Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
16s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/09/2024, 04:44
Behavioral task
behavioral1
Sample
026bddb8a2649f9a296d58fa64958130N.exe
Resource
win7-20240903-en
General
-
Target
026bddb8a2649f9a296d58fa64958130N.exe
-
Size
38KB
-
MD5
026bddb8a2649f9a296d58fa64958130
-
SHA1
72a05ce5a022fd36c367b295d4cc60c532037bde
-
SHA256
da0fe98ee2da7e9c071aba8565fe4cb915a45cdaf27dffdcf1f604db8fa5e85c
-
SHA512
e62a80a9cade95eb05d8a57500102e2ac7cb8bfd128d93df6793506f181881323dff38ba1e20a76cc145ba9942454f2a26d372248c73c38c10d5bbe4bdca4044
-
SSDEEP
768:Nzj1JegVa3Gry+uELEmITCs/NUZ6nZdYbCLECkrQoP9fmF2f1cOf:NWQa2TLEmITcoQxfllfmS1cOf
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2384 smss.exe -
Loads dropped DLL 2 IoCs
pid Process 2436 026bddb8a2649f9a296d58fa64958130N.exe 2436 026bddb8a2649f9a296d58fa64958130N.exe -
resource yara_rule behavioral1/memory/2436-0-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/files/0x00080000000173b2-4.dat upx behavioral1/memory/2384-17-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/2436-19-0x0000000000400000-0x0000000000422000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\1230\smss.exe 026bddb8a2649f9a296d58fa64958130N.exe File opened for modification C:\Windows\SysWOW64\1230\smss.exe smss.exe File opened for modification C:\Windows\SysWOW64\Service.exe smss.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2276 sc.exe 2092 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language smss.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 026bddb8a2649f9a296d58fa64958130N.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2436 026bddb8a2649f9a296d58fa64958130N.exe 2384 smss.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2436 wrote to memory of 2276 2436 026bddb8a2649f9a296d58fa64958130N.exe 30 PID 2436 wrote to memory of 2276 2436 026bddb8a2649f9a296d58fa64958130N.exe 30 PID 2436 wrote to memory of 2276 2436 026bddb8a2649f9a296d58fa64958130N.exe 30 PID 2436 wrote to memory of 2276 2436 026bddb8a2649f9a296d58fa64958130N.exe 30 PID 2436 wrote to memory of 2384 2436 026bddb8a2649f9a296d58fa64958130N.exe 32 PID 2436 wrote to memory of 2384 2436 026bddb8a2649f9a296d58fa64958130N.exe 32 PID 2436 wrote to memory of 2384 2436 026bddb8a2649f9a296d58fa64958130N.exe 32 PID 2436 wrote to memory of 2384 2436 026bddb8a2649f9a296d58fa64958130N.exe 32 PID 2384 wrote to memory of 2092 2384 smss.exe 33 PID 2384 wrote to memory of 2092 2384 smss.exe 33 PID 2384 wrote to memory of 2092 2384 smss.exe 33 PID 2384 wrote to memory of 2092 2384 smss.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\026bddb8a2649f9a296d58fa64958130N.exe"C:\Users\Admin\AppData\Local\Temp\026bddb8a2649f9a296d58fa64958130N.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe stop wscsvc2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2276
-
-
C:\Windows\SysWOW64\1230\smss.exeC:\Windows\system32\1230\smss.exe -d2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe stop wscsvc3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2092
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
38KB
MD5ab313cdf52a4b6d3dba3d624fe3ac51c
SHA105af7e6b32465cb3a08669582fce988783c0d34a
SHA2569a3b136438ce5005a25a190bba7a3e4a76f665f86effc60ff29d81fded2943dc
SHA512537947df71db66a2078e6976328c994715edad66a3a57ea21cde12529bef0f53249c758fc135ff816155ddd0943ea25fd60a650e142253a22a922b0f5318b9c3