb8e019d7615d833ab6bc07d80ba4276caf1