Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 01:05
Behavioral task
behavioral1
Sample
562ce5b8c2c4711e781c8453e836a0d0N.exe
Resource
win7-20240903-en
General
-
Target
562ce5b8c2c4711e781c8453e836a0d0N.exe
-
Size
133KB
-
MD5
562ce5b8c2c4711e781c8453e836a0d0
-
SHA1
b102d55d483c738b8ce935d85c3b8ca47b34e76c
-
SHA256
0a1c7e5386725b08208987b6e03f75dc5391259a94eab600a20ce1735d441786
-
SHA512
58b35607bd4674f92c8097f97e8c61d40d889bd40c292c0dfe930933c5d4ca79654c66a800061ea0a3d3df0f0859a3a428df2d42fc5320a38bef83d0b7c72baf
-
SSDEEP
3072:FE9j8b3ZXgKC1hX//iASOXRJzDOD26jKNmmuctD:FEebiKuX//iZOXRJ3OD26jOD
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2756 smss.exe -
Loads dropped DLL 2 IoCs
pid Process 2264 562ce5b8c2c4711e781c8453e836a0d0N.exe 2264 562ce5b8c2c4711e781c8453e836a0d0N.exe -
resource yara_rule behavioral1/memory/2264-0-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/2756-15-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/files/0x0008000000017409-9.dat upx behavioral1/memory/2264-18-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/2756-19-0x0000000000400000-0x0000000000423000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\1230\smss.exe 562ce5b8c2c4711e781c8453e836a0d0N.exe File opened for modification C:\Windows\SysWOW64\1230\smss.exe smss.exe File opened for modification C:\Windows\SysWOW64\Service.exe smss.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2780 sc.exe 2696 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 562ce5b8c2c4711e781c8453e836a0d0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language smss.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2264 562ce5b8c2c4711e781c8453e836a0d0N.exe 2756 smss.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2264 wrote to memory of 2696 2264 562ce5b8c2c4711e781c8453e836a0d0N.exe 30 PID 2264 wrote to memory of 2696 2264 562ce5b8c2c4711e781c8453e836a0d0N.exe 30 PID 2264 wrote to memory of 2696 2264 562ce5b8c2c4711e781c8453e836a0d0N.exe 30 PID 2264 wrote to memory of 2696 2264 562ce5b8c2c4711e781c8453e836a0d0N.exe 30 PID 2264 wrote to memory of 2756 2264 562ce5b8c2c4711e781c8453e836a0d0N.exe 32 PID 2264 wrote to memory of 2756 2264 562ce5b8c2c4711e781c8453e836a0d0N.exe 32 PID 2264 wrote to memory of 2756 2264 562ce5b8c2c4711e781c8453e836a0d0N.exe 32 PID 2264 wrote to memory of 2756 2264 562ce5b8c2c4711e781c8453e836a0d0N.exe 32 PID 2756 wrote to memory of 2780 2756 smss.exe 33 PID 2756 wrote to memory of 2780 2756 smss.exe 33 PID 2756 wrote to memory of 2780 2756 smss.exe 33 PID 2756 wrote to memory of 2780 2756 smss.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\562ce5b8c2c4711e781c8453e836a0d0N.exe"C:\Users\Admin\AppData\Local\Temp\562ce5b8c2c4711e781c8453e836a0d0N.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe stop wscsvc2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2696
-
-
C:\Windows\SysWOW64\1230\smss.exeC:\Windows\system32\1230\smss.exe -d2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe stop wscsvc3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2780
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
133KB
MD5a4f8d33ce85107db3d907466cafb1607
SHA15f6430ec8e5e66e510bf19ffb5530e8d43ee74e4
SHA256bf3bb58563016bd2992e1a86599cbb3d9a09a19ec5d8a5c90517df6081e63380
SHA51273a78b7190b56fdb8591ce96425f01522a8ec11da48455c07d8db0364671abee82ed6d1b8a07b879bb4d1010c018e82c1be6c25bddb452d1f43dccfbee69edd8