Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
22/07/2024, 20:24
Static task
static1
Behavioral task
behavioral1
Sample
39e7644ede3474d6fbc68a0ffe6977725d7da9bf9e84e46da7e3451d16b74b92.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
39e7644ede3474d6fbc68a0ffe6977725d7da9bf9e84e46da7e3451d16b74b92.exe
Resource
win10v2004-20240709-en
General
-
Target
39e7644ede3474d6fbc68a0ffe6977725d7da9bf9e84e46da7e3451d16b74b92.exe
-
Size
35KB
-
MD5
4cad31be9992605eb634320bc3f9a334
-
SHA1
f51ab242081e131bce8168bb62eef3edde6a2c99
-
SHA256
39e7644ede3474d6fbc68a0ffe6977725d7da9bf9e84e46da7e3451d16b74b92
-
SHA512
8defbfab916560d6c71ccb64fd4ab9115b6b6470b2b27d7a2ba9860bf36641399a0559be422687b89f2459f1177a54858dc8ef6833b6aab3732ec2be86f15247
-
SSDEEP
768:m2VJyePxXbLYTSsrUIZ6kyzrLhRNioqAjgrVo9gK5p5:m2By9QIZgzrlLioqFoW
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\Windows\\svchost.exe" 39e7644ede3474d6fbc68a0ffe6977725d7da9bf9e84e46da7e3451d16b74b92.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\Windows\\svchost.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 39e7644ede3474d6fbc68a0ffe6977725d7da9bf9e84e46da7e3451d16b74b92.exe Set value (int) \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 1076 svchost.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\svchost.exe 39e7644ede3474d6fbc68a0ffe6977725d7da9bf9e84e46da7e3451d16b74b92.exe File opened for modification C:\Windows\svchost.exe 39e7644ede3474d6fbc68a0ffe6977725d7da9bf9e84e46da7e3451d16b74b92.exe File created C:\Windows\conime.exe svchost.exe File opened for modification C:\Windows\conime.exe svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4636 wrote to memory of 1076 4636 39e7644ede3474d6fbc68a0ffe6977725d7da9bf9e84e46da7e3451d16b74b92.exe 88 PID 4636 wrote to memory of 1076 4636 39e7644ede3474d6fbc68a0ffe6977725d7da9bf9e84e46da7e3451d16b74b92.exe 88 PID 4636 wrote to memory of 1076 4636 39e7644ede3474d6fbc68a0ffe6977725d7da9bf9e84e46da7e3451d16b74b92.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\39e7644ede3474d6fbc68a0ffe6977725d7da9bf9e84e46da7e3451d16b74b92.exe"C:\Users\Admin\AppData\Local\Temp\39e7644ede3474d6fbc68a0ffe6977725d7da9bf9e84e46da7e3451d16b74b92.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Windows\svchost.exeC:\Windows\svchost.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Drops file in Windows directory
PID:1076
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35KB
MD54cad31be9992605eb634320bc3f9a334
SHA1f51ab242081e131bce8168bb62eef3edde6a2c99
SHA25639e7644ede3474d6fbc68a0ffe6977725d7da9bf9e84e46da7e3451d16b74b92
SHA5128defbfab916560d6c71ccb64fd4ab9115b6b6470b2b27d7a2ba9860bf36641399a0559be422687b89f2459f1177a54858dc8ef6833b6aab3732ec2be86f15247