Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
16s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25/08/2024, 01:40
Behavioral task
behavioral1
Sample
f787ee064ef7bde38f4a64b4f61a0240N.exe
Resource
win7-20240708-en
General
-
Target
f787ee064ef7bde38f4a64b4f61a0240N.exe
-
Size
38KB
-
MD5
f787ee064ef7bde38f4a64b4f61a0240
-
SHA1
9cfdd7b8ac467b687ca8b28a5125b41dd46a3f7f
-
SHA256
4df1202ec465fcaed47609c3b8de8bf123f04782829b08d06ccc2007be73bd3f
-
SHA512
9c1751f760b6ff1932080cc423029db1ce70302e86ba133e13c99ba70aff3d5fb3a8e84c66afa2f665e0eba5aca9faa309958ed4be2b2efb911224693ccbe567
-
SSDEEP
768:Nzj1JegVa3Gry+uELEmITCs/NUZ6nZdYbCLECkrQoP9fmF2f1cONg:NWQa2TLEmITcoQxfllfmS1cOm
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1880 smss.exe -
Loads dropped DLL 2 IoCs
pid Process 904 f787ee064ef7bde38f4a64b4f61a0240N.exe 904 f787ee064ef7bde38f4a64b4f61a0240N.exe -
resource yara_rule behavioral1/memory/904-0-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/files/0x00060000000194d4-4.dat upx behavioral1/memory/1880-19-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/904-21-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/1880-13-0x0000000000400000-0x0000000000422000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\1230\smss.exe f787ee064ef7bde38f4a64b4f61a0240N.exe File opened for modification C:\Windows\SysWOW64\1230\smss.exe smss.exe File opened for modification C:\Windows\SysWOW64\Service.exe smss.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3056 sc.exe 2704 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language smss.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f787ee064ef7bde38f4a64b4f61a0240N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 904 f787ee064ef7bde38f4a64b4f61a0240N.exe 1880 smss.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 904 wrote to memory of 3056 904 f787ee064ef7bde38f4a64b4f61a0240N.exe 30 PID 904 wrote to memory of 3056 904 f787ee064ef7bde38f4a64b4f61a0240N.exe 30 PID 904 wrote to memory of 3056 904 f787ee064ef7bde38f4a64b4f61a0240N.exe 30 PID 904 wrote to memory of 3056 904 f787ee064ef7bde38f4a64b4f61a0240N.exe 30 PID 904 wrote to memory of 1880 904 f787ee064ef7bde38f4a64b4f61a0240N.exe 32 PID 904 wrote to memory of 1880 904 f787ee064ef7bde38f4a64b4f61a0240N.exe 32 PID 904 wrote to memory of 1880 904 f787ee064ef7bde38f4a64b4f61a0240N.exe 32 PID 904 wrote to memory of 1880 904 f787ee064ef7bde38f4a64b4f61a0240N.exe 32 PID 1880 wrote to memory of 2704 1880 smss.exe 33 PID 1880 wrote to memory of 2704 1880 smss.exe 33 PID 1880 wrote to memory of 2704 1880 smss.exe 33 PID 1880 wrote to memory of 2704 1880 smss.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\f787ee064ef7bde38f4a64b4f61a0240N.exe"C:\Users\Admin\AppData\Local\Temp\f787ee064ef7bde38f4a64b4f61a0240N.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe stop wscsvc2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3056
-
-
C:\Windows\SysWOW64\1230\smss.exeC:\Windows\system32\1230\smss.exe -d2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe stop wscsvc3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2704
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
38KB
MD564843e8b2c8a8a71c4d13778e061d4fa
SHA1cb5c75418f71b321547ab60ccaaca214c0256cbf
SHA256ea991a08f551c1110ccdc7ba0b1f023d67a1b3f6163b3f22da6d7ded617c6b5f
SHA5122e953285192917488f66a4eb45ecf31eb5c0bae7dce0fc8ba1f48b7ed5a6e19975792dc061ea76ab423a54cd6927b143781faebc84982f2d366da1d5ece85983