Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
103s -
max time network
106s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
22/07/2024, 09:14
Static task
static1
Behavioral task
behavioral1
Sample
8f1d680385a2214ef98d894e1c40a9f0N.exe
Resource
win7-20240708-en
General
-
Target
8f1d680385a2214ef98d894e1c40a9f0N.exe
-
Size
139KB
-
MD5
8f1d680385a2214ef98d894e1c40a9f0
-
SHA1
2e44971493cf988a187a609f12dffa3494d34fcb
-
SHA256
7b0488c2766c7fa58ff8e3d2ef8a3b0d2546eec32775304b779de94fbc996014
-
SHA512
f8bdaad26b50b80253b74480e043d0a709d9a0b6d7fec485f8e6362145d4dd99df7b3f5bf9db7443e08066d6e834129d03d0da5383fc3b3d2c079b0dea723ec0
-
SSDEEP
1536:rC2/fYuPfbESFYXRWhpKRycRd57JkIqFHhzm4hWru/BzihhMN45MF5FvHP132xPi:r7YubEwYXRWhpAJUHhzm4hUukS6Kmeco
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1456 smss.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\1230\smss.exe 8f1d680385a2214ef98d894e1c40a9f0N.exe File opened for modification C:\Windows\SysWOW64\1230\smss.exe smss.exe File opened for modification C:\Windows\SysWOW64\Service.exe smss.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 316 sc.exe 2432 sc.exe 4068 sc.exe 1820 sc.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 5104 8f1d680385a2214ef98d894e1c40a9f0N.exe 1456 smss.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 5104 wrote to memory of 4068 5104 8f1d680385a2214ef98d894e1c40a9f0N.exe 84 PID 5104 wrote to memory of 4068 5104 8f1d680385a2214ef98d894e1c40a9f0N.exe 84 PID 5104 wrote to memory of 4068 5104 8f1d680385a2214ef98d894e1c40a9f0N.exe 84 PID 5104 wrote to memory of 1820 5104 8f1d680385a2214ef98d894e1c40a9f0N.exe 86 PID 5104 wrote to memory of 1820 5104 8f1d680385a2214ef98d894e1c40a9f0N.exe 86 PID 5104 wrote to memory of 1820 5104 8f1d680385a2214ef98d894e1c40a9f0N.exe 86 PID 5104 wrote to memory of 1456 5104 8f1d680385a2214ef98d894e1c40a9f0N.exe 88 PID 5104 wrote to memory of 1456 5104 8f1d680385a2214ef98d894e1c40a9f0N.exe 88 PID 5104 wrote to memory of 1456 5104 8f1d680385a2214ef98d894e1c40a9f0N.exe 88 PID 1456 wrote to memory of 316 1456 smss.exe 89 PID 1456 wrote to memory of 316 1456 smss.exe 89 PID 1456 wrote to memory of 316 1456 smss.exe 89 PID 1456 wrote to memory of 2432 1456 smss.exe 91 PID 1456 wrote to memory of 2432 1456 smss.exe 91 PID 1456 wrote to memory of 2432 1456 smss.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\8f1d680385a2214ef98d894e1c40a9f0N.exe"C:\Users\Admin\AppData\Local\Temp\8f1d680385a2214ef98d894e1c40a9f0N.exe"1⤵
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe stop SharedAccess2⤵
- Launches sc.exe
PID:4068
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe stop wscsvc2⤵
- Launches sc.exe
PID:1820
-
-
C:\Windows\SysWOW64\1230\smss.exeC:\Windows\system32\1230\smss.exe -d2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe stop SharedAccess3⤵
- Launches sc.exe
PID:316
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe stop wscsvc3⤵
- Launches sc.exe
PID:2432
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
139KB
MD515a2b289989e5c4acd91b29b9bf73c10
SHA1a83e7e058bd21565d0b6ce691da5c0f455771553
SHA256f5319a7f47aad87371626d1e57015d41f8484bcee5c141e6661e710d2e6f0bcd
SHA512284ab5f5a236592d8b3142cd8e03bd8487e3116fc8565c6628963b3e2b6898266cb204281ffb5a58b9d9fdc2041edae728c5250a60b2816461dd11131e5f3deb