Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
04/06/2024, 19:34
Static task
static1
Behavioral task
behavioral1
Sample
21a7689ec85bce4cd3f6fd009fd7a09b5ef95aa5b0c7b088b3d790fde602acc5.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
21a7689ec85bce4cd3f6fd009fd7a09b5ef95aa5b0c7b088b3d790fde602acc5.exe
Resource
win10v2004-20240508-en
General
-
Target
21a7689ec85bce4cd3f6fd009fd7a09b5ef95aa5b0c7b088b3d790fde602acc5.exe
-
Size
380KB
-
MD5
ad8d9faca8ef77f3b8a3cca301cb06ff
-
SHA1
d63d8f1a547061b950b173868cc300efa4018f7d
-
SHA256
21a7689ec85bce4cd3f6fd009fd7a09b5ef95aa5b0c7b088b3d790fde602acc5
-
SHA512
87325f7406df280c0591d29ee4c735350ea1870e4764f8ceffe1cd8fda8e3cbfca49a04a76d51981b2a5467cb0d81e84e78980a4e6dbbcec0f68718b7acb69ac
-
SSDEEP
6144:GaEmWPDNND9yRPzLq+YXFqaZiMLic9kzVd7EAC4TSs9EiwmryP:6mWhND9yJz+b1FcMLmp2ATTSsdwmryP
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2924 svchost.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\7957353 = "=ž¥x7f6œc-Ì!€V\tÀÂ\u0081û5\u00ad\x02Ê)å(\u00adSQ&€b7îª\x0fª¸µÝ˜\x14Çã(¡¶^UU\x03yc\u008dŽð\u008f=Âìëi¸\u00ad^ëã\x1d×G\"Šì(z‰´Ç\u00ad\x04/¡ÖÝ\u00adت50e7ã4%\u008dòØEŸ¿7\x14w˜Èi…G\u00ad\u00ad0AI‰¿+–h\x0f²\u008dó\x197å0˜g\u009d¢Ø¤\x19\x14üI\u0081óii\x11UkEÁtÆFcë”â¶\x1aŸu8LÁ˜A4€/8»‰&5Ÿå^Æ\x119\x0fóŽlÅ÷Ï“âîl\u008f+y=‰\x1a/ø¢^UŸzi6Ül…yw·\x13\x14ª6/9Ïwyâ\u009d/ì\x11ð±õ˜õ<¶\x1d”Râ¤øГ÷ð0iÔ“×\x14\x0fªÖ\u00a0ÏhGÂ\x03Ï8â×\x03i(" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\7957353 = "=ž¥x7f6œc-Ì!€V\tÀÂ\u0081û5\u00ad\x02Ê)å(\u00adSQ&€b7îª\x0fª¸µÝ˜\x14Çã(¡¶^UU\x03yc\u008dŽð\u008f=Âìëi¸\u00ad^ëã\x1d×G\"Šì(z‰´Ç\u00ad\x04/¡ÖÝ\u00adت50e7ã4%\u008dòØEŸ¿7\x14w˜Èi…G\u00ad\u00ad0AI‰¿+–h\x0f²\u008dó\x197å0˜g\u009d¢Ø¤\x19\x14üI\u0081óii\x11UkEÁtÆFcë”â¶\x1aŸu8LÁ˜A4€/8»‰&5Ÿå^Æ\x119\x0fóŽlÅ÷Ï“âîl\u008f+y=‰\x1a/ø¢^UŸzi6Ül…yw·\x13\x14ª6/9Ïwyâ\u009d/ì\x11ð±õ˜õ<¶\x1d”Râ¤øГ÷ð0iÔ“×\x14\x0fªÖ\u00a0ÏhGÂ\x03Ï8â×\x03i(" 21a7689ec85bce4cd3f6fd009fd7a09b5ef95aa5b0c7b088b3d790fde602acc5.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe 21a7689ec85bce4cd3f6fd009fd7a09b5ef95aa5b0c7b088b3d790fde602acc5.exe File opened for modification C:\Windows\apppatch\svchost.exe 21a7689ec85bce4cd3f6fd009fd7a09b5ef95aa5b0c7b088b3d790fde602acc5.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2376 21a7689ec85bce4cd3f6fd009fd7a09b5ef95aa5b0c7b088b3d790fde602acc5.exe 2376 21a7689ec85bce4cd3f6fd009fd7a09b5ef95aa5b0c7b088b3d790fde602acc5.exe 2376 21a7689ec85bce4cd3f6fd009fd7a09b5ef95aa5b0c7b088b3d790fde602acc5.exe 2376 21a7689ec85bce4cd3f6fd009fd7a09b5ef95aa5b0c7b088b3d790fde602acc5.exe 2376 21a7689ec85bce4cd3f6fd009fd7a09b5ef95aa5b0c7b088b3d790fde602acc5.exe 2376 21a7689ec85bce4cd3f6fd009fd7a09b5ef95aa5b0c7b088b3d790fde602acc5.exe 2376 21a7689ec85bce4cd3f6fd009fd7a09b5ef95aa5b0c7b088b3d790fde602acc5.exe 2376 21a7689ec85bce4cd3f6fd009fd7a09b5ef95aa5b0c7b088b3d790fde602acc5.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2376 21a7689ec85bce4cd3f6fd009fd7a09b5ef95aa5b0c7b088b3d790fde602acc5.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2376 wrote to memory of 2924 2376 21a7689ec85bce4cd3f6fd009fd7a09b5ef95aa5b0c7b088b3d790fde602acc5.exe 83 PID 2376 wrote to memory of 2924 2376 21a7689ec85bce4cd3f6fd009fd7a09b5ef95aa5b0c7b088b3d790fde602acc5.exe 83 PID 2376 wrote to memory of 2924 2376 21a7689ec85bce4cd3f6fd009fd7a09b5ef95aa5b0c7b088b3d790fde602acc5.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\21a7689ec85bce4cd3f6fd009fd7a09b5ef95aa5b0c7b088b3d790fde602acc5.exe"C:\Users\Admin\AppData\Local\Temp\21a7689ec85bce4cd3f6fd009fd7a09b5ef95aa5b0c7b088b3d790fde602acc5.exe"1⤵
- Modifies WinLogon
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- Suspicious behavior: EnumeratesProcesses
PID:2924
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168B
MD5d57e3a550060f85d44a175139ea23021
SHA12c5cb3428a322c9709a34d04dd86fe7628f8f0a6
SHA25643edf068d34276e8ade4113d4d7207de19fc98a2ae1c07298e593edae2a8774c
SHA5120364fe6a010fce7a3f4a6344c84468c64b20fd131f3160fc649db78f1075ba52d8a1c4496e50dbe27c357e01ee52e94cdcda8f7927cba28d5f2f45b9da690063
-
Filesize
593B
MD5926512864979bc27cf187f1de3f57aff
SHA1acdeb9d6187932613c7fa08eaf28f0cd8116f4b5
SHA256b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f
SHA512f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b
-
Filesize
42KB
MD52dd064acd7b3dbf2e7df17acc523b72f
SHA1b5d3498532ee38b31195af75c0ebed2cbd9bea4a
SHA256f071b75823c2db0536098ada1966a82cd8028e69e6018671a33fe9f8c6d26253
SHA512b495df338f9676805d721874e5d3fc9526f61d6a7d3959dbce88f665e54cb67e122f0b23a79da3400e3acea3169ffd7e2ae833921e0b2d9229c4ea95b9c04eee
-
Filesize
42KB
MD52a794fbe7e6848f39c5dcf644265bde8
SHA1bdfb381f685ea07fa94a3609944e8379a418965b
SHA256e162e8ad28bb50ba1747759647755e90d278df499c773be2f8fe99c7549e38aa
SHA512f02a2e5c2e958f35379c7f4a937ffcc82719f6ddbdad63cdde991d069ccfe88b7de2f6f8756de6c9d36fb2721de04fffaabe95053e1b9fbf4876583b76d0906b
-
Filesize
23KB
MD5915a641b9ca65fe710699170c25ced28
SHA1888fd3467dc35cfa9e1c1474b7900c874c9bf2e9
SHA256e71b01116bb323b91fda3174c1786cd2f8ee870dece2bbad9fdacf3195af7ad4
SHA512f05c5df87b7be4de33437da6e542320ae85f5a904277088ba99ad913855bdeb6b8481a12b042e63230fb9e6a1a28e5ee95567b236131c44d34382eaaf7caba0d
-
Filesize
457B
MD5531ec87a0b2f9477a52d88b111d0d46a
SHA150a72e5752075309f91c062e0282a7e7cd1e751e
SHA2564875b451859b1eb8d0d3b040b1bb8d654d212edb6d9c721cf0f4372129579385
SHA51207994963fd76b31ef0ba2c7f418dcb3ee0290f6baca2d8ec63a6e6b861557b13fbc20d2f0a10a66f35c4d72d4d2c1920ac88b96174604f2f8856868912327da1
-
Filesize
380KB
MD5742295bf07d3e0bbf0697006aa7bd832
SHA1d6ae08deeb8078a5240b7fc330e29cddc0e8118d
SHA256e742d78c20ae2ae96dbbd4b6a6e610cf8ad9efdb1d1c441109a1b5cbaab5ee9d
SHA5124d068e82983da2edd52244d9a25a3ccfb1dae5194d0af2001ef665783f54d529c99b69e19b0603d0d684c2b1bf8821056f4a80717eb07b3411d6a7d5f6f7acb3