Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
24/08/2024, 04:21
Static task
static1
Behavioral task
behavioral1
Sample
2ab53c7723292f6e8c86ca6647961d40N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2ab53c7723292f6e8c86ca6647961d40N.exe
Resource
win10v2004-20240802-en
General
-
Target
2ab53c7723292f6e8c86ca6647961d40N.exe
-
Size
204KB
-
MD5
2ab53c7723292f6e8c86ca6647961d40
-
SHA1
c84a196ea4296dbee6857af9e68d6fda8accbe25
-
SHA256
33024a260ea95ec87fc4911f251d181efcaf4adf88579ee27f8f4a9e4ef0023c
-
SHA512
0eed8c4b00581ed547510bcdd4c5d2a5e6701f4242546799533428bf57b38b77226a0b73208605f5a9c64418a02f419afc3bda06587a04b56d6bb2a936f553db
-
SSDEEP
3072:C5u7yT4TVbkuRaX1w71jnRkCoyJTarYWbV+HOFxg+z1WxJsqWkoyjOowUVl/TlAQ:CLexkuRaX41xoyJV65gzyZko+uc
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2880 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 2756 2ab53c7723292f6e8c86ca6647961d40N.exe 2756 2ab53c7723292f6e8c86ca6647961d40N.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\4065e39a = "G†Ý›eÚ\x1d;#¿R·‰¼ÔgUbfÚ—\u0090‚Þ‘õ¢°ÔþÙ~\x1efavÎÞÙly^”\x0eô‰ö6V!Éœ6|¤\x16.Ža\x11î´1~^q¬fö$þ®Æ”Ü–¼Î®”|4©ö4ì>¾¾\x116¦ñ™‰f9¬†^YÖ\x0e\x1fŒN$†ñv±Œä$ùÎö¯¬ÉÞ„þö1æN\tYÆñáĦDáÄÎöž)\x1f\x066\x0e¿|¡\x11¡6\x14¡)\x7f§\x7fñô±\x04ôGŒ™–NfaaÜTÆ^–\x06ù?V1qynìž\x0eù‡q)¡'á\x1flÎ\u0081öîT\x7fÖü–LÉä·á9$ù\x011\\9a\x04\x0eÞü1\u0081´Þ>ÆÔ¬)\x7f)¼nÎŽ®?··n®nîìWi|\x0e6aä©Ä&‰\x14¬–æ" 2ab53c7723292f6e8c86ca6647961d40N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\4065e39a = "G†Ý›eÚ\x1d;#¿R·‰¼ÔgUbfÚ—\u0090‚Þ‘õ¢°ÔþÙ~\x1efavÎÞÙly^”\x0eô‰ö6V!Éœ6|¤\x16.Ža\x11î´1~^q¬fö$þ®Æ”Ü–¼Î®”|4©ö4ì>¾¾\x116¦ñ™‰f9¬†^YÖ\x0e\x1fŒN$†ñv±Œä$ùÎö¯¬ÉÞ„þö1æN\tYÆñáĦDáÄÎöž)\x1f\x066\x0e¿|¡\x11¡6\x14¡)\x7f§\x7fñô±\x04ôGŒ™–NfaaÜTÆ^–\x06ù?V1qynìž\x0eù‡q)¡'á\x1flÎ\u0081öîT\x7fÖü–LÉä·á9$ù\x011\\9a\x04\x0eÞü1\u0081´Þ>ÆÔ¬)\x7f)¼nÎŽ®?··n®nîìWi|\x0e6aä©Ä&‰\x14¬–æ" svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe 2ab53c7723292f6e8c86ca6647961d40N.exe File opened for modification C:\Windows\apppatch\svchost.exe 2ab53c7723292f6e8c86ca6647961d40N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2ab53c7723292f6e8c86ca6647961d40N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2756 2ab53c7723292f6e8c86ca6647961d40N.exe 2756 2ab53c7723292f6e8c86ca6647961d40N.exe 2756 2ab53c7723292f6e8c86ca6647961d40N.exe 2756 2ab53c7723292f6e8c86ca6647961d40N.exe 2880 svchost.exe 2880 svchost.exe 2880 svchost.exe 2880 svchost.exe 2880 svchost.exe 2880 svchost.exe 2880 svchost.exe 2880 svchost.exe 2880 svchost.exe 2880 svchost.exe 2880 svchost.exe 2880 svchost.exe 2880 svchost.exe 2880 svchost.exe 2880 svchost.exe 2880 svchost.exe 2880 svchost.exe 2880 svchost.exe 2880 svchost.exe 2880 svchost.exe 2880 svchost.exe 2880 svchost.exe 2880 svchost.exe 2880 svchost.exe 2880 svchost.exe 2880 svchost.exe 2880 svchost.exe 2880 svchost.exe 2880 svchost.exe 2880 svchost.exe 2880 svchost.exe 2880 svchost.exe 2880 svchost.exe 2880 svchost.exe 2880 svchost.exe 2880 svchost.exe 2880 svchost.exe 2880 svchost.exe 2880 svchost.exe 2880 svchost.exe 2880 svchost.exe 2880 svchost.exe 2880 svchost.exe 2880 svchost.exe 2880 svchost.exe 2880 svchost.exe 2880 svchost.exe 2880 svchost.exe 2880 svchost.exe 2880 svchost.exe 2880 svchost.exe 2880 svchost.exe 2880 svchost.exe 2880 svchost.exe 2880 svchost.exe 2880 svchost.exe 2880 svchost.exe 2880 svchost.exe 2880 svchost.exe 2880 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2756 2ab53c7723292f6e8c86ca6647961d40N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2756 wrote to memory of 2880 2756 2ab53c7723292f6e8c86ca6647961d40N.exe 30 PID 2756 wrote to memory of 2880 2756 2ab53c7723292f6e8c86ca6647961d40N.exe 30 PID 2756 wrote to memory of 2880 2756 2ab53c7723292f6e8c86ca6647961d40N.exe 30 PID 2756 wrote to memory of 2880 2756 2ab53c7723292f6e8c86ca6647961d40N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2ab53c7723292f6e8c86ca6647961d40N.exe"C:\Users\Admin\AppData\Local\Temp\2ab53c7723292f6e8c86ca6647961d40N.exe"1⤵
- Loads dropped DLL
- Modifies WinLogon
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2880
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
42KB
MD565f874128a0fe9fdb45d10831e1c25fc
SHA1b511da5749131cb143644a65694ed25047b2e17e
SHA2562940d5862f1d8ebc7d3d165096830c87502b255a3e6218de545f70d07a00f64a
SHA51203ae4903067bf7b9ffa4c39a612b03ab00bb7778270461504e350cb2e0d174110854b79c3c9361b81863af12afb900621805a58450675b99ce5dd7c079df9a88
-
Filesize
204KB
MD576ca04083a23639db68be4cb9c671376
SHA1d77965691f60ba4a7bd50483f1eac6edc2d4efdb
SHA2564ce301cdd28e9ca7bac3cef075d9e796f9aa69ceb2faf20054059602bcf6ed7d
SHA5122c3b25ad5cdd7be5f60f7b04fdbb58babe8991c9c36d18df6978fbeca9b4ebec4619b4a466d4163049cc2b32648a487fd306c70980ff0c64f0dfff863acc7e94