Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
17/08/2024, 00:41
Static task
static1
Behavioral task
behavioral1
Sample
74f585ada49b89c894a0a2208ab7a97d6b331fe04ce2fbfd2d69bd81f27f26f4.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
74f585ada49b89c894a0a2208ab7a97d6b331fe04ce2fbfd2d69bd81f27f26f4.exe
Resource
win10v2004-20240802-en
General
-
Target
74f585ada49b89c894a0a2208ab7a97d6b331fe04ce2fbfd2d69bd81f27f26f4.exe
-
Size
204KB
-
MD5
fec01093a986eca421cf16fe305b8fdc
-
SHA1
aeebb8899aa298bf8a949369f0fe122223a83149
-
SHA256
74f585ada49b89c894a0a2208ab7a97d6b331fe04ce2fbfd2d69bd81f27f26f4
-
SHA512
066fb3ed08b16aa01f0a21ad2661c1ce7cda7c3eb817037a4fbf9be068224d37157406ee9336d2c83ca3e01830d8d6553b893cf7353c32836fc53dda578b7b9b
-
SSDEEP
3072:Q5u7yT4TVbkuRaX1w71jnRkCoyJTarYWbV+HOFxg+z1WxJsqWkoyjOowUVl/TlAQ:QLexkuRaX41xoyJV65gzyZko+uc
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 4296 svchost.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\3494e3ec = "L!“®Ì¥¸nÆð\n€\x04¼Wò\x05\u0090\x1eUTE\u008d¼¬ow—z\u0081iÃüGƒAû;!ea¹Q‘£+\fƒ{£çc³\x03ƒÛ«»ÁõmÓù\x13£›ƒä¡w=‘›îœ\x16“\x1b£A“³ëÕ»ã·ûÃ;©å‘Ì=D\x13«¡A\x16\rí»7©\x19‰‹Tlû“\x1bM§\rósƒDýcNIóžuD»Œù‰mv–ô»Sõ”ì[\x17C\x19¶Ó¡fï\f\u008d“SÌû§¾³n»Ë…ã³£Þ…9F…‹\x1emãvkkßsŸ\vƒIçþS“[iQÞ\x03\x0fìC«\fÕuV]ݳ\x03!—\u009d—s\u008dݧᱬ#\u00ad,ÔK{ÝóÓQä¯ì¹?G‹#‘“5\v¿\x19ó3«îÌ5K\u00adõ›Ž+Kc5Þ\u008dã" 74f585ada49b89c894a0a2208ab7a97d6b331fe04ce2fbfd2d69bd81f27f26f4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\3494e3ec = "L!“®Ì¥¸nÆð\n€\x04¼Wò\x05\u0090\x1eUTE\u008d¼¬ow—z\u0081iÃüGƒAû;!ea¹Q‘£+\fƒ{£çc³\x03ƒÛ«»ÁõmÓù\x13£›ƒä¡w=‘›îœ\x16“\x1b£A“³ëÕ»ã·ûÃ;©å‘Ì=D\x13«¡A\x16\rí»7©\x19‰‹Tlû“\x1bM§\rósƒDýcNIóžuD»Œù‰mv–ô»Sõ”ì[\x17C\x19¶Ó¡fï\f\u008d“SÌû§¾³n»Ë…ã³£Þ…9F…‹\x1emãvkkßsŸ\vƒIçþS“[iQÞ\x03\x0fìC«\fÕuV]ݳ\x03!—\u009d—s\u008dݧᱬ#\u00ad,ÔK{ÝóÓQä¯ì¹?G‹#‘“5\v¿\x19ó3«îÌ5K\u00adõ›Ž+Kc5Þ\u008dã" svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe 74f585ada49b89c894a0a2208ab7a97d6b331fe04ce2fbfd2d69bd81f27f26f4.exe File opened for modification C:\Windows\apppatch\svchost.exe 74f585ada49b89c894a0a2208ab7a97d6b331fe04ce2fbfd2d69bd81f27f26f4.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 74f585ada49b89c894a0a2208ab7a97d6b331fe04ce2fbfd2d69bd81f27f26f4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2800 74f585ada49b89c894a0a2208ab7a97d6b331fe04ce2fbfd2d69bd81f27f26f4.exe 2800 74f585ada49b89c894a0a2208ab7a97d6b331fe04ce2fbfd2d69bd81f27f26f4.exe 2800 74f585ada49b89c894a0a2208ab7a97d6b331fe04ce2fbfd2d69bd81f27f26f4.exe 2800 74f585ada49b89c894a0a2208ab7a97d6b331fe04ce2fbfd2d69bd81f27f26f4.exe 2800 74f585ada49b89c894a0a2208ab7a97d6b331fe04ce2fbfd2d69bd81f27f26f4.exe 2800 74f585ada49b89c894a0a2208ab7a97d6b331fe04ce2fbfd2d69bd81f27f26f4.exe 2800 74f585ada49b89c894a0a2208ab7a97d6b331fe04ce2fbfd2d69bd81f27f26f4.exe 2800 74f585ada49b89c894a0a2208ab7a97d6b331fe04ce2fbfd2d69bd81f27f26f4.exe 4296 svchost.exe 4296 svchost.exe 4296 svchost.exe 4296 svchost.exe 4296 svchost.exe 4296 svchost.exe 4296 svchost.exe 4296 svchost.exe 4296 svchost.exe 4296 svchost.exe 4296 svchost.exe 4296 svchost.exe 4296 svchost.exe 4296 svchost.exe 4296 svchost.exe 4296 svchost.exe 4296 svchost.exe 4296 svchost.exe 4296 svchost.exe 4296 svchost.exe 4296 svchost.exe 4296 svchost.exe 4296 svchost.exe 4296 svchost.exe 4296 svchost.exe 4296 svchost.exe 4296 svchost.exe 4296 svchost.exe 4296 svchost.exe 4296 svchost.exe 4296 svchost.exe 4296 svchost.exe 4296 svchost.exe 4296 svchost.exe 4296 svchost.exe 4296 svchost.exe 4296 svchost.exe 4296 svchost.exe 4296 svchost.exe 4296 svchost.exe 4296 svchost.exe 4296 svchost.exe 4296 svchost.exe 4296 svchost.exe 4296 svchost.exe 4296 svchost.exe 4296 svchost.exe 4296 svchost.exe 4296 svchost.exe 4296 svchost.exe 4296 svchost.exe 4296 svchost.exe 4296 svchost.exe 4296 svchost.exe 4296 svchost.exe 4296 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2800 74f585ada49b89c894a0a2208ab7a97d6b331fe04ce2fbfd2d69bd81f27f26f4.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2800 wrote to memory of 4296 2800 74f585ada49b89c894a0a2208ab7a97d6b331fe04ce2fbfd2d69bd81f27f26f4.exe 86 PID 2800 wrote to memory of 4296 2800 74f585ada49b89c894a0a2208ab7a97d6b331fe04ce2fbfd2d69bd81f27f26f4.exe 86 PID 2800 wrote to memory of 4296 2800 74f585ada49b89c894a0a2208ab7a97d6b331fe04ce2fbfd2d69bd81f27f26f4.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\74f585ada49b89c894a0a2208ab7a97d6b331fe04ce2fbfd2d69bd81f27f26f4.exe"C:\Users\Admin\AppData\Local\Temp\74f585ada49b89c894a0a2208ab7a97d6b331fe04ce2fbfd2d69bd81f27f26f4.exe"1⤵
- Modifies WinLogon
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4296
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168B
MD5d57e3a550060f85d44a175139ea23021
SHA12c5cb3428a322c9709a34d04dd86fe7628f8f0a6
SHA25643edf068d34276e8ade4113d4d7207de19fc98a2ae1c07298e593edae2a8774c
SHA5120364fe6a010fce7a3f4a6344c84468c64b20fd131f3160fc649db78f1075ba52d8a1c4496e50dbe27c357e01ee52e94cdcda8f7927cba28d5f2f45b9da690063
-
Filesize
593B
MD53b03d93d3487806337b5c6443ce7a62d
SHA193a7a790bb6348606cbdaf5daeaaf4ea8cf731d0
SHA2567392749832c70fcfc2d440d7afc2f880000dd564930d95d634eb1199fa15de30
SHA512770977beaeedafc5c98d0c32edc8c6c850f05e9f363bc9997fa73991646b02e5d40ceed0017b06caeab0db86423844bc4b0a9f0df2d8239230e423a7bfbd4a88
-
Filesize
593B
MD5926512864979bc27cf187f1de3f57aff
SHA1acdeb9d6187932613c7fa08eaf28f0cd8116f4b5
SHA256b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f
SHA512f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b
-
Filesize
42KB
MD5702ab60bdfdfbfbe8a3d323923440e32
SHA128d211a924bcd130b3fd4f4828a7dd853a893abd
SHA25661bc6de6e2c012eea34be36cf764a3dd25b0c3a965ee7d3b639d2a6019fef617
SHA51233815b18ac0a444e9e978e562493f4380d79b2786319c90ae76c2c0e73eb67de28e2150c9ffff04ce940a656debd42ede2c5f6496086a21b3081e1dde8bf4401
-
Filesize
204KB
MD550a20f350412469a633075c632589a39
SHA1f8a18b7ebecfcad1c48c825d9b0d46e2471c0d21
SHA256a586909d4f9f7c83ede35d777ece4cc474947709f70104821843ec5aa4cf9628
SHA512d14bc2df111cf01b10eb362cadf6446f8874fb57eb5925743c7c09830f08661c652caad1c8026c92a6ebbeda4ab51c30f880b2f627eca4ee854c742370a2d87a