Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
102s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20/08/2024, 08:41
Behavioral task
behavioral1
Sample
3bd7c50c46d41b763a3dfe154866b4b0N.exe
Resource
win7-20240704-en
General
-
Target
3bd7c50c46d41b763a3dfe154866b4b0N.exe
-
Size
38KB
-
MD5
3bd7c50c46d41b763a3dfe154866b4b0
-
SHA1
6034dee7c16925e86738e1323fcadc6ca083b9d2
-
SHA256
7abb0766d6e3f8f2b986759ecef264945cf2f16dc07597ab52974876917ea959
-
SHA512
242f38c9213c5bd94ce82cfc542ef5500c7aadfe1cd5e58b2e37aa0a979b91cce36c61fb0a7005b1e656a22bf44d1fbb3e6b02af0524757a6c0b13ff49a1463d
-
SSDEEP
768:Nzj1JegVa3Gry+uELEmITCs/NUZ6nZdYbCLECkrQoP9fmF2f1cONhn:NWQa2TLEmITcoQxfllfmS1cODn
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3524 smss.exe -
resource yara_rule behavioral2/memory/1932-0-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/files/0x000700000002347d-5.dat upx behavioral2/memory/3524-13-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/1932-11-0x0000000000400000-0x0000000000422000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\1230\smss.exe 3bd7c50c46d41b763a3dfe154866b4b0N.exe File opened for modification C:\Windows\SysWOW64\1230\smss.exe smss.exe File opened for modification C:\Windows\SysWOW64\Service.exe smss.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2272 sc.exe 1956 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3bd7c50c46d41b763a3dfe154866b4b0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language smss.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1932 3bd7c50c46d41b763a3dfe154866b4b0N.exe 3524 smss.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1932 wrote to memory of 2272 1932 3bd7c50c46d41b763a3dfe154866b4b0N.exe 84 PID 1932 wrote to memory of 2272 1932 3bd7c50c46d41b763a3dfe154866b4b0N.exe 84 PID 1932 wrote to memory of 2272 1932 3bd7c50c46d41b763a3dfe154866b4b0N.exe 84 PID 1932 wrote to memory of 3524 1932 3bd7c50c46d41b763a3dfe154866b4b0N.exe 86 PID 1932 wrote to memory of 3524 1932 3bd7c50c46d41b763a3dfe154866b4b0N.exe 86 PID 1932 wrote to memory of 3524 1932 3bd7c50c46d41b763a3dfe154866b4b0N.exe 86 PID 3524 wrote to memory of 1956 3524 smss.exe 87 PID 3524 wrote to memory of 1956 3524 smss.exe 87 PID 3524 wrote to memory of 1956 3524 smss.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\3bd7c50c46d41b763a3dfe154866b4b0N.exe"C:\Users\Admin\AppData\Local\Temp\3bd7c50c46d41b763a3dfe154866b4b0N.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe stop wscsvc2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2272
-
-
C:\Windows\SysWOW64\1230\smss.exeC:\Windows\system32\1230\smss.exe -d2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe stop wscsvc3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1956
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
38KB
MD59856b6bb20a766e8c7f88ff1a8955935
SHA1a6cf07d677748341b6560fea9709edcba6e3f309
SHA2565b3066eae2fd7cae854db831b45e721134e01244726308d8136325732f4f7767
SHA51255c6d9ad7a9e2821eddbbc4a5a8f135185c41b323a3f26bd92dc3eabef69d7c5596f03b4ffe8248947506b978217c190657e95cdf269cd9a8a882e17bba6275d