Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/06/2024, 18:54

General

  • Target

    135680b96fdf05b58cab4042149b003cdb741df987adebeb2b9ae36d4d57eb60.exe

  • Size

    218KB

  • MD5

    08ed06e7defad3bb2052fceec8f80975

  • SHA1

    65a6219bf48c8df4b5b6312b419342e8923155aa

  • SHA256

    135680b96fdf05b58cab4042149b003cdb741df987adebeb2b9ae36d4d57eb60

  • SHA512

    e1193e191cf9261f8155367d5b7c1cb97104699f78e1d0d3facb959bb59f240efe7662a8e4a9802f032b97456960c25eadd857985146b71380111d42f4b67d0f

  • SSDEEP

    3072:5vm4SZsQrNzPrl6rjGMjp39d4u8iqddCxMIJOb2o5DsBPjim6hwM2H6:N1SyAJp6rjn1gOObn4b6h9h

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\135680b96fdf05b58cab4042149b003cdb741df987adebeb2b9ae36d4d57eb60.exe
    "C:\Users\Admin\AppData\Local\Temp\135680b96fdf05b58cab4042149b003cdb741df987adebeb2b9ae36d4d57eb60.exe"
    1⤵
    • Modifies WinLogon
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:4000
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Modifies WinLogon
      • Suspicious behavior: EnumeratesProcesses
      PID:3088

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\apppatch\svchost.exe

    Filesize

    218KB

    MD5

    a60b30d52646aafb2e4c05f0c55b41cc

    SHA1

    eb43e6fb3aec6ff8b6c6097ca62d597bd1c5c4e6

    SHA256

    e556c6f2c3b79fd87eb248beae09b1a0dfbd7bd511166d1830063ac60d97efa1

    SHA512

    9dcc6238ac9ea46149356abb2a686f70aa663f190f47b01879bc6f41e1128a2c34c5ef526e0a65fabba2723cb1dbfe2a426eaedfd9313abf0fecd1dfa646f86f

  • memory/3088-16-0x00000000028D0000-0x0000000002978000-memory.dmp

    Filesize

    672KB

  • memory/3088-20-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3088-22-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3088-14-0x0000000000400000-0x00000000005AE000-memory.dmp

    Filesize

    1.7MB

  • memory/3088-18-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3088-17-0x0000000000400000-0x00000000005AE000-memory.dmp

    Filesize

    1.7MB

  • memory/3088-15-0x0000000000400000-0x00000000005AE000-memory.dmp

    Filesize

    1.7MB

  • memory/4000-13-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/4000-10-0x0000000000400000-0x00000000005AE000-memory.dmp

    Filesize

    1.7MB

  • memory/4000-12-0x0000000002680000-0x00000000026D1000-memory.dmp

    Filesize

    324KB

  • memory/4000-0-0x0000000002680000-0x00000000026D1000-memory.dmp

    Filesize

    324KB

  • memory/4000-1-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB