Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
95s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
16/07/2024, 10:24
Static task
static1
Behavioral task
behavioral1
Sample
a7e84a86154e0a949a25a3f6f40e6e80N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a7e84a86154e0a949a25a3f6f40e6e80N.exe
Resource
win10v2004-20240709-en
General
-
Target
a7e84a86154e0a949a25a3f6f40e6e80N.exe
-
Size
244KB
-
MD5
a7e84a86154e0a949a25a3f6f40e6e80
-
SHA1
d10c135ac0294afc940f0c6ff5817fab62f89613
-
SHA256
f8c9c54659aabc6260e174bbf89afe811b04087b1914b1847ac7015240305474
-
SHA512
1695bbfcc87058e78fecd6bc21c812a29dbc0629ff4b2fe5af1b6f8809c7cd896de9f0a6968744db5acbde7343deed6da519beedb5550403137f8ee454826300
-
SSDEEP
6144:MEXlSylvFuWaS54hIAv/QhuA7HY8pPZ0FP6BzxM5EmX:ZAylvv5YRwh9HYd61xhmX
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 3392 svchost.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\89d8a675 = "C:\\Windows\\apppatch\\svchost.exe" a7e84a86154e0a949a25a3f6f40e6e80N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\89d8a675 = "C:\\Windows\\apppatch\\svchost.exe" svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe a7e84a86154e0a949a25a3f6f40e6e80N.exe File opened for modification C:\Windows\apppatch\svchost.exe a7e84a86154e0a949a25a3f6f40e6e80N.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3216 3392 WerFault.exe 84 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3392 svchost.exe 3392 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 512 a7e84a86154e0a949a25a3f6f40e6e80N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 512 wrote to memory of 3392 512 a7e84a86154e0a949a25a3f6f40e6e80N.exe 84 PID 512 wrote to memory of 3392 512 a7e84a86154e0a949a25a3f6f40e6e80N.exe 84 PID 512 wrote to memory of 3392 512 a7e84a86154e0a949a25a3f6f40e6e80N.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\a7e84a86154e0a949a25a3f6f40e6e80N.exe"C:\Users\Admin\AppData\Local\Temp\a7e84a86154e0a949a25a3f6f40e6e80N.exe"1⤵
- Modifies WinLogon
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:512 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- Suspicious behavior: EnumeratesProcesses
PID:3392 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3392 -s 8323⤵
- Program crash
PID:3216
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 204 -p 3392 -ip 33921⤵PID:2100
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
244KB
MD5aeb1c39b5dbf0e90a9f79d96d70f56f1
SHA1fe4393e78f0e411a2ce662e8ae695328bb0ab749
SHA256007b1040b62c7f067a13d2420e7f2c3e177fbf1cd28148ebc5ce287da9ffdd96
SHA512fddf80b2c8a443b79623fbb8c2338f7db5fe79c4333d36c05d1c0c6e9d477981181480564df327a889616ee84a4e733c66f7b6eeb6f187f6a38b808002fb8cd3