Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
16/06/2024, 20:22 UTC
Static task
static1
Behavioral task
behavioral1
Sample
2e36e98aa13f358bd07f144c1bb944a5b6c964ba84f19a8df11ac4cc9d31662b.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
2e36e98aa13f358bd07f144c1bb944a5b6c964ba84f19a8df11ac4cc9d31662b.exe
Resource
win10v2004-20240611-en
General
-
Target
2e36e98aa13f358bd07f144c1bb944a5b6c964ba84f19a8df11ac4cc9d31662b.exe
-
Size
1.1MB
-
MD5
a1fac83237026fc981996f97b9fb6512
-
SHA1
7f2d3e2ad72a4e950010d510eebb1454f62035fd
-
SHA256
2e36e98aa13f358bd07f144c1bb944a5b6c964ba84f19a8df11ac4cc9d31662b
-
SHA512
8a0f041c6d3d1a554b391909464c4411f7ac0ad359a86d2ac2394db45cfcf97d9cfbb90060cd691a4609b31117fe23ae26b1ba913c2b76d3e2832b7f0ed8f7f7
-
SSDEEP
24576:aH0dl8myX9Bg42QoXFkrzkmplSgRDYo0lG4Z8r7Qfbkiu5QR:acallSllG4ZM7QzMy
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2564 svchcst.exe -
Executes dropped EXE 10 IoCs
pid Process 2564 svchcst.exe 2852 svchcst.exe 1808 svchcst.exe 1672 svchcst.exe 1016 svchcst.exe 1880 svchcst.exe 2608 svchcst.exe 1068 svchcst.exe 2600 svchcst.exe 2172 svchcst.exe -
Loads dropped DLL 14 IoCs
pid Process 2616 WScript.exe 2616 WScript.exe 1796 WScript.exe 1796 WScript.exe 1896 WScript.exe 2840 WScript.exe 2840 WScript.exe 2328 WScript.exe 1264 WScript.exe 1264 WScript.exe 1952 WScript.exe 876 WScript.exe 2776 WScript.exe 876 WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2472 2e36e98aa13f358bd07f144c1bb944a5b6c964ba84f19a8df11ac4cc9d31662b.exe 2564 svchcst.exe 2564 svchcst.exe 2564 svchcst.exe 2564 svchcst.exe 2564 svchcst.exe 2564 svchcst.exe 2564 svchcst.exe 2564 svchcst.exe 2564 svchcst.exe 2564 svchcst.exe 2564 svchcst.exe 2564 svchcst.exe 2564 svchcst.exe 2564 svchcst.exe 2564 svchcst.exe 2564 svchcst.exe 2564 svchcst.exe 2564 svchcst.exe 2564 svchcst.exe 2564 svchcst.exe 2564 svchcst.exe 2564 svchcst.exe 2564 svchcst.exe 2564 svchcst.exe 2564 svchcst.exe 2564 svchcst.exe 2564 svchcst.exe 2564 svchcst.exe 2564 svchcst.exe 2564 svchcst.exe 2564 svchcst.exe 2564 svchcst.exe 2564 svchcst.exe 2564 svchcst.exe 2564 svchcst.exe 2564 svchcst.exe 2564 svchcst.exe 2564 svchcst.exe 2564 svchcst.exe 2564 svchcst.exe 2564 svchcst.exe 2564 svchcst.exe 2564 svchcst.exe 2564 svchcst.exe 2564 svchcst.exe 2564 svchcst.exe 2564 svchcst.exe 2564 svchcst.exe 2564 svchcst.exe 2564 svchcst.exe 2564 svchcst.exe 2564 svchcst.exe 2564 svchcst.exe 2564 svchcst.exe 2564 svchcst.exe 2564 svchcst.exe 2564 svchcst.exe 2564 svchcst.exe 2852 svchcst.exe 2852 svchcst.exe 2852 svchcst.exe 2852 svchcst.exe 2852 svchcst.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2472 2e36e98aa13f358bd07f144c1bb944a5b6c964ba84f19a8df11ac4cc9d31662b.exe -
Suspicious use of SetWindowsHookEx 22 IoCs
pid Process 2472 2e36e98aa13f358bd07f144c1bb944a5b6c964ba84f19a8df11ac4cc9d31662b.exe 2472 2e36e98aa13f358bd07f144c1bb944a5b6c964ba84f19a8df11ac4cc9d31662b.exe 2564 svchcst.exe 2564 svchcst.exe 2852 svchcst.exe 2852 svchcst.exe 1808 svchcst.exe 1808 svchcst.exe 1672 svchcst.exe 1672 svchcst.exe 1016 svchcst.exe 1016 svchcst.exe 1880 svchcst.exe 1880 svchcst.exe 2608 svchcst.exe 2608 svchcst.exe 1068 svchcst.exe 1068 svchcst.exe 2600 svchcst.exe 2600 svchcst.exe 2172 svchcst.exe 2172 svchcst.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2472 wrote to memory of 2616 2472 2e36e98aa13f358bd07f144c1bb944a5b6c964ba84f19a8df11ac4cc9d31662b.exe 28 PID 2472 wrote to memory of 2616 2472 2e36e98aa13f358bd07f144c1bb944a5b6c964ba84f19a8df11ac4cc9d31662b.exe 28 PID 2472 wrote to memory of 2616 2472 2e36e98aa13f358bd07f144c1bb944a5b6c964ba84f19a8df11ac4cc9d31662b.exe 28 PID 2472 wrote to memory of 2616 2472 2e36e98aa13f358bd07f144c1bb944a5b6c964ba84f19a8df11ac4cc9d31662b.exe 28 PID 2616 wrote to memory of 2564 2616 WScript.exe 30 PID 2616 wrote to memory of 2564 2616 WScript.exe 30 PID 2616 wrote to memory of 2564 2616 WScript.exe 30 PID 2616 wrote to memory of 2564 2616 WScript.exe 30 PID 2564 wrote to memory of 1796 2564 svchcst.exe 31 PID 2564 wrote to memory of 1796 2564 svchcst.exe 31 PID 2564 wrote to memory of 1796 2564 svchcst.exe 31 PID 2564 wrote to memory of 1796 2564 svchcst.exe 31 PID 1796 wrote to memory of 2852 1796 WScript.exe 32 PID 1796 wrote to memory of 2852 1796 WScript.exe 32 PID 1796 wrote to memory of 2852 1796 WScript.exe 32 PID 1796 wrote to memory of 2852 1796 WScript.exe 32 PID 2852 wrote to memory of 1896 2852 svchcst.exe 33 PID 2852 wrote to memory of 1896 2852 svchcst.exe 33 PID 2852 wrote to memory of 1896 2852 svchcst.exe 33 PID 2852 wrote to memory of 1896 2852 svchcst.exe 33 PID 1896 wrote to memory of 1808 1896 WScript.exe 34 PID 1896 wrote to memory of 1808 1896 WScript.exe 34 PID 1896 wrote to memory of 1808 1896 WScript.exe 34 PID 1896 wrote to memory of 1808 1896 WScript.exe 34 PID 1808 wrote to memory of 2840 1808 svchcst.exe 35 PID 1808 wrote to memory of 2840 1808 svchcst.exe 35 PID 1808 wrote to memory of 2840 1808 svchcst.exe 35 PID 1808 wrote to memory of 2840 1808 svchcst.exe 35 PID 2840 wrote to memory of 1672 2840 WScript.exe 36 PID 2840 wrote to memory of 1672 2840 WScript.exe 36 PID 2840 wrote to memory of 1672 2840 WScript.exe 36 PID 2840 wrote to memory of 1672 2840 WScript.exe 36 PID 1672 wrote to memory of 2328 1672 svchcst.exe 37 PID 1672 wrote to memory of 2328 1672 svchcst.exe 37 PID 1672 wrote to memory of 2328 1672 svchcst.exe 37 PID 1672 wrote to memory of 2328 1672 svchcst.exe 37 PID 2328 wrote to memory of 1016 2328 WScript.exe 38 PID 2328 wrote to memory of 1016 2328 WScript.exe 38 PID 2328 wrote to memory of 1016 2328 WScript.exe 38 PID 2328 wrote to memory of 1016 2328 WScript.exe 38 PID 1016 wrote to memory of 1264 1016 svchcst.exe 39 PID 1016 wrote to memory of 1264 1016 svchcst.exe 39 PID 1016 wrote to memory of 1264 1016 svchcst.exe 39 PID 1016 wrote to memory of 1264 1016 svchcst.exe 39 PID 1264 wrote to memory of 1880 1264 WScript.exe 40 PID 1264 wrote to memory of 1880 1264 WScript.exe 40 PID 1264 wrote to memory of 1880 1264 WScript.exe 40 PID 1264 wrote to memory of 1880 1264 WScript.exe 40 PID 1880 wrote to memory of 1952 1880 svchcst.exe 41 PID 1880 wrote to memory of 1952 1880 svchcst.exe 41 PID 1880 wrote to memory of 1952 1880 svchcst.exe 41 PID 1880 wrote to memory of 1952 1880 svchcst.exe 41 PID 1952 wrote to memory of 2608 1952 WScript.exe 42 PID 1952 wrote to memory of 2608 1952 WScript.exe 42 PID 1952 wrote to memory of 2608 1952 WScript.exe 42 PID 1952 wrote to memory of 2608 1952 WScript.exe 42 PID 2608 wrote to memory of 876 2608 svchcst.exe 43 PID 2608 wrote to memory of 876 2608 svchcst.exe 43 PID 2608 wrote to memory of 876 2608 svchcst.exe 43 PID 2608 wrote to memory of 876 2608 svchcst.exe 43 PID 876 wrote to memory of 1068 876 WScript.exe 46 PID 876 wrote to memory of 1068 876 WScript.exe 46 PID 876 wrote to memory of 1068 876 WScript.exe 46 PID 876 wrote to memory of 1068 876 WScript.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\2e36e98aa13f358bd07f144c1bb944a5b6c964ba84f19a8df11ac4cc9d31662b.exe"C:\Users\Admin\AppData\Local\Temp\2e36e98aa13f358bd07f144c1bb944a5b6c964ba84f19a8df11ac4cc9d31662b.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Deletes itself
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"6⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"8⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"10⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"11⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"12⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"13⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"14⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"15⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"16⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:876 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"17⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1068 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"18⤵
- Loads dropped DLL
PID:2776 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"19⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2600
-
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"17⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2172
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92B
MD567b9b3e2ded7086f393ebbc36c5e7bca
SHA1e6299d0450b9a92a18cc23b5704a2b475652c790
SHA25644063c266686263f14cd2a83fee124fb3e61a9171a6aab69709464f49511011d
SHA512826fbc9481f46b1ae3db828a665c55c349023caf563e6e8c17321f5f3af3e4c3914955db6f0eebfc6defe561315435d47310b4d0499ab9c2c85bb61264dedc09
-
Filesize
696B
MD5619955d43a58558c766025119a5a66cb
SHA1cfb43d2b9cb68699667ca8d4929e71b25ed115ab
SHA256a129bff17a859b7b2d6681f519c985c661797dd508ac249d30f02a0a78858cee
SHA51220f9499cddf2fb824365830736255a1dce689da0e94fa8e999ee4e28883e65637410710ea01204b5f3d48213f697461288da2b7a535511da87f848b1e6e83bc6
-
Filesize
696B
MD50e6005a9dcb5a78d6fdd54527602f926
SHA190adc62e99f3c94c643596af0e17b5853b91fe1f
SHA256847552b1ad30bd72f24acfe4afa5c326d3e79d7c2f147c958d72e92daca716da
SHA512b4acfd81c1e926fcd305690aa3780bbec50460bcf947d17c20d6445faca4e774294b9da3a144207ccb3855e3ea2008a2d82ef691f32a4db6c7c3eb8202c6b568
-
Filesize
696B
MD51931659cf1a0b565c26fde26192e60ea
SHA1290204916cf2bd320dd6af5de4fea33f4b987a23
SHA2568d4ff60de30d55f81dda162ccf8ad556e3a1c9a9e20260d8a767def90595191a
SHA5129a90635a350ecaf5d4f9c5787f4079e90d6e2983b87e8dc6db38a2d0121e68422d2fc8c7e322c0b6556cd92870713380edf55950260e9369350e96d4603f390e
-
Filesize
696B
MD551b2348c37bbedcb127fa176820f5ea2
SHA16e70ca09179127890e64c4ffa345b2af573c39fa
SHA2567b37f5580068bfba5583d762d9b64c8ee6468a9e064547f230757c4be595bd02
SHA5120f9755ae0408b0dd6e1279bfa8c5dfbe63b3775a81a3c5b342c5e56e7521d292b0c4e94053e6fa0c3da233f3af60aae2dc28749f991ea81fd9bf2627698a343e
-
Filesize
696B
MD5234d3bd7d4c79c9f8515c4e3812a1c9b
SHA1f0add1f9e02bad7016d7b183f6d64d4800df4e12
SHA256c9ba84b70031261f15918f7e74bd45b7b889b8e8427efa4ff19537e3d27633d0
SHA5123d42cb367d8ba46cff006692c69f88ab165b9b326000c0bf187e682ce181413dd6f8eb083972765f332dc4309996b3621018ce3cf22d4d944c2b3c0e51f4aea0
-
Filesize
696B
MD525741fab0bc335b1ed971b3134b0edd3
SHA19849046efa3f20662f73cefd0d090bef480c9835
SHA25605963c6d3a7cc5421377a784df6474456fcbd2f95c7190f2ddb4a9ccbfbe7f98
SHA5126e772baf90739a76c5c477780e2d158502b55d9c898e69402b0a3bfb840949959c6779f9b291c0503a4fcad95369be55b5f3233ded9329d49d5cde3f1a8369e1
-
Filesize
696B
MD5d32955f30e8aad52247ece470e41d5ad
SHA1ac6775ee1d2cccafe3baeb722ca57bf16953f173
SHA256bbd8749995b7f218975a3955fac72a16d1f5a3fd3826f7bb98d0b4fe537d6697
SHA5121a00595cdfca51c9c95101a1d04a15089aded3fc687de721d882c6ef57697a943c0a99d917167e76d55040c5d8607e01fe5a206054112635a642f6364d3fdcaf
-
Filesize
696B
MD5ed546bb522a06b2fe1964359d1c00489
SHA1f645b56f6b42e6e187d97e90006e64493e168dfd
SHA256770b107915197c74e581cfd8ea4047ad94180a81a2e6422eb5a8139839645257
SHA512bc0172ea605aeb832088b2e5d3cd3c4ba9f052a1f4afaa3696e8672f3e6a5776537472d56805f0dea9d8474ffca77d9b574331c9dc57bc7a6e029e01169de0b3
-
Filesize
753B
MD557a0d6f2423431e3eb02071a1150faf9
SHA119dd0adb7f5d777e1f32b0ba6fe7d29dfe097e90
SHA256a816b48680b9c06e3d9a22b87a6dd376e3cffc5932ed235299e33426c242110a
SHA512fa9e6eedc473773f8e3f79708559cd379ff85b22eaa5cd9f28c9045311097cb6cc182555622215b7a8ec7ea5321f0067010ea27c0dc663b4413b2de17e9b4fd9
-
Filesize
1.1MB
MD5d7014ee595828f9774d2cfc404900880
SHA15e171778e0d3c90de226795801a4f119f0a555ee
SHA256b91b5125170588ff8069bbb1327abecfe28b23385d31130e2431163632cef44c
SHA5124f0dbc9fb2a225dde6a7dd7d8557f2e09e77e1a3e79f45ffb71cdbff03fb1550877ae982848656b8ab50e83acf39e51242d9fbc1fb9c1d159c306f9ad4967d18
-
Filesize
1.1MB
MD5de9807ebfb5b8bf18a00fada6103ba50
SHA1e05f9d9cdc8c4cc1d823b3cb1c4bdef3868327e2
SHA2560b39c89925965075fa0786eb6bd6b1ebce8957df4dfb088445470eeccd0a8c2e
SHA512775cdb5d761dd198008a71c8becc9602968e7be60b70e3ca8328be65c8b656f83fd5b219bd06d791f3c4afa2b9560a7e29e0fdceb20ceadc6d27f035a107a600
-
Filesize
1.1MB
MD5f30cf0a1bb8bc5b12978e7e0ed1b7ea9
SHA1cb14d7c18252d5e5f6e46377511e5303c44722b3
SHA2564f16b68687a254a5a58ade42d833fdd73baa1881997c753fa900fb7d8cc7c1bf
SHA512b7cec1e3fd5e3ce3ef895caa1431c383359adc20b6d8420c490da5aea3f5567ea865a828bbd645947a18f9b4d20abdd2c350577409d57d9c48b4b1ed51b15649
-
Filesize
1.1MB
MD527c0863adedd373f5a389c6e6199cabd
SHA1b162e386fe350422a1a80e71929a1fa358ca05ee
SHA2560eca9f3152648f95bb334d9b81f7d05393afd1f7893e0b476e3c74acca577b9c
SHA512a1c23bdfebc90fe651c13f960dd8b80f4a052aee4410c03bef2e3b4c74626094080250cd973009b0c320fb7e1e0aeca0d20f0143557539580d2434d37414f07d