Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
127s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
17/07/2024, 20:56
Behavioral task
behavioral1
Sample
svchosts.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
svchosts.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
svchosts.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral4
Sample
svchosts.exe
Resource
win11-20240709-en
General
-
Target
svchosts.exe
-
Size
158KB
-
MD5
7ab781bc4eaef1e1dc3d04fffe3fb893
-
SHA1
96a304b8b5f50a3666ee41d212771cb7b71abea7
-
SHA256
0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216
-
SHA512
e53b4cb0621e673c06dd84d89e1dd7161e91f062415ae0cbf52e40e61213bdc1aa238b66f31b14d826716848dbb20f8a6dd68a970ca83f63c4110d0e186ea542
-
SSDEEP
3072:TbziH+0OoCthfbEFtbcfjF45gjryKKqH6JY2doszEmQotEPPcfPoFO8Y:Tbzie0ODhTEPgnjuIJzo+PPcfPoo8
Malware Config
Extracted
arrowrat
r00t
necessary-sick.gl.at.ply.gg:32835
DsCbljCVL
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 2072 svchosts.exe 2072 svchosts.exe 2072 svchosts.exe 2072 svchosts.exe 2072 svchosts.exe 2072 svchosts.exe 2072 svchosts.exe 2072 svchosts.exe 2072 svchosts.exe 2072 svchosts.exe 2072 svchosts.exe 2072 svchosts.exe 2072 svchosts.exe 2072 svchosts.exe 2072 svchosts.exe 2072 svchosts.exe 2072 svchosts.exe 2072 svchosts.exe 2072 svchosts.exe 2072 svchosts.exe 2072 svchosts.exe 2072 svchosts.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeDebugPrivilege 2072 svchosts.exe Token: SeShutdownPrivilege 2356 explorer.exe Token: SeShutdownPrivilege 2356 explorer.exe Token: SeShutdownPrivilege 2356 explorer.exe Token: SeShutdownPrivilege 2356 explorer.exe Token: SeShutdownPrivilege 2356 explorer.exe Token: SeShutdownPrivilege 2356 explorer.exe Token: SeShutdownPrivilege 2356 explorer.exe Token: SeShutdownPrivilege 2356 explorer.exe Token: SeShutdownPrivilege 2356 explorer.exe Token: SeShutdownPrivilege 2356 explorer.exe Token: SeShutdownPrivilege 2356 explorer.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 2356 explorer.exe 2356 explorer.exe 2356 explorer.exe 2356 explorer.exe 2356 explorer.exe 2356 explorer.exe 2356 explorer.exe 2356 explorer.exe 2356 explorer.exe 2356 explorer.exe 2356 explorer.exe 2356 explorer.exe 2356 explorer.exe 2356 explorer.exe 2356 explorer.exe 2356 explorer.exe 2356 explorer.exe 2356 explorer.exe 2356 explorer.exe 2356 explorer.exe 2356 explorer.exe 2356 explorer.exe 2356 explorer.exe 2356 explorer.exe 2356 explorer.exe 2356 explorer.exe 2356 explorer.exe -
Suspicious use of SendNotifyMessage 17 IoCs
pid Process 2356 explorer.exe 2356 explorer.exe 2356 explorer.exe 2356 explorer.exe 2356 explorer.exe 2356 explorer.exe 2356 explorer.exe 2356 explorer.exe 2356 explorer.exe 2356 explorer.exe 2356 explorer.exe 2356 explorer.exe 2356 explorer.exe 2356 explorer.exe 2356 explorer.exe 2356 explorer.exe 2356 explorer.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2072 svchosts.exe -
Suspicious use of WriteProcessMemory 46 IoCs
description pid Process procid_target PID 2072 wrote to memory of 2356 2072 svchosts.exe 30 PID 2072 wrote to memory of 2356 2072 svchosts.exe 30 PID 2072 wrote to memory of 2356 2072 svchosts.exe 30 PID 2072 wrote to memory of 2312 2072 svchosts.exe 31 PID 2072 wrote to memory of 2312 2072 svchosts.exe 31 PID 2072 wrote to memory of 2312 2072 svchosts.exe 31 PID 2072 wrote to memory of 2312 2072 svchosts.exe 31 PID 2072 wrote to memory of 2676 2072 svchosts.exe 32 PID 2072 wrote to memory of 2676 2072 svchosts.exe 32 PID 2072 wrote to memory of 2676 2072 svchosts.exe 32 PID 2072 wrote to memory of 2676 2072 svchosts.exe 32 PID 2072 wrote to memory of 2916 2072 svchosts.exe 33 PID 2072 wrote to memory of 2916 2072 svchosts.exe 33 PID 2072 wrote to memory of 2916 2072 svchosts.exe 33 PID 2072 wrote to memory of 2916 2072 svchosts.exe 33 PID 2072 wrote to memory of 2836 2072 svchosts.exe 34 PID 2072 wrote to memory of 2836 2072 svchosts.exe 34 PID 2072 wrote to memory of 2836 2072 svchosts.exe 34 PID 2072 wrote to memory of 2836 2072 svchosts.exe 34 PID 2072 wrote to memory of 2784 2072 svchosts.exe 35 PID 2072 wrote to memory of 2784 2072 svchosts.exe 35 PID 2072 wrote to memory of 2784 2072 svchosts.exe 35 PID 2072 wrote to memory of 2784 2072 svchosts.exe 35 PID 2072 wrote to memory of 3008 2072 svchosts.exe 36 PID 2072 wrote to memory of 3008 2072 svchosts.exe 36 PID 2072 wrote to memory of 3008 2072 svchosts.exe 36 PID 2072 wrote to memory of 3008 2072 svchosts.exe 36 PID 2072 wrote to memory of 2252 2072 svchosts.exe 37 PID 2072 wrote to memory of 2252 2072 svchosts.exe 37 PID 2072 wrote to memory of 2252 2072 svchosts.exe 37 PID 2072 wrote to memory of 2252 2072 svchosts.exe 37 PID 2072 wrote to memory of 1796 2072 svchosts.exe 38 PID 2072 wrote to memory of 1796 2072 svchosts.exe 38 PID 2072 wrote to memory of 1796 2072 svchosts.exe 38 PID 2072 wrote to memory of 1796 2072 svchosts.exe 38 PID 2072 wrote to memory of 2700 2072 svchosts.exe 39 PID 2072 wrote to memory of 2700 2072 svchosts.exe 39 PID 2072 wrote to memory of 2700 2072 svchosts.exe 39 PID 2072 wrote to memory of 2700 2072 svchosts.exe 39 PID 2072 wrote to memory of 2228 2072 svchosts.exe 40 PID 2072 wrote to memory of 2228 2072 svchosts.exe 40 PID 2072 wrote to memory of 2228 2072 svchosts.exe 40 PID 2072 wrote to memory of 2228 2072 svchosts.exe 40 PID 2356 wrote to memory of 2816 2356 explorer.exe 41 PID 2356 wrote to memory of 2816 2356 explorer.exe 41 PID 2356 wrote to memory of 2816 2356 explorer.exe 41 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\svchosts.exe"C:\Users\Admin\AppData\Local\Temp\svchosts.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Windows\explorer.exe"C:\Windows\explorer.exe"2⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\system32\ctfmon.exectfmon.exe3⤵PID:2816
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" r00t necessary-sick.gl.at.ply.gg 32835 DsCbljCVL2⤵PID:2312
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" r00t necessary-sick.gl.at.ply.gg 32835 DsCbljCVL2⤵PID:2676
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" r00t necessary-sick.gl.at.ply.gg 32835 DsCbljCVL2⤵PID:2916
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" r00t necessary-sick.gl.at.ply.gg 32835 DsCbljCVL2⤵PID:2836
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" r00t necessary-sick.gl.at.ply.gg 32835 DsCbljCVL2⤵PID:2784
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" r00t necessary-sick.gl.at.ply.gg 32835 DsCbljCVL2⤵PID:3008
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" r00t necessary-sick.gl.at.ply.gg 32835 DsCbljCVL2⤵PID:2252
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" r00t necessary-sick.gl.at.ply.gg 32835 DsCbljCVL2⤵PID:1796
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" r00t necessary-sick.gl.at.ply.gg 32835 DsCbljCVL2⤵PID:2700
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" r00t necessary-sick.gl.at.ply.gg 32835 DsCbljCVL2⤵PID:2228
-