Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
91s -
max time network
92s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13/09/2024, 01:05
Behavioral task
behavioral1
Sample
562ce5b8c2c4711e781c8453e836a0d0N.exe
Resource
win7-20240903-en
General
-
Target
562ce5b8c2c4711e781c8453e836a0d0N.exe
-
Size
133KB
-
MD5
562ce5b8c2c4711e781c8453e836a0d0
-
SHA1
b102d55d483c738b8ce935d85c3b8ca47b34e76c
-
SHA256
0a1c7e5386725b08208987b6e03f75dc5391259a94eab600a20ce1735d441786
-
SHA512
58b35607bd4674f92c8097f97e8c61d40d889bd40c292c0dfe930933c5d4ca79654c66a800061ea0a3d3df0f0859a3a428df2d42fc5320a38bef83d0b7c72baf
-
SSDEEP
3072:FE9j8b3ZXgKC1hX//iASOXRJzDOD26jKNmmuctD:FEebiKuX//iZOXRJ3OD26jOD
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3024 smss.exe -
resource yara_rule behavioral2/memory/2596-0-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/files/0x00080000000234b9-5.dat upx behavioral2/memory/2596-10-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/3024-11-0x0000000000400000-0x0000000000423000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\1230\smss.exe smss.exe File opened for modification C:\Windows\SysWOW64\Service.exe smss.exe File opened for modification C:\Windows\SysWOW64\1230\smss.exe 562ce5b8c2c4711e781c8453e836a0d0N.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1884 sc.exe 4720 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language smss.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 562ce5b8c2c4711e781c8453e836a0d0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2596 562ce5b8c2c4711e781c8453e836a0d0N.exe 3024 smss.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2596 wrote to memory of 1884 2596 562ce5b8c2c4711e781c8453e836a0d0N.exe 86 PID 2596 wrote to memory of 1884 2596 562ce5b8c2c4711e781c8453e836a0d0N.exe 86 PID 2596 wrote to memory of 1884 2596 562ce5b8c2c4711e781c8453e836a0d0N.exe 86 PID 2596 wrote to memory of 3024 2596 562ce5b8c2c4711e781c8453e836a0d0N.exe 88 PID 2596 wrote to memory of 3024 2596 562ce5b8c2c4711e781c8453e836a0d0N.exe 88 PID 2596 wrote to memory of 3024 2596 562ce5b8c2c4711e781c8453e836a0d0N.exe 88 PID 3024 wrote to memory of 4720 3024 smss.exe 89 PID 3024 wrote to memory of 4720 3024 smss.exe 89 PID 3024 wrote to memory of 4720 3024 smss.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\562ce5b8c2c4711e781c8453e836a0d0N.exe"C:\Users\Admin\AppData\Local\Temp\562ce5b8c2c4711e781c8453e836a0d0N.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe stop wscsvc2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1884
-
-
C:\Windows\SysWOW64\1230\smss.exeC:\Windows\system32\1230\smss.exe -d2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe stop wscsvc3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4720
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
133KB
MD50ed9649e215badd01a8b7b30896f75a6
SHA1ff5d2e00add766a6c0a27d2dea0b0c1ac336ec0b
SHA2565c437f5a07dcef853f150b0be38c8631bee22a918b4258b3d91e1e307c695d68
SHA512e96439fc828b975c4df572a9382eb9ee287170e6182035876db3c13aab75f2f6427421b7f6002fa7774866ab3c277323ac2cf854cfc4851f2df1bc72071b7df2