Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
17/08/2024, 03:51
Static task
static1
Behavioral task
behavioral1
Sample
afc6625d58225e668e7369871a5e5ab52232f2fec1e553ee668999c80482368c.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
afc6625d58225e668e7369871a5e5ab52232f2fec1e553ee668999c80482368c.exe
Resource
win10v2004-20240802-en
General
-
Target
afc6625d58225e668e7369871a5e5ab52232f2fec1e553ee668999c80482368c.exe
-
Size
203KB
-
MD5
0657ba734321626a97d1f62507bf35d5
-
SHA1
a3ff60f16b347cb8320cab38111f4d32449bc3a9
-
SHA256
afc6625d58225e668e7369871a5e5ab52232f2fec1e553ee668999c80482368c
-
SHA512
35e409cc7451f9138ad455d6d2e2afe58f3856eb29027caffb9a3a3ce48d8a5e06ff0d80c0310e033697561ebfe03d38e5c453862da630599d9d3d1c896b8468
-
SSDEEP
6144:uEL1lvsWYuOiMnGNuuF8XcfI2MPO7qhnhF9mD:XnksHxyXcfIRhFE
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2752 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 2252 afc6625d58225e668e7369871a5e5ab52232f2fec1e553ee668999c80482368c.exe 2252 afc6625d58225e668e7369871a5e5ab52232f2fec1e553ee668999c80482368c.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\4edea621 = "OORkwÚ‰Ã9ýÊ·æ.>\røM¾\x10ÿ\x12U&3Pú¨!Kë>üd&öU.\x1eþ¤„Ìl,œ\x15ÕÌ$L\fÌ„E~œ¦£Î3îì>^\x1eýÆ\x04¼U¾\x16\u00adí\v\u008dŒ„žmt¼v]†ö\u008d´®œ®žì®\x0ež\x1e\x06Å„\v´Ü\x04+~$\x1dLÌ|Vþf&¼\x1c]vž~6®\x1c®ÞväV-<c}]Ôãv\x15æ\x1c4fŒ&ÜîsÔ¶.†;–\x065\x04µ¥6´®ÝEÆ\\ã<\x1eždÌÕ¾6&¬^&%<†\rÃmÅ\x1d\x05´\u008d¬Ô+$t>ìvE=´\x04ÖdDü£ôÕóF;£\x04V\x16\x16S,>VŽ6\x06ìÆ„†ö>Uì¤\\ü”¦\\<FV…UŽF®¬F\x16\x04†Ó{ö<ìäÓæ4" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\4edea621 = "OORkwÚ‰Ã9ýÊ·æ.>\røM¾\x10ÿ\x12U&3Pú¨!Kë>üd&öU.\x1eþ¤„Ìl,œ\x15ÕÌ$L\fÌ„E~œ¦£Î3îì>^\x1eýÆ\x04¼U¾\x16\u00adí\v\u008dŒ„žmt¼v]†ö\u008d´®œ®žì®\x0ež\x1e\x06Å„\v´Ü\x04+~$\x1dLÌ|Vþf&¼\x1c]vž~6®\x1c®ÞväV-<c}]Ôãv\x15æ\x1c4fŒ&ÜîsÔ¶.†;–\x065\x04µ¥6´®ÝEÆ\\ã<\x1eždÌÕ¾6&¬^&%<†\rÃmÅ\x1d\x05´\u008d¬Ô+$t>ìvE=´\x04ÖdDü£ôÕóF;£\x04V\x16\x16S,>VŽ6\x06ìÆ„†ö>Uì¤\\ü”¦\\<FV…UŽF®¬F\x16\x04†Ó{ö<ìäÓæ4" afc6625d58225e668e7369871a5e5ab52232f2fec1e553ee668999c80482368c.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe afc6625d58225e668e7369871a5e5ab52232f2fec1e553ee668999c80482368c.exe File opened for modification C:\Windows\apppatch\svchost.exe afc6625d58225e668e7369871a5e5ab52232f2fec1e553ee668999c80482368c.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language afc6625d58225e668e7369871a5e5ab52232f2fec1e553ee668999c80482368c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2252 afc6625d58225e668e7369871a5e5ab52232f2fec1e553ee668999c80482368c.exe 2252 afc6625d58225e668e7369871a5e5ab52232f2fec1e553ee668999c80482368c.exe 2252 afc6625d58225e668e7369871a5e5ab52232f2fec1e553ee668999c80482368c.exe 2252 afc6625d58225e668e7369871a5e5ab52232f2fec1e553ee668999c80482368c.exe 2752 svchost.exe 2752 svchost.exe 2752 svchost.exe 2752 svchost.exe 2752 svchost.exe 2752 svchost.exe 2752 svchost.exe 2752 svchost.exe 2752 svchost.exe 2752 svchost.exe 2752 svchost.exe 2752 svchost.exe 2752 svchost.exe 2752 svchost.exe 2752 svchost.exe 2752 svchost.exe 2752 svchost.exe 2752 svchost.exe 2752 svchost.exe 2752 svchost.exe 2752 svchost.exe 2752 svchost.exe 2752 svchost.exe 2752 svchost.exe 2752 svchost.exe 2752 svchost.exe 2752 svchost.exe 2752 svchost.exe 2752 svchost.exe 2752 svchost.exe 2752 svchost.exe 2752 svchost.exe 2752 svchost.exe 2752 svchost.exe 2752 svchost.exe 2752 svchost.exe 2752 svchost.exe 2752 svchost.exe 2752 svchost.exe 2752 svchost.exe 2752 svchost.exe 2752 svchost.exe 2752 svchost.exe 2752 svchost.exe 2752 svchost.exe 2752 svchost.exe 2752 svchost.exe 2752 svchost.exe 2752 svchost.exe 2752 svchost.exe 2752 svchost.exe 2752 svchost.exe 2752 svchost.exe 2752 svchost.exe 2752 svchost.exe 2752 svchost.exe 2752 svchost.exe 2752 svchost.exe 2752 svchost.exe 2752 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2252 afc6625d58225e668e7369871a5e5ab52232f2fec1e553ee668999c80482368c.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2252 wrote to memory of 2752 2252 afc6625d58225e668e7369871a5e5ab52232f2fec1e553ee668999c80482368c.exe 30 PID 2252 wrote to memory of 2752 2252 afc6625d58225e668e7369871a5e5ab52232f2fec1e553ee668999c80482368c.exe 30 PID 2252 wrote to memory of 2752 2252 afc6625d58225e668e7369871a5e5ab52232f2fec1e553ee668999c80482368c.exe 30 PID 2252 wrote to memory of 2752 2252 afc6625d58225e668e7369871a5e5ab52232f2fec1e553ee668999c80482368c.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\afc6625d58225e668e7369871a5e5ab52232f2fec1e553ee668999c80482368c.exe"C:\Users\Admin\AppData\Local\Temp\afc6625d58225e668e7369871a5e5ab52232f2fec1e553ee668999c80482368c.exe"1⤵
- Loads dropped DLL
- Modifies WinLogon
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2752
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LPQ313RR\login[1].htm
Filesize168B
MD5d57e3a550060f85d44a175139ea23021
SHA12c5cb3428a322c9709a34d04dd86fe7628f8f0a6
SHA25643edf068d34276e8ade4113d4d7207de19fc98a2ae1c07298e593edae2a8774c
SHA5120364fe6a010fce7a3f4a6344c84468c64b20fd131f3160fc649db78f1075ba52d8a1c4496e50dbe27c357e01ee52e94cdcda8f7927cba28d5f2f45b9da690063
-
Filesize
593B
MD5926512864979bc27cf187f1de3f57aff
SHA1acdeb9d6187932613c7fa08eaf28f0cd8116f4b5
SHA256b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f
SHA512f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b
-
Filesize
203KB
MD5a82a41b24dcb6e2ae288c6f262d83365
SHA10ec45bee4720258c46d7a542e1cfaca758b1c686
SHA256cf9fa2f1f682271f155feb60ed6a7504e0186594a3cf68177f85a62839d0bc7f
SHA51204c32792bc83bb08ab22c3026d48f2973c7fef8e3e7fb372f8ab20c90ab2b4adf1ce930b13ae7c6bbb1459c57220678af978544e567013be02d16b762abcbd67