Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/09/2024, 22:22

General

  • Target

    5f3058e1aaee894987aa6444d70a8040d8fde82eadb43b944e229d88b1b7dc77.exe

  • Size

    348KB

  • MD5

    d71e033b413d6545a7c572266070bfcc

  • SHA1

    ee9334786ef1a83b9fbce0a546fef3c205300c77

  • SHA256

    5f3058e1aaee894987aa6444d70a8040d8fde82eadb43b944e229d88b1b7dc77

  • SHA512

    3334006b31aab82b49094efeb9396ca9121dc337744c1c2fdc24b8d65208c4cfc15349ce12d66593de77d661e085ae5acff82fee1e7448cb1e657288b6481338

  • SSDEEP

    6144:E45rA5wSkJY8R/kpM3kRaWV/wEsNbqw8QlRTFiPurp+EStS3sth:SwSkB/kBubqw8vm+EKS3s

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5f3058e1aaee894987aa6444d70a8040d8fde82eadb43b944e229d88b1b7dc77.exe
    "C:\Users\Admin\AppData\Local\Temp\5f3058e1aaee894987aa6444d70a8040d8fde82eadb43b944e229d88b1b7dc77.exe"
    1⤵
    • Modifies WinLogon
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:4644
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Modifies WinLogon
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:4916

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\3HDB1LPD\35S859NS.htm

    Filesize

    167B

    MD5

    0104c301c5e02bd6148b8703d19b3a73

    SHA1

    7436e0b4b1f8c222c38069890b75fa2baf9ca620

    SHA256

    446a6087825fa73eadb045e5a2e9e2adf7df241b571228187728191d961dda1f

    SHA512

    84427b656a6234a651a6d8285c103645b861a18a6c5af4abb5cb4f3beb5a4f0df4a74603a0896c7608790fbb886dc40508e92d5709f44dca05dd46c8316d15bf

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\IFM58U6K\CBO3RV3V.htm

    Filesize

    430KB

    MD5

    85a3cd8e366e582abcd731c60640e46c

    SHA1

    d9656a9b5ed162470d22c7f4834129133c1083d6

    SHA256

    4c75b6c32c154a3b2e299f4586d340cb57cf00181f8cb63bee2f0425dccec14b

    SHA512

    f63ad83ca2e2d435b6df2cbc838436cc19efa36b48308ff52d18ebe086a1ca1608cc2c4dd80196313269587a5b1b2b5b4f546bdc0ee91f939cb4252ec9f78875

  • C:\Users\Admin\AppData\Local\Temp\9EE0.tmp

    Filesize

    430KB

    MD5

    c87ae728b7b2f8fec93da8740c6a6b55

    SHA1

    f72f2660325fc475f855d1e77acc1d08914df58c

    SHA256

    187cf689ee03715213a7f7f6e8557e7be3c26fa8b95a050ddc0114e099b7caf2

    SHA512

    4512520e5332eb21c5bd75b039e2052194992a4e8ace6388fee37c02a9633608a91e0d7e12997c844f6c310e7bb877499e14e7d9cdb334dc93a2e5ba2c7ae127

  • C:\Windows\apppatch\svchost.exe

    Filesize

    348KB

    MD5

    38839877b1fd57f168e8cb2adc5cab47

    SHA1

    9042888e35d73c382453df07be04f93bf017cdaf

    SHA256

    aea7a2d1e606a8940b20710b28c8cda21760bab8601096806c070bf0b85b6468

    SHA512

    3b570a0b6b126ce7fe0e8ca93d991f621378f8ef20f1a96084082c24643ae659a7da05d7a6257cc24456b832252ae9fca618ecb14c0534b1f8557d013b9dd058

  • memory/4644-9-0x0000000000BC0000-0x0000000000C2A000-memory.dmp

    Filesize

    424KB

  • memory/4916-51-0x00000000050F0000-0x00000000050F1000-memory.dmp

    Filesize

    4KB

  • memory/4916-45-0x0000000004C50000-0x0000000004C51000-memory.dmp

    Filesize

    4KB

  • memory/4916-61-0x0000000005130000-0x0000000005131000-memory.dmp

    Filesize

    4KB

  • memory/4916-59-0x0000000005110000-0x0000000005111000-memory.dmp

    Filesize

    4KB

  • memory/4916-58-0x0000000005120000-0x0000000005121000-memory.dmp

    Filesize

    4KB

  • memory/4916-54-0x0000000005100000-0x0000000005101000-memory.dmp

    Filesize

    4KB

  • memory/4916-52-0x00000000050E0000-0x00000000050E1000-memory.dmp

    Filesize

    4KB

  • memory/4916-16-0x00000000039D0000-0x0000000003A6F000-memory.dmp

    Filesize

    636KB

  • memory/4916-48-0x00000000050E0000-0x00000000050E1000-memory.dmp

    Filesize

    4KB

  • memory/4916-47-0x0000000004C70000-0x0000000004C71000-memory.dmp

    Filesize

    4KB

  • memory/4916-14-0x00000000039D0000-0x0000000003A6F000-memory.dmp

    Filesize

    636KB

  • memory/4916-62-0x00000000039D0000-0x0000000003A6F000-memory.dmp

    Filesize

    636KB

  • memory/4916-44-0x0000000004C60000-0x0000000004C61000-memory.dmp

    Filesize

    4KB

  • memory/4916-41-0x0000000004C50000-0x0000000004C51000-memory.dmp

    Filesize

    4KB

  • memory/4916-40-0x0000000004BC0000-0x0000000004BC1000-memory.dmp

    Filesize

    4KB

  • memory/4916-38-0x0000000004BA0000-0x0000000004BA1000-memory.dmp

    Filesize

    4KB

  • memory/4916-37-0x0000000004BB0000-0x0000000004BB1000-memory.dmp

    Filesize

    4KB

  • memory/4916-36-0x0000000004BB0000-0x0000000004BB1000-memory.dmp

    Filesize

    4KB

  • memory/4916-34-0x0000000004BA0000-0x0000000004BA1000-memory.dmp

    Filesize

    4KB

  • memory/4916-33-0x00000000039D0000-0x0000000003A6F000-memory.dmp

    Filesize

    636KB

  • memory/4916-13-0x00000000039D0000-0x0000000003A6F000-memory.dmp

    Filesize

    636KB

  • memory/4916-10-0x0000000003800000-0x0000000003890000-memory.dmp

    Filesize

    576KB