Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
116s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
25/08/2024, 16:15
Static task
static1
Behavioral task
behavioral1
Sample
903a7afc7226ef8b5d19808403508580N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
903a7afc7226ef8b5d19808403508580N.exe
Resource
win10v2004-20240802-en
General
-
Target
903a7afc7226ef8b5d19808403508580N.exe
-
Size
355KB
-
MD5
903a7afc7226ef8b5d19808403508580
-
SHA1
cc4dd3cd73093c460bfc6c27199fb249620024e4
-
SHA256
4b4616813d6608450f07c8ced20e1d8cad4f53242aaadcfa6dfd6e131ee335ce
-
SHA512
59cfca1da1508e4244942edac2a7638285d8c0a43b104e174387282e797e9abcdda7adcccef06c6d6c0c8fa39ea7b415e265a51d88d5bde8204ea9029a2db6fb
-
SSDEEP
6144:R3EmWPDNND9yRPzLq+YXFqaZiMLic9kzVd7EAC4TSs9EiS:WmWhND9yJz+b1FcMLmp2ATTSsdS
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2496 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 1820 903a7afc7226ef8b5d19808403508580N.exe 1820 903a7afc7226ef8b5d19808403508580N.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\7f5ae23d = "\x1c»£\b¼?;\x10N.#\x02Ï\x05]ðùtrµªÝÔÕd¼éQ\x1aE\x1f\u008dg…ÂïÅù¿·÷eq—µ)¹\x05¿‘éz¿ñ\u008fïM\x15?\x17sI\u008fWQo\x7f_Ï\u009dG''Õ#——g\x17ÿ]õ?*\x17\x01_ÿ½\x7f\x17™µÿo¥ç7\v§-\x19ŸÓ¹?—ÿkk'YZÇO-WW\u008fzÿ\x1fe·?\x19‡í\x1d\x1f©\x1dªÙÒ¿ÿÝOÿ7\u009d2\x19åñ¡ñ/åߟ\x1f‰ª\x1f½bG\u008do'Ã\x05ÿi\x17G?—3÷z[—³áÂw\u00adWß\u008fo_m\u009dg\x1f_ç™êõg\x01½3'\aé\a\a\x7f¯\a/—ª³/×WWÝ—¢ËGÿJW\x05w÷§\x11©ÝG'µú\u008fšƒ_\x1f¿‡G‰\x17A‚\x1dG×ïß_§G\u008f*'×" 903a7afc7226ef8b5d19808403508580N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\7f5ae23d = "\x1c»£\b¼?;\x10N.#\x02Ï\x05]ðùtrµªÝÔÕd¼éQ\x1aE\x1f\u008dg…ÂïÅù¿·÷eq—µ)¹\x05¿‘éz¿ñ\u008fïM\x15?\x17sI\u008fWQo\x7f_Ï\u009dG''Õ#——g\x17ÿ]õ?*\x17\x01_ÿ½\x7f\x17™µÿo¥ç7\v§-\x19ŸÓ¹?—ÿkk'YZÇO-WW\u008fzÿ\x1fe·?\x19‡í\x1d\x1f©\x1dªÙÒ¿ÿÝOÿ7\u009d2\x19åñ¡ñ/åߟ\x1f‰ª\x1f½bG\u008do'Ã\x05ÿi\x17G?—3÷z[—³áÂw\u00adWß\u008fo_m\u009dg\x1f_ç™êõg\x01½3'\aé\a\a\x7f¯\a/—ª³/×WWÝ—¢ËGÿJW\x05w÷§\x11©ÝG'µú\u008fšƒ_\x1f¿‡G‰\x17A‚\x1dG×ïß_§G\u008f*'×" svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe 903a7afc7226ef8b5d19808403508580N.exe File opened for modification C:\Windows\apppatch\svchost.exe 903a7afc7226ef8b5d19808403508580N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 903a7afc7226ef8b5d19808403508580N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1820 903a7afc7226ef8b5d19808403508580N.exe 1820 903a7afc7226ef8b5d19808403508580N.exe 1820 903a7afc7226ef8b5d19808403508580N.exe 1820 903a7afc7226ef8b5d19808403508580N.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1820 903a7afc7226ef8b5d19808403508580N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1820 wrote to memory of 2496 1820 903a7afc7226ef8b5d19808403508580N.exe 30 PID 1820 wrote to memory of 2496 1820 903a7afc7226ef8b5d19808403508580N.exe 30 PID 1820 wrote to memory of 2496 1820 903a7afc7226ef8b5d19808403508580N.exe 30 PID 1820 wrote to memory of 2496 1820 903a7afc7226ef8b5d19808403508580N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\903a7afc7226ef8b5d19808403508580N.exe"C:\Users\Admin\AppData\Local\Temp\903a7afc7226ef8b5d19808403508580N.exe"1⤵
- Loads dropped DLL
- Modifies WinLogon
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2496
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\69P6875H\login[5].htm
Filesize168B
MD5d57e3a550060f85d44a175139ea23021
SHA12c5cb3428a322c9709a34d04dd86fe7628f8f0a6
SHA25643edf068d34276e8ade4113d4d7207de19fc98a2ae1c07298e593edae2a8774c
SHA5120364fe6a010fce7a3f4a6344c84468c64b20fd131f3160fc649db78f1075ba52d8a1c4496e50dbe27c357e01ee52e94cdcda8f7927cba28d5f2f45b9da690063
-
Filesize
102KB
MD559eb712ccf3ee8e654b118891c5ac566
SHA1f10669ed7910a29008d0da774da25ef47b891530
SHA256f575efdc9614be0cd1c7056bd2d7fe1525428ab624d528ca583649b03136d403
SHA512b59c9d8b4bdea213cd8f4c7bc6b9559050b9f6f8951e9fc115999e7c3d3db29bcc3e4576264d6b9176308c28da5be62ef76ad9885fe938a34994e36acc5dc781
-
Filesize
24KB
MD56936c68128fc3ba1637c2937b3c98319
SHA1620d88d997fc75c7b3cdeebcc321daa23aed67a9
SHA256cffdfef87c8927192113b293922a535f8c471e0d818ea254af56153bdb4524bb
SHA512a789780353931cc1b513d3dc5a352696ee41fea7233b939f136599ee7c35eb2695cc8c230a41d04190cad96c1796dbd2b99957ee978cd15b3da96e273b3a4d9c
-
Filesize
593B
MD5926512864979bc27cf187f1de3f57aff
SHA1acdeb9d6187932613c7fa08eaf28f0cd8116f4b5
SHA256b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f
SHA512f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b
-
Filesize
355KB
MD57c9898b61b84cb3310a06970b4429781
SHA15996fc0845513970f56ca4c773751109602c4932
SHA256a25c96cb83a4f1b77b7b09c1143108148199ad03d919c04212a71072c453568f
SHA5124b5672eaebf94dbb5ddd2490645e74c833cc3d586dac3af9631c299bcd5e18832e106cb72abb27ba8a71b5bbf69f1377bf382d798bce0e7fdcfc230ab2d0ffea