Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
21/07/2024, 15:18
Static task
static1
Behavioral task
behavioral1
Sample
de089ad73233c994b4b6cf58d81e4ae0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
de089ad73233c994b4b6cf58d81e4ae0N.exe
Resource
win10v2004-20240709-en
General
-
Target
de089ad73233c994b4b6cf58d81e4ae0N.exe
-
Size
355KB
-
MD5
de089ad73233c994b4b6cf58d81e4ae0
-
SHA1
cf9ba994818c9cba0d0b049fb499114f9c21d06b
-
SHA256
151ad95544425eab1e2de56b314e732090b48faeb3cfb5ae7b8ebd2660aedfda
-
SHA512
778351179598194b2a89e4c8e46b5c1814f19a52f770ac2f21adc5abbb6b4d9a27ad7d2e1784c03fa04bae9e2d189492b77ebd5592de1697e0f2c35bcfea618b
-
SSDEEP
6144:q3EmWPDNND9yRPzLq+YXFqaZiMLic9kzVd7EAC4TSs9EiS:1mWhND9yJz+b1FcMLmp2ATTSsdS
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 1048 svchost.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\844a00a3 = "MB0ZÕJI;ÛÍ™\aí\x0fÀ.ÉqGdfRÔî\x1a\x1e*æ\x13ÊuÎD¦·¤Dš¢\u0090Dê\x16\u0090_d¨´]\aõÞ/u(N2§´F-0B¨<\fPdªB•e ,\\Ì®à\x04üÔ$´Åš€ô¬}͎ܸìŠ\x10~\x10„êÕÂÚ…þ¿º\"ÊxÕ•ÄdxTÒU=E¶M=R\x1cæ7\u008dM¨ïÞ\f¦Üÿr–@e,äõýHͼ\a̵Ü\u0090¶þ\x15ÕD²|îhÞåÍ$4Ý•§ì\bµ\u00adôvj…\fˆ8\x16\x04vÊ=Eôâ*úÇ\x0e˜\x1a62xÌÐgõ×\n>ªÕµ\x1c\u009dÞ‡¥=7=ž}¶„²â\ad…$.—MDJl\u00a0'LŒŠ¥VýL\x160]]4žM„ÐUýzÈZ}ä\\WZe" de089ad73233c994b4b6cf58d81e4ae0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\844a00a3 = "MB0ZÕJI;ÛÍ™\aí\x0fÀ.ÉqGdfRÔî\x1a\x1e*æ\x13ÊuÎD¦·¤Dš¢\u0090Dê\x16\u0090_d¨´]\aõÞ/u(N2§´F-0B¨<\fPdªB•e ,\\Ì®à\x04üÔ$´Åš€ô¬}͎ܸìŠ\x10~\x10„êÕÂÚ…þ¿º\"ÊxÕ•ÄdxTÒU=E¶M=R\x1cæ7\u008dM¨ïÞ\f¦Üÿr–@e,äõýHͼ\a̵Ü\u0090¶þ\x15ÕD²|îhÞåÍ$4Ý•§ì\bµ\u00adôvj…\fˆ8\x16\x04vÊ=Eôâ*úÇ\x0e˜\x1a62xÌÐgõ×\n>ªÕµ\x1c\u009dÞ‡¥=7=ž}¶„²â\ad…$.—MDJl\u00a0'LŒŠ¥VýL\x160]]4žM„ÐUýzÈZ}ä\\WZe" svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe de089ad73233c994b4b6cf58d81e4ae0N.exe File opened for modification C:\Windows\apppatch\svchost.exe de089ad73233c994b4b6cf58d81e4ae0N.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2656 de089ad73233c994b4b6cf58d81e4ae0N.exe 2656 de089ad73233c994b4b6cf58d81e4ae0N.exe 2656 de089ad73233c994b4b6cf58d81e4ae0N.exe 2656 de089ad73233c994b4b6cf58d81e4ae0N.exe 2656 de089ad73233c994b4b6cf58d81e4ae0N.exe 2656 de089ad73233c994b4b6cf58d81e4ae0N.exe 2656 de089ad73233c994b4b6cf58d81e4ae0N.exe 2656 de089ad73233c994b4b6cf58d81e4ae0N.exe 1048 svchost.exe 1048 svchost.exe 1048 svchost.exe 1048 svchost.exe 1048 svchost.exe 1048 svchost.exe 1048 svchost.exe 1048 svchost.exe 1048 svchost.exe 1048 svchost.exe 1048 svchost.exe 1048 svchost.exe 1048 svchost.exe 1048 svchost.exe 1048 svchost.exe 1048 svchost.exe 1048 svchost.exe 1048 svchost.exe 1048 svchost.exe 1048 svchost.exe 1048 svchost.exe 1048 svchost.exe 1048 svchost.exe 1048 svchost.exe 1048 svchost.exe 1048 svchost.exe 1048 svchost.exe 1048 svchost.exe 1048 svchost.exe 1048 svchost.exe 1048 svchost.exe 1048 svchost.exe 1048 svchost.exe 1048 svchost.exe 1048 svchost.exe 1048 svchost.exe 1048 svchost.exe 1048 svchost.exe 1048 svchost.exe 1048 svchost.exe 1048 svchost.exe 1048 svchost.exe 1048 svchost.exe 1048 svchost.exe 1048 svchost.exe 1048 svchost.exe 1048 svchost.exe 1048 svchost.exe 1048 svchost.exe 1048 svchost.exe 1048 svchost.exe 1048 svchost.exe 1048 svchost.exe 1048 svchost.exe 1048 svchost.exe 1048 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2656 de089ad73233c994b4b6cf58d81e4ae0N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2656 wrote to memory of 1048 2656 de089ad73233c994b4b6cf58d81e4ae0N.exe 84 PID 2656 wrote to memory of 1048 2656 de089ad73233c994b4b6cf58d81e4ae0N.exe 84 PID 2656 wrote to memory of 1048 2656 de089ad73233c994b4b6cf58d81e4ae0N.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\de089ad73233c994b4b6cf58d81e4ae0N.exe"C:\Users\Admin\AppData\Local\Temp\de089ad73233c994b4b6cf58d81e4ae0N.exe"1⤵
- Modifies WinLogon
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- Suspicious behavior: EnumeratesProcesses
PID:1048
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168B
MD5d57e3a550060f85d44a175139ea23021
SHA12c5cb3428a322c9709a34d04dd86fe7628f8f0a6
SHA25643edf068d34276e8ade4113d4d7207de19fc98a2ae1c07298e593edae2a8774c
SHA5120364fe6a010fce7a3f4a6344c84468c64b20fd131f3160fc649db78f1075ba52d8a1c4496e50dbe27c357e01ee52e94cdcda8f7927cba28d5f2f45b9da690063
-
Filesize
1KB
MD52f7da88e68306fdc071aba5dd35fd6b6
SHA18f95d40564db650d7d542419fec7944fe49ac61c
SHA256e4b7bbf70d116247498a77834c860fad49630a63ae29d48633c44196b0cf38da
SHA51203fb47b0e16e5e9d83f5e8a8d1e6fd5d17cf2f97646cac65bb5e32282ea45bf81ba4c891cd294ddf6c344c9c8d0595073d9dae915db97aa1ba6c46afda20cb91
-
Filesize
23KB
MD5d12e2be34e348501f3dcd2ec658ec359
SHA137bc6573a0cb1892cea076e085d0528dd0231375
SHA2566c676e56adeaf640820656e4957ba77f0a2b055560008330df37d88665b0ad36
SHA512d406dbf848d77b88e65525550936baaabb7be7ef0ad48f660c11bcbe93b8c39de7397eeab6aadf60b1fcc796dec7dc92be7f59945afe87aaac43dd1336e7d5ea
-
Filesize
481B
MD52a074a2a99a5aac814a2b5b62f92a733
SHA1a7094440fc570cfe01b67007048c55687bcbc7b1
SHA25689c1f1020553b03471657b269f86bdb8695cbb06926eecd724e4fb7a3426d2bd
SHA5121c2ceb99aceaae934686b24e8740f5917416575a0a7a421359e2d900c47262f3128c0dd5f1779b94c383e9281eb275f91eca930347a86892081d144021f09127
-
Filesize
42KB
MD5cc4721c4e77f14d3553ce27effc47e22
SHA131105320a08826206e6176bdf629584a2ab831a0
SHA2569730fabacac1155dc4c2936e44bf1d97e3002d4284e1f69d2408218466c7656b
SHA512e80e5107a22e7ddda0eedc9bdb20ec1aa587819ab589d7272f6d87e740b5465bff656d6de8f5f1eaa27e3e1c21c5d1a64a0d167590de3952c51f9a86ee0c8a55
-
Filesize
593B
MD53b03d93d3487806337b5c6443ce7a62d
SHA193a7a790bb6348606cbdaf5daeaaf4ea8cf731d0
SHA2567392749832c70fcfc2d440d7afc2f880000dd564930d95d634eb1199fa15de30
SHA512770977beaeedafc5c98d0c32edc8c6c850f05e9f363bc9997fa73991646b02e5d40ceed0017b06caeab0db86423844bc4b0a9f0df2d8239230e423a7bfbd4a88
-
Filesize
593B
MD5926512864979bc27cf187f1de3f57aff
SHA1acdeb9d6187932613c7fa08eaf28f0cd8116f4b5
SHA256b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f
SHA512f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b
-
Filesize
355KB
MD557f793275c1d766e29fcdbceed0d45f3
SHA1183af6e29d178fc08f4994841e535932559ad766
SHA25626fe46d3ef85277a319ee78499bdced2c543104e252c7e2371b8ac25df65e1ca
SHA5124349cdf37d659188f9dc9762d85d7f13e9c9ea15a371705a9c795e1d8da28a1af0826fed27b48f242e9e7d852ecf901aa6392d4077b0d5247a7bf5210ab14b1c