Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
16/07/2024, 10:24
Static task
static1
Behavioral task
behavioral1
Sample
a7e84a86154e0a949a25a3f6f40e6e80N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a7e84a86154e0a949a25a3f6f40e6e80N.exe
Resource
win10v2004-20240709-en
General
-
Target
a7e84a86154e0a949a25a3f6f40e6e80N.exe
-
Size
244KB
-
MD5
a7e84a86154e0a949a25a3f6f40e6e80
-
SHA1
d10c135ac0294afc940f0c6ff5817fab62f89613
-
SHA256
f8c9c54659aabc6260e174bbf89afe811b04087b1914b1847ac7015240305474
-
SHA512
1695bbfcc87058e78fecd6bc21c812a29dbc0629ff4b2fe5af1b6f8809c7cd896de9f0a6968744db5acbde7343deed6da519beedb5550403137f8ee454826300
-
SSDEEP
6144:MEXlSylvFuWaS54hIAv/QhuA7HY8pPZ0FP6BzxM5EmX:ZAylvv5YRwh9HYd61xhmX
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2464 svchost.exe -
Loads dropped DLL 7 IoCs
pid Process 1488 a7e84a86154e0a949a25a3f6f40e6e80N.exe 1488 a7e84a86154e0a949a25a3f6f40e6e80N.exe 2828 WerFault.exe 2828 WerFault.exe 2828 WerFault.exe 2828 WerFault.exe 2828 WerFault.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\e563fbee = "C:\\Windows\\apppatch\\svchost.exe" a7e84a86154e0a949a25a3f6f40e6e80N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\e563fbee = "C:\\Windows\\apppatch\\svchost.exe" svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\apppatch\svchost.exe a7e84a86154e0a949a25a3f6f40e6e80N.exe File created C:\Windows\apppatch\svchost.exe a7e84a86154e0a949a25a3f6f40e6e80N.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2828 2464 WerFault.exe 31 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2464 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1488 a7e84a86154e0a949a25a3f6f40e6e80N.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1488 wrote to memory of 2464 1488 a7e84a86154e0a949a25a3f6f40e6e80N.exe 31 PID 1488 wrote to memory of 2464 1488 a7e84a86154e0a949a25a3f6f40e6e80N.exe 31 PID 1488 wrote to memory of 2464 1488 a7e84a86154e0a949a25a3f6f40e6e80N.exe 31 PID 1488 wrote to memory of 2464 1488 a7e84a86154e0a949a25a3f6f40e6e80N.exe 31 PID 2464 wrote to memory of 2828 2464 svchost.exe 32 PID 2464 wrote to memory of 2828 2464 svchost.exe 32 PID 2464 wrote to memory of 2828 2464 svchost.exe 32 PID 2464 wrote to memory of 2828 2464 svchost.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\a7e84a86154e0a949a25a3f6f40e6e80N.exe"C:\Users\Admin\AppData\Local\Temp\a7e84a86154e0a949a25a3f6f40e6e80N.exe"1⤵
- Loads dropped DLL
- Modifies WinLogon
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2464 -s 4043⤵
- Loads dropped DLL
- Program crash
PID:2828
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
244KB
MD5f84d5bfd8776c448a7cc74ef3d6b7455
SHA15b6882cb4cce8e276d32c202eb63a148c197e4b7
SHA2565ea709b559a8e2e05a34a789b05fd4a49dd8cdc83d45dcd6963ff28003416a9e
SHA512a212d3a4028dde95ac077228f01a144f9d7ab09716a15bc58816fc7e5c401903c5b1f7b9e3a0d1fba4db21353e8abe8baad3576a08c44f6b6f92ec9679a40ead