Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
116s -
max time network
117s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/08/2024, 16:15
Static task
static1
Behavioral task
behavioral1
Sample
903a7afc7226ef8b5d19808403508580N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
903a7afc7226ef8b5d19808403508580N.exe
Resource
win10v2004-20240802-en
General
-
Target
903a7afc7226ef8b5d19808403508580N.exe
-
Size
355KB
-
MD5
903a7afc7226ef8b5d19808403508580
-
SHA1
cc4dd3cd73093c460bfc6c27199fb249620024e4
-
SHA256
4b4616813d6608450f07c8ced20e1d8cad4f53242aaadcfa6dfd6e131ee335ce
-
SHA512
59cfca1da1508e4244942edac2a7638285d8c0a43b104e174387282e797e9abcdda7adcccef06c6d6c0c8fa39ea7b415e265a51d88d5bde8204ea9029a2db6fb
-
SSDEEP
6144:R3EmWPDNND9yRPzLq+YXFqaZiMLic9kzVd7EAC4TSs9EiS:WmWhND9yJz+b1FcMLmp2ATTSsdS
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 4556 svchost.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\e2bdcd62 = "«_‘\u008f>ËLh*z‘äó\u00adÇ\u0081\x04ôÝl¼/Kù@›Di‚Å䟇55g°£Y°¯›ÈÝÅy\v #]\x10¯Hˆ\u008d+3¥WEµ·}—¸}å\x1b\x1b\u0081\rHP\x17›¿\u008fõõ@5·µ•è\x190½ˆs`çÈMÏà@…«%—\x11á_\x0fA\u009dˆG" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\e2bdcd62 = "«_‘\u008f>ËLh*z‘äó\u00adÇ\u0081\x04ôÝl¼/Kù@›Di‚Å䟇55g°£Y°¯›ÈÝÅy\v #]\x10¯Hˆ\u008d+3¥WEµ·}—¸}å\x1b\x1b\u0081\rHP\x17›¿\u008fõõ@5·µ•è\x190½ˆs`çÈMÏà@…«%—\x11á_\x0fA\u009dˆG" 903a7afc7226ef8b5d19808403508580N.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe 903a7afc7226ef8b5d19808403508580N.exe File opened for modification C:\Windows\apppatch\svchost.exe 903a7afc7226ef8b5d19808403508580N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 903a7afc7226ef8b5d19808403508580N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3148 903a7afc7226ef8b5d19808403508580N.exe 3148 903a7afc7226ef8b5d19808403508580N.exe 3148 903a7afc7226ef8b5d19808403508580N.exe 3148 903a7afc7226ef8b5d19808403508580N.exe 3148 903a7afc7226ef8b5d19808403508580N.exe 3148 903a7afc7226ef8b5d19808403508580N.exe 3148 903a7afc7226ef8b5d19808403508580N.exe 3148 903a7afc7226ef8b5d19808403508580N.exe 4556 svchost.exe 4556 svchost.exe 4556 svchost.exe 4556 svchost.exe 4556 svchost.exe 4556 svchost.exe 4556 svchost.exe 4556 svchost.exe 4556 svchost.exe 4556 svchost.exe 4556 svchost.exe 4556 svchost.exe 4556 svchost.exe 4556 svchost.exe 4556 svchost.exe 4556 svchost.exe 4556 svchost.exe 4556 svchost.exe 4556 svchost.exe 4556 svchost.exe 4556 svchost.exe 4556 svchost.exe 4556 svchost.exe 4556 svchost.exe 4556 svchost.exe 4556 svchost.exe 4556 svchost.exe 4556 svchost.exe 4556 svchost.exe 4556 svchost.exe 4556 svchost.exe 4556 svchost.exe 4556 svchost.exe 4556 svchost.exe 4556 svchost.exe 4556 svchost.exe 4556 svchost.exe 4556 svchost.exe 4556 svchost.exe 4556 svchost.exe 4556 svchost.exe 4556 svchost.exe 4556 svchost.exe 4556 svchost.exe 4556 svchost.exe 4556 svchost.exe 4556 svchost.exe 4556 svchost.exe 4556 svchost.exe 4556 svchost.exe 4556 svchost.exe 4556 svchost.exe 4556 svchost.exe 4556 svchost.exe 4556 svchost.exe 4556 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3148 903a7afc7226ef8b5d19808403508580N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3148 wrote to memory of 4556 3148 903a7afc7226ef8b5d19808403508580N.exe 84 PID 3148 wrote to memory of 4556 3148 903a7afc7226ef8b5d19808403508580N.exe 84 PID 3148 wrote to memory of 4556 3148 903a7afc7226ef8b5d19808403508580N.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\903a7afc7226ef8b5d19808403508580N.exe"C:\Users\Admin\AppData\Local\Temp\903a7afc7226ef8b5d19808403508580N.exe"1⤵
- Modifies WinLogon
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:3148 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4556
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168B
MD5d57e3a550060f85d44a175139ea23021
SHA12c5cb3428a322c9709a34d04dd86fe7628f8f0a6
SHA25643edf068d34276e8ade4113d4d7207de19fc98a2ae1c07298e593edae2a8774c
SHA5120364fe6a010fce7a3f4a6344c84468c64b20fd131f3160fc649db78f1075ba52d8a1c4496e50dbe27c357e01ee52e94cdcda8f7927cba28d5f2f45b9da690063
-
Filesize
593B
MD53b03d93d3487806337b5c6443ce7a62d
SHA193a7a790bb6348606cbdaf5daeaaf4ea8cf731d0
SHA2567392749832c70fcfc2d440d7afc2f880000dd564930d95d634eb1199fa15de30
SHA512770977beaeedafc5c98d0c32edc8c6c850f05e9f363bc9997fa73991646b02e5d40ceed0017b06caeab0db86423844bc4b0a9f0df2d8239230e423a7bfbd4a88
-
Filesize
593B
MD5926512864979bc27cf187f1de3f57aff
SHA1acdeb9d6187932613c7fa08eaf28f0cd8116f4b5
SHA256b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f
SHA512f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b
-
Filesize
41KB
MD5b1f415d8ccf383905d40748e9aa9b587
SHA10469143d2ebe2bfb0bca86640e52292dc021deca
SHA256776603500bfb4e0ede82c67f7966fa628f226779f097e6e4bd5413b5c01c292c
SHA51217096d28a494d36aff4e4649d685cebfb3981561fb88d89e6a5ed430e5fc067be3d820a74abdf04ff7223470a548317f817721444611d15e6f2add0fb95c55e8
-
Filesize
355KB
MD561a3536baf46636cd547b7077a734261
SHA1e3bc3b13fd3bb9d54b543005524d62bbfb2c8b13
SHA2564253e18e76f919f72632a6c54f7ef4bcd3a5d703315b0524e87a5b53fd238ea7
SHA51248a1700937f34ddf9283574001b2d184c8a473a120e28cd409a59ac3ac085fbd37090e5d3a89a2b1e6d5e815ad4a12466c23986dd8c28d88bf68726490fdaf01