Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
22/07/2024, 09:14
Static task
static1
Behavioral task
behavioral1
Sample
8f1d680385a2214ef98d894e1c40a9f0N.exe
Resource
win7-20240708-en
General
-
Target
8f1d680385a2214ef98d894e1c40a9f0N.exe
-
Size
139KB
-
MD5
8f1d680385a2214ef98d894e1c40a9f0
-
SHA1
2e44971493cf988a187a609f12dffa3494d34fcb
-
SHA256
7b0488c2766c7fa58ff8e3d2ef8a3b0d2546eec32775304b779de94fbc996014
-
SHA512
f8bdaad26b50b80253b74480e043d0a709d9a0b6d7fec485f8e6362145d4dd99df7b3f5bf9db7443e08066d6e834129d03d0da5383fc3b3d2c079b0dea723ec0
-
SSDEEP
1536:rC2/fYuPfbESFYXRWhpKRycRd57JkIqFHhzm4hWru/BzihhMN45MF5FvHP132xPi:r7YubEwYXRWhpAJUHhzm4hUukS6Kmeco
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2688 smss.exe -
Loads dropped DLL 2 IoCs
pid Process 2180 8f1d680385a2214ef98d894e1c40a9f0N.exe 2180 8f1d680385a2214ef98d894e1c40a9f0N.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\1230\smss.exe 8f1d680385a2214ef98d894e1c40a9f0N.exe File opened for modification C:\Windows\SysWOW64\1230\smss.exe smss.exe File opened for modification C:\Windows\SysWOW64\Service.exe smss.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2852 sc.exe 1808 sc.exe 2748 sc.exe 2684 sc.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2180 8f1d680385a2214ef98d894e1c40a9f0N.exe 2688 smss.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2180 wrote to memory of 2852 2180 8f1d680385a2214ef98d894e1c40a9f0N.exe 30 PID 2180 wrote to memory of 2852 2180 8f1d680385a2214ef98d894e1c40a9f0N.exe 30 PID 2180 wrote to memory of 2852 2180 8f1d680385a2214ef98d894e1c40a9f0N.exe 30 PID 2180 wrote to memory of 2852 2180 8f1d680385a2214ef98d894e1c40a9f0N.exe 30 PID 2180 wrote to memory of 1808 2180 8f1d680385a2214ef98d894e1c40a9f0N.exe 32 PID 2180 wrote to memory of 1808 2180 8f1d680385a2214ef98d894e1c40a9f0N.exe 32 PID 2180 wrote to memory of 1808 2180 8f1d680385a2214ef98d894e1c40a9f0N.exe 32 PID 2180 wrote to memory of 1808 2180 8f1d680385a2214ef98d894e1c40a9f0N.exe 32 PID 2180 wrote to memory of 2688 2180 8f1d680385a2214ef98d894e1c40a9f0N.exe 34 PID 2180 wrote to memory of 2688 2180 8f1d680385a2214ef98d894e1c40a9f0N.exe 34 PID 2180 wrote to memory of 2688 2180 8f1d680385a2214ef98d894e1c40a9f0N.exe 34 PID 2180 wrote to memory of 2688 2180 8f1d680385a2214ef98d894e1c40a9f0N.exe 34 PID 2688 wrote to memory of 2748 2688 smss.exe 35 PID 2688 wrote to memory of 2748 2688 smss.exe 35 PID 2688 wrote to memory of 2748 2688 smss.exe 35 PID 2688 wrote to memory of 2748 2688 smss.exe 35 PID 2688 wrote to memory of 2684 2688 smss.exe 37 PID 2688 wrote to memory of 2684 2688 smss.exe 37 PID 2688 wrote to memory of 2684 2688 smss.exe 37 PID 2688 wrote to memory of 2684 2688 smss.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\8f1d680385a2214ef98d894e1c40a9f0N.exe"C:\Users\Admin\AppData\Local\Temp\8f1d680385a2214ef98d894e1c40a9f0N.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe stop SharedAccess2⤵
- Launches sc.exe
PID:2852
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe stop wscsvc2⤵
- Launches sc.exe
PID:1808
-
-
C:\Windows\SysWOW64\1230\smss.exeC:\Windows\system32\1230\smss.exe -d2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe stop SharedAccess3⤵
- Launches sc.exe
PID:2748
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe stop wscsvc3⤵
- Launches sc.exe
PID:2684
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
139KB
MD58dc98db6af939407cdef7200d178d336
SHA11415471fdce306cc1bbbf3c51a1ac22a9a9ca0b4
SHA256fd18c0d8967930d2227e093cd92d81209e8d07b1a20c172eeb3c2cf0ad3baf14
SHA5128eb0cd7bf5d363a1c9e9c024edaba6cc4fca5b7e145ac7b88fd13ec7dc477003925b6df3247fc5543d30af977268fec1bcac41852fd8d1d13ed896b92ef6dd5b