Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02/09/2024, 22:22
Static task
static1
Behavioral task
behavioral1
Sample
5f3058e1aaee894987aa6444d70a8040d8fde82eadb43b944e229d88b1b7dc77.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5f3058e1aaee894987aa6444d70a8040d8fde82eadb43b944e229d88b1b7dc77.exe
Resource
win10v2004-20240802-en
General
-
Target
5f3058e1aaee894987aa6444d70a8040d8fde82eadb43b944e229d88b1b7dc77.exe
-
Size
348KB
-
MD5
d71e033b413d6545a7c572266070bfcc
-
SHA1
ee9334786ef1a83b9fbce0a546fef3c205300c77
-
SHA256
5f3058e1aaee894987aa6444d70a8040d8fde82eadb43b944e229d88b1b7dc77
-
SHA512
3334006b31aab82b49094efeb9396ca9121dc337744c1c2fdc24b8d65208c4cfc15349ce12d66593de77d661e085ae5acff82fee1e7448cb1e657288b6481338
-
SSDEEP
6144:E45rA5wSkJY8R/kpM3kRaWV/wEsNbqw8QlRTFiPurp+EStS3sth:SwSkB/kBubqw8vm+EKS3s
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 4916 svchost.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\ae739065 = "C:\\Windows\\apppatch\\svchost.exe" 5f3058e1aaee894987aa6444d70a8040d8fde82eadb43b944e229d88b1b7dc77.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\ae739065 = "C:\\Windows\\apppatch\\svchost.exe" svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\apppatch\svchost.exe 5f3058e1aaee894987aa6444d70a8040d8fde82eadb43b944e229d88b1b7dc77.exe File created C:\Windows\apppatch\svchost.exe 5f3058e1aaee894987aa6444d70a8040d8fde82eadb43b944e229d88b1b7dc77.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5f3058e1aaee894987aa6444d70a8040d8fde82eadb43b944e229d88b1b7dc77.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4916 svchost.exe 4916 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4644 5f3058e1aaee894987aa6444d70a8040d8fde82eadb43b944e229d88b1b7dc77.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4644 wrote to memory of 4916 4644 5f3058e1aaee894987aa6444d70a8040d8fde82eadb43b944e229d88b1b7dc77.exe 84 PID 4644 wrote to memory of 4916 4644 5f3058e1aaee894987aa6444d70a8040d8fde82eadb43b944e229d88b1b7dc77.exe 84 PID 4644 wrote to memory of 4916 4644 5f3058e1aaee894987aa6444d70a8040d8fde82eadb43b944e229d88b1b7dc77.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\5f3058e1aaee894987aa6444d70a8040d8fde82eadb43b944e229d88b1b7dc77.exe"C:\Users\Admin\AppData\Local\Temp\5f3058e1aaee894987aa6444d70a8040d8fde82eadb43b944e229d88b1b7dc77.exe"1⤵
- Modifies WinLogon
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4916
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
167B
MD50104c301c5e02bd6148b8703d19b3a73
SHA17436e0b4b1f8c222c38069890b75fa2baf9ca620
SHA256446a6087825fa73eadb045e5a2e9e2adf7df241b571228187728191d961dda1f
SHA51284427b656a6234a651a6d8285c103645b861a18a6c5af4abb5cb4f3beb5a4f0df4a74603a0896c7608790fbb886dc40508e92d5709f44dca05dd46c8316d15bf
-
Filesize
430KB
MD585a3cd8e366e582abcd731c60640e46c
SHA1d9656a9b5ed162470d22c7f4834129133c1083d6
SHA2564c75b6c32c154a3b2e299f4586d340cb57cf00181f8cb63bee2f0425dccec14b
SHA512f63ad83ca2e2d435b6df2cbc838436cc19efa36b48308ff52d18ebe086a1ca1608cc2c4dd80196313269587a5b1b2b5b4f546bdc0ee91f939cb4252ec9f78875
-
Filesize
430KB
MD5c87ae728b7b2f8fec93da8740c6a6b55
SHA1f72f2660325fc475f855d1e77acc1d08914df58c
SHA256187cf689ee03715213a7f7f6e8557e7be3c26fa8b95a050ddc0114e099b7caf2
SHA5124512520e5332eb21c5bd75b039e2052194992a4e8ace6388fee37c02a9633608a91e0d7e12997c844f6c310e7bb877499e14e7d9cdb334dc93a2e5ba2c7ae127
-
Filesize
348KB
MD538839877b1fd57f168e8cb2adc5cab47
SHA19042888e35d73c382453df07be04f93bf017cdaf
SHA256aea7a2d1e606a8940b20710b28c8cda21760bab8601096806c070bf0b85b6468
SHA5123b570a0b6b126ce7fe0e8ca93d991f621378f8ef20f1a96084082c24643ae659a7da05d7a6257cc24456b832252ae9fca618ecb14c0534b1f8557d013b9dd058