Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
01/07/2024, 00:05
Static task
static1
Behavioral task
behavioral1
Sample
8d4f15d230403dc41be201db493c3da66f29ebad75bbfc53a559c4a6c372d925.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
8d4f15d230403dc41be201db493c3da66f29ebad75bbfc53a559c4a6c372d925.exe
Resource
win10v2004-20240611-en
General
-
Target
8d4f15d230403dc41be201db493c3da66f29ebad75bbfc53a559c4a6c372d925.exe
-
Size
218KB
-
MD5
370c7b1ecf6a60a3fa2b6f5e08a102cd
-
SHA1
eb8b0f6b5128015d731ebeb7f62e15838e544385
-
SHA256
8d4f15d230403dc41be201db493c3da66f29ebad75bbfc53a559c4a6c372d925
-
SHA512
13c1d1fd10efde6b5499d5eee89308b954c8bf7d6141c54234325bb29b8563c6472328cce6b4d39fb51a5187597cbb1c7a313ede88d1617d9ec780533f506a8b
-
SSDEEP
6144:yEQBDdO1z7L/EIhZDE9oLfFWlMZT7+DGaMwIC:yEGDdQNHEwWlMxYG/wI
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 1860 svchost.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\eaff75c0 = "\x13]Īä®×W\"0\x18¬\x10T¿\u0081Ù¸lÉÆŠ,\u00a0L.§î¦Û6$h\x18ý<÷%€ä" 8d4f15d230403dc41be201db493c3da66f29ebad75bbfc53a559c4a6c372d925.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\eaff75c0 = "\x13]Īä®×W\"0\x18¬\x10T¿\u0081Ù¸lÉÆŠ,\u00a0L.§î¦Û6$h\x18ý<÷%€ä" svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\apppatch\svchost.exe 8d4f15d230403dc41be201db493c3da66f29ebad75bbfc53a559c4a6c372d925.exe File created C:\Windows\apppatch\svchost.exe 8d4f15d230403dc41be201db493c3da66f29ebad75bbfc53a559c4a6c372d925.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3188 8d4f15d230403dc41be201db493c3da66f29ebad75bbfc53a559c4a6c372d925.exe 3188 8d4f15d230403dc41be201db493c3da66f29ebad75bbfc53a559c4a6c372d925.exe 3188 8d4f15d230403dc41be201db493c3da66f29ebad75bbfc53a559c4a6c372d925.exe 3188 8d4f15d230403dc41be201db493c3da66f29ebad75bbfc53a559c4a6c372d925.exe 3188 8d4f15d230403dc41be201db493c3da66f29ebad75bbfc53a559c4a6c372d925.exe 3188 8d4f15d230403dc41be201db493c3da66f29ebad75bbfc53a559c4a6c372d925.exe 3188 8d4f15d230403dc41be201db493c3da66f29ebad75bbfc53a559c4a6c372d925.exe 3188 8d4f15d230403dc41be201db493c3da66f29ebad75bbfc53a559c4a6c372d925.exe 1860 svchost.exe 1860 svchost.exe 1860 svchost.exe 1860 svchost.exe 1860 svchost.exe 1860 svchost.exe 1860 svchost.exe 1860 svchost.exe 1860 svchost.exe 1860 svchost.exe 1860 svchost.exe 1860 svchost.exe 1860 svchost.exe 1860 svchost.exe 1860 svchost.exe 1860 svchost.exe 1860 svchost.exe 1860 svchost.exe 1860 svchost.exe 1860 svchost.exe 1860 svchost.exe 1860 svchost.exe 1860 svchost.exe 1860 svchost.exe 1860 svchost.exe 1860 svchost.exe 1860 svchost.exe 1860 svchost.exe 1860 svchost.exe 1860 svchost.exe 1860 svchost.exe 1860 svchost.exe 1860 svchost.exe 1860 svchost.exe 1860 svchost.exe 1860 svchost.exe 1860 svchost.exe 1860 svchost.exe 1860 svchost.exe 1860 svchost.exe 1860 svchost.exe 1860 svchost.exe 1860 svchost.exe 1860 svchost.exe 1860 svchost.exe 1860 svchost.exe 1860 svchost.exe 1860 svchost.exe 1860 svchost.exe 1860 svchost.exe 1860 svchost.exe 1860 svchost.exe 1860 svchost.exe 1860 svchost.exe 1860 svchost.exe 1860 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3188 8d4f15d230403dc41be201db493c3da66f29ebad75bbfc53a559c4a6c372d925.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3188 wrote to memory of 1860 3188 8d4f15d230403dc41be201db493c3da66f29ebad75bbfc53a559c4a6c372d925.exe 84 PID 3188 wrote to memory of 1860 3188 8d4f15d230403dc41be201db493c3da66f29ebad75bbfc53a559c4a6c372d925.exe 84 PID 3188 wrote to memory of 1860 3188 8d4f15d230403dc41be201db493c3da66f29ebad75bbfc53a559c4a6c372d925.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\8d4f15d230403dc41be201db493c3da66f29ebad75bbfc53a559c4a6c372d925.exe"C:\Users\Admin\AppData\Local\Temp\8d4f15d230403dc41be201db493c3da66f29ebad75bbfc53a559c4a6c372d925.exe"1⤵
- Modifies WinLogon
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:3188 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- Suspicious behavior: EnumeratesProcesses
PID:1860
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168B
MD5d57e3a550060f85d44a175139ea23021
SHA12c5cb3428a322c9709a34d04dd86fe7628f8f0a6
SHA25643edf068d34276e8ade4113d4d7207de19fc98a2ae1c07298e593edae2a8774c
SHA5120364fe6a010fce7a3f4a6344c84468c64b20fd131f3160fc649db78f1075ba52d8a1c4496e50dbe27c357e01ee52e94cdcda8f7927cba28d5f2f45b9da690063
-
Filesize
593B
MD53b03d93d3487806337b5c6443ce7a62d
SHA193a7a790bb6348606cbdaf5daeaaf4ea8cf731d0
SHA2567392749832c70fcfc2d440d7afc2f880000dd564930d95d634eb1199fa15de30
SHA512770977beaeedafc5c98d0c32edc8c6c850f05e9f363bc9997fa73991646b02e5d40ceed0017b06caeab0db86423844bc4b0a9f0df2d8239230e423a7bfbd4a88
-
Filesize
593B
MD5926512864979bc27cf187f1de3f57aff
SHA1acdeb9d6187932613c7fa08eaf28f0cd8116f4b5
SHA256b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f
SHA512f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b
-
Filesize
42KB
MD56bc8834e0460c700bed17a69e2623ced
SHA1545d210abc09c289e15ef2d7ea7533f34fd29c70
SHA256a83aece81c8c559d46bc8d7462dd27db86fe19cab4fb1f6f860d58ab5bec2543
SHA512a1582eb26e7a5ec12cb3ba87b1451568dad096a9a01d9601a951f43a55d5b62387c5457925b709ed6d5d124d78a74080310908ce4249a4758a5823e0ca7a561d
-
Filesize
481B
MD5150633cf7ad158956cbfe2312d26959a
SHA1456ecb7b343ffb82e42860d0895ce9bcdbabd70c
SHA2566a9fa0b3799bf0ba992099d51ddf9ac211593b630e6b31fb13a21d5739eb8f75
SHA51255e3a56f9deea969e26ff11e0c6891b018ab0960cbced9edc239a447220f6c67bf351f38af4c06df6db0f5b3ddef38ff6e5e8de1a4e1eb96e50b13c9c1a5e5e5
-
Filesize
42KB
MD5a7273879796e4768f345563df4cf568a
SHA119659d6d53f7b052a4e4d93f80a1923159683276
SHA256b46d0824160166c2937a89e84ea6a4794398693bad003e6e3c17696ad35ca460
SHA5127498ab4ce33172b7c65e5d343395234a2255f9bcdfc40c4e91d8f74f516e5109da436d700a033d77099387427ccc2868d39cae8489a22f3ff9975dc99730df7b
-
Filesize
481B
MD5985654c2eb84d34c8e47b5263e3cb7c4
SHA178e52d69897f6a6bd5427f8c7391334e8d9203bf
SHA2565a6dfb1aaeafea1c9bfbbdf8f9ddf31b441f111b4bef3e0224b833eeb33b3c3d
SHA512bb650f893d62ef91714ea5f6d0aff1d6c05979b26f634b42fdbe401b860dd3fe1385aec3abac87780578d19a5af229c83aca0b607ed0d149a85332f09505972d
-
Filesize
457B
MD5531ec87a0b2f9477a52d88b111d0d46a
SHA150a72e5752075309f91c062e0282a7e7cd1e751e
SHA2564875b451859b1eb8d0d3b040b1bb8d654d212edb6d9c721cf0f4372129579385
SHA51207994963fd76b31ef0ba2c7f418dcb3ee0290f6baca2d8ec63a6e6b861557b13fbc20d2f0a10a66f35c4d72d4d2c1920ac88b96174604f2f8856868912327da1
-
Filesize
1KB
MD5c0afffc20ea726349190eda9e81f9faa
SHA1420bb11f159bef51c6935350921a67d5d8d95836
SHA256ec07bb169cff1740d85fc634e34a15f7ac00bc87f30cdcba4e579f317cd4bdc2
SHA5124f97cb5d21a0e449f275704dae60034c9ce0b1f749e906d0ccdf16b76d3c6b80c77bc5e023a25601ca757d9ea6fc52c8597f6bead981da42d23cae0a534c256b
-
Filesize
23KB
MD5b4c8aa9eff5b50b9cb6f07ff8a6fb1e2
SHA14066eacaaf740084df96cec00edc8b1bca4c1349
SHA2567bb566b45614dc2b6afd41b10675e37672dbb577f331ea4f0c6506634f8ab037
SHA512d838da6a75bcbbf8bdfc4963f0145ce9f496f74f6101218557479d773991a6eff4001d772ae1bc76d7f6e1ef92036c385ee6ab330ad20b272486353620b2b99f
-
Filesize
218KB
MD523c1723e9d499c6f703f788875d2dae7
SHA12fa3b97879c399a9b3e5fdfb4f4303054d3206c8
SHA256053b253e7229ea812ea12955dcbccc96a412835e0af47bfc4c81660f6283ebbe
SHA51287bf895ec71e0b8e623a526a6ce362ddbb63330a17de4833acd82a69aa599d17cbf7f697767060b9ed52c3c1eab48ee2848fafaa3f703fdf8ba9103de79cb616