Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
93s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
15/07/2024, 13:45
Static task
static1
Behavioral task
behavioral1
Sample
e6e9942b59e4a573fef83e094eaf5a40N.exe
Resource
win7-20240704-en
General
-
Target
e6e9942b59e4a573fef83e094eaf5a40N.exe
-
Size
119KB
-
MD5
e6e9942b59e4a573fef83e094eaf5a40
-
SHA1
6a3e48d054437fce9990b8a811f5aa38040bb04d
-
SHA256
8889b2981b07260876d6709792d2f1525b56926ee2dc2dd991106faa01eb073b
-
SHA512
457d86bab652d47214743032f22f0205cac66f7b64687995f665e8f28037da453bf5f597999d993ab548a916e1b773e02da0c884435a725f67e087e7b9b6a022
-
SSDEEP
3072:OE9j8b3ZXgKC1hX//iASOXRJzDOD26j/3Dc69p:OEebiKuX//iZOXRJ3OD26jxz
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4224 smss.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\1230\smss.exe e6e9942b59e4a573fef83e094eaf5a40N.exe File opened for modification C:\Windows\SysWOW64\1230\smss.exe smss.exe File opened for modification C:\Windows\SysWOW64\Service.exe smss.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4028 sc.exe 1168 sc.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4472 e6e9942b59e4a573fef83e094eaf5a40N.exe 4224 smss.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4472 wrote to memory of 4028 4472 e6e9942b59e4a573fef83e094eaf5a40N.exe 83 PID 4472 wrote to memory of 4028 4472 e6e9942b59e4a573fef83e094eaf5a40N.exe 83 PID 4472 wrote to memory of 4028 4472 e6e9942b59e4a573fef83e094eaf5a40N.exe 83 PID 4472 wrote to memory of 4224 4472 e6e9942b59e4a573fef83e094eaf5a40N.exe 85 PID 4472 wrote to memory of 4224 4472 e6e9942b59e4a573fef83e094eaf5a40N.exe 85 PID 4472 wrote to memory of 4224 4472 e6e9942b59e4a573fef83e094eaf5a40N.exe 85 PID 4224 wrote to memory of 1168 4224 smss.exe 86 PID 4224 wrote to memory of 1168 4224 smss.exe 86 PID 4224 wrote to memory of 1168 4224 smss.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\e6e9942b59e4a573fef83e094eaf5a40N.exe"C:\Users\Admin\AppData\Local\Temp\e6e9942b59e4a573fef83e094eaf5a40N.exe"1⤵
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe stop wscsvc2⤵
- Launches sc.exe
PID:4028
-
-
C:\Windows\SysWOW64\1230\smss.exeC:\Windows\system32\1230\smss.exe -d2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4224 -
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe stop wscsvc3⤵
- Launches sc.exe
PID:1168
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
119KB
MD5c6106f7b00d820d5001d2f6e96103646
SHA10d3ad1516d2a43ede3049fca0de1a07df06bb3f4
SHA25687ce1250985a5bab99183d8128f9a9e5197d6ff8dc4a65fdb26276a916e86033
SHA512717397956ad821bf9a5eda1fc3c101c0ff4439f3434cb3fd949dafad9a3e8467f9af7b5faa6b612e8d35bc5c42d44289efe8a2796ba3cef4e26d8f5e71b9840b