Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
17s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
15/07/2024, 13:45 UTC
Static task
static1
Behavioral task
behavioral1
Sample
e6e9942b59e4a573fef83e094eaf5a40N.exe
Resource
win7-20240704-en
General
-
Target
e6e9942b59e4a573fef83e094eaf5a40N.exe
-
Size
119KB
-
MD5
e6e9942b59e4a573fef83e094eaf5a40
-
SHA1
6a3e48d054437fce9990b8a811f5aa38040bb04d
-
SHA256
8889b2981b07260876d6709792d2f1525b56926ee2dc2dd991106faa01eb073b
-
SHA512
457d86bab652d47214743032f22f0205cac66f7b64687995f665e8f28037da453bf5f597999d993ab548a916e1b773e02da0c884435a725f67e087e7b9b6a022
-
SSDEEP
3072:OE9j8b3ZXgKC1hX//iASOXRJzDOD26j/3Dc69p:OEebiKuX//iZOXRJ3OD26jxz
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3068 smss.exe -
Loads dropped DLL 2 IoCs
pid Process 2336 e6e9942b59e4a573fef83e094eaf5a40N.exe 2336 e6e9942b59e4a573fef83e094eaf5a40N.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\1230\smss.exe e6e9942b59e4a573fef83e094eaf5a40N.exe File opened for modification C:\Windows\SysWOW64\1230\smss.exe smss.exe File opened for modification C:\Windows\SysWOW64\Service.exe smss.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2868 sc.exe 2796 sc.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2336 e6e9942b59e4a573fef83e094eaf5a40N.exe 3068 smss.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2336 wrote to memory of 2868 2336 e6e9942b59e4a573fef83e094eaf5a40N.exe 30 PID 2336 wrote to memory of 2868 2336 e6e9942b59e4a573fef83e094eaf5a40N.exe 30 PID 2336 wrote to memory of 2868 2336 e6e9942b59e4a573fef83e094eaf5a40N.exe 30 PID 2336 wrote to memory of 2868 2336 e6e9942b59e4a573fef83e094eaf5a40N.exe 30 PID 2336 wrote to memory of 3068 2336 e6e9942b59e4a573fef83e094eaf5a40N.exe 32 PID 2336 wrote to memory of 3068 2336 e6e9942b59e4a573fef83e094eaf5a40N.exe 32 PID 2336 wrote to memory of 3068 2336 e6e9942b59e4a573fef83e094eaf5a40N.exe 32 PID 2336 wrote to memory of 3068 2336 e6e9942b59e4a573fef83e094eaf5a40N.exe 32 PID 3068 wrote to memory of 2796 3068 smss.exe 33 PID 3068 wrote to memory of 2796 3068 smss.exe 33 PID 3068 wrote to memory of 2796 3068 smss.exe 33 PID 3068 wrote to memory of 2796 3068 smss.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\e6e9942b59e4a573fef83e094eaf5a40N.exe"C:\Users\Admin\AppData\Local\Temp\e6e9942b59e4a573fef83e094eaf5a40N.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe stop wscsvc2⤵
- Launches sc.exe
PID:2868
-
-
C:\Windows\SysWOW64\1230\smss.exeC:\Windows\system32\1230\smss.exe -d2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe stop wscsvc3⤵
- Launches sc.exe
PID:2796
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
119KB
MD5dad3d3baf872f570cf1d310f2f86d503
SHA161cc840c64fe6f51017b045d7f2dd90da04e23d3
SHA256311cee976d3c2b88e015a96134783051e416682d1e2ff71406896790f1f9bd5b
SHA512232e3e58a4ea8b9b211cb3b7c654b6908f11c0c7e60dacbe8d8d16a1d2ed05f4bf343132a0f7afe9d74f30ec69a19cbd9fd7f12c6468bcac00c08518c6dcae26