Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08/07/2024, 02:42
Static task
static1
Behavioral task
behavioral1
Sample
unrepellent.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
unrepellent.exe
Resource
win10v2004-20240704-en
General
-
Target
unrepellent.exe
-
Size
244KB
-
MD5
71db30d5db50af8adec8fa9c24ce9860
-
SHA1
78f2eba84b5b61886a2444c47ae42ae89efa02d4
-
SHA256
7757d34ab16584dd4e8e8493cda9b22a3bb60509392c269081ef71ff0de1d9b3
-
SHA512
f25a0e756e472471ba7c45f01431d2071743611553298138fa6a674493c0254b7c88f255b952a15531572b61a5cbc328693ddea1480630742c97f3c3016b54da
-
SSDEEP
6144:9EXlSylvFuWaS54hIAv/QhuA7HY8pPZ0FP6BzxM5EmX:eAylvv5YRwh9HYd61xhmX
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2572 svchost.exe -
Loads dropped DLL 7 IoCs
pid Process 1724 unrepellent.exe 1724 unrepellent.exe 2172 WerFault.exe 2172 WerFault.exe 2172 WerFault.exe 2172 WerFault.exe 2172 WerFault.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\a8a45f2e = "C:\\Windows\\apppatch\\svchost.exe" unrepellent.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\a8a45f2e = "C:\\Windows\\apppatch\\svchost.exe" svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\apppatch\svchost.exe unrepellent.exe File created C:\Windows\apppatch\svchost.exe unrepellent.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2172 2572 WerFault.exe 28 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2572 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1724 unrepellent.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1724 wrote to memory of 2572 1724 unrepellent.exe 28 PID 1724 wrote to memory of 2572 1724 unrepellent.exe 28 PID 1724 wrote to memory of 2572 1724 unrepellent.exe 28 PID 1724 wrote to memory of 2572 1724 unrepellent.exe 28 PID 2572 wrote to memory of 2172 2572 svchost.exe 29 PID 2572 wrote to memory of 2172 2572 svchost.exe 29 PID 2572 wrote to memory of 2172 2572 svchost.exe 29 PID 2572 wrote to memory of 2172 2572 svchost.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\unrepellent.exe"C:\Users\Admin\AppData\Local\Temp\unrepellent.exe"1⤵
- Loads dropped DLL
- Modifies WinLogon
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2572 -s 5083⤵
- Loads dropped DLL
- Program crash
PID:2172
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
244KB
MD586b41d52b1789111b83bcec93aa064ff
SHA1ca99932795d9a6a8456e97daa739893c3e4f2a04
SHA25603a624ebcbd52090e5d22af1265018ca10c06b59549d8921e96eeb216a509282
SHA5129181aea1a74f57631b8f9fddf935dd532e97ff08c658e2bcf579bc047cc196019bd645f9de5d7e80d48118ae67c73c37266817df5106f0cf44240f10d54bcbd4