Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
05/09/2024, 20:20
Static task
static1
Behavioral task
behavioral1
Sample
855c2109b17c86741a2efbb08a3ffa30N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
855c2109b17c86741a2efbb08a3ffa30N.exe
Resource
win10v2004-20240802-en
General
-
Target
855c2109b17c86741a2efbb08a3ffa30N.exe
-
Size
349KB
-
MD5
855c2109b17c86741a2efbb08a3ffa30
-
SHA1
6519929da8262243725819873356ed3f22434f5b
-
SHA256
6052c88fc0e8c7e0f576331f0fd54fe022bf7ddf623bcfd08f6724f68b5b568e
-
SHA512
45c6467f92052c0227b7e0f81987624212f0acf59185f4282e8f6a1b6d36a7924fef96dab0d869f1f9e440a9348bf528e9a53a7752972100d34460856bf0e774
-
SSDEEP
6144:zVTQqSiexKAK4y6UvcZSeNH49qQQOH+ym4LLIoTqHSMaxzL:lSiOK4yjNQOGzoTCSMG
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2796 svchost.exe -
Loads dropped DLL 5 IoCs
pid Process 1628 855c2109b17c86741a2efbb08a3ffa30N.exe 1628 855c2109b17c86741a2efbb08a3ffa30N.exe 2552 WerFault.exe 2552 WerFault.exe 2552 WerFault.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\4a48e10e = "C:\\Windows\\apppatch\\svchost.exe" 855c2109b17c86741a2efbb08a3ffa30N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\4a48e10e = "C:\\Windows\\apppatch\\svchost.exe" svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe 855c2109b17c86741a2efbb08a3ffa30N.exe File opened for modification C:\Windows\apppatch\svchost.exe 855c2109b17c86741a2efbb08a3ffa30N.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2552 2796 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 855c2109b17c86741a2efbb08a3ffa30N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2796 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1628 855c2109b17c86741a2efbb08a3ffa30N.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1628 wrote to memory of 2796 1628 855c2109b17c86741a2efbb08a3ffa30N.exe 30 PID 1628 wrote to memory of 2796 1628 855c2109b17c86741a2efbb08a3ffa30N.exe 30 PID 1628 wrote to memory of 2796 1628 855c2109b17c86741a2efbb08a3ffa30N.exe 30 PID 1628 wrote to memory of 2796 1628 855c2109b17c86741a2efbb08a3ffa30N.exe 30 PID 2796 wrote to memory of 2552 2796 svchost.exe 31 PID 2796 wrote to memory of 2552 2796 svchost.exe 31 PID 2796 wrote to memory of 2552 2796 svchost.exe 31 PID 2796 wrote to memory of 2552 2796 svchost.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\855c2109b17c86741a2efbb08a3ffa30N.exe"C:\Users\Admin\AppData\Local\Temp\855c2109b17c86741a2efbb08a3ffa30N.exe"1⤵
- Loads dropped DLL
- Modifies WinLogon
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2796 -s 5203⤵
- Loads dropped DLL
- Program crash
PID:2552
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
349KB
MD5e8a6782f84da7b07803921bc8aaba373
SHA17e840e99e932bee112751cc3409a4611760c13cb
SHA256c6a2b430413b448b6d3c502ea1ae87889bfe9d8505b16342849995566da7387e
SHA5122b92a641b39efb31173bf55c775e3448cb3f15e1b8e9d995cda029097e8c32b7b5f5e5a4fc2207b7591ce4efd35f2ece980bc2607b2bb84c7fd469a5e7f86564