Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15/09/2024, 09:16
Static task
static1
Behavioral task
behavioral1
Sample
8658fe4c7b2264420a8f2538baa66ca0N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8658fe4c7b2264420a8f2538baa66ca0N.exe
Resource
win10v2004-20240802-en
General
-
Target
8658fe4c7b2264420a8f2538baa66ca0N.exe
-
Size
150KB
-
MD5
8658fe4c7b2264420a8f2538baa66ca0
-
SHA1
b59922464557a7b3ffdb962568be27e083d17d40
-
SHA256
27bbcb849c6fd672625123581a661e62ee17465be0e42757308a859362707e16
-
SHA512
fa1155c632a76a257d5ad866fd66ff2c7f49d04792daebc457d30a4226c94887bf7b5efe05f13a77b19fdbd47302178ce9c7e071418bcd9f9772a40ac8107077
-
SSDEEP
3072:buuczBGY3j4nLXhfRf70MCRRb85TFcMo7xQGHMOfAVTzXW:blcEY3iLXXgvRG5TFZoFQaMrHX
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2324 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 2348 8658fe4c7b2264420a8f2538baa66ca0N.exe 2348 8658fe4c7b2264420a8f2538baa66ca0N.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\3be9102c = "C:\\Windows\\apppatch\\svchost.exe" 8658fe4c7b2264420a8f2538baa66ca0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\3be9102c = "C:\\Windows\\apppatch\\svchost.exe" svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe 8658fe4c7b2264420a8f2538baa66ca0N.exe File opened for modification C:\Windows\apppatch\svchost.exe 8658fe4c7b2264420a8f2538baa66ca0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8658fe4c7b2264420a8f2538baa66ca0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2348 8658fe4c7b2264420a8f2538baa66ca0N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2348 wrote to memory of 2324 2348 8658fe4c7b2264420a8f2538baa66ca0N.exe 30 PID 2348 wrote to memory of 2324 2348 8658fe4c7b2264420a8f2538baa66ca0N.exe 30 PID 2348 wrote to memory of 2324 2348 8658fe4c7b2264420a8f2538baa66ca0N.exe 30 PID 2348 wrote to memory of 2324 2348 8658fe4c7b2264420a8f2538baa66ca0N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\8658fe4c7b2264420a8f2538baa66ca0N.exe"C:\Users\Admin\AppData\Local\Temp\8658fe4c7b2264420a8f2538baa66ca0N.exe"1⤵
- Loads dropped DLL
- Modifies WinLogon
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2324
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
150KB
MD5a2142a8455e17cec604859d5b7ed6ac0
SHA1fc96a01fa81774e8a97218220444122df158969f
SHA256f5ba73f64eb2b40a3de24e0252af4da9a8e95843018a34b80901b90a59782a04
SHA5121185250473702a5dfcd33c415a4e236c182db3841f98ba2a35c721fe1698b96c39fcd3b60f55110f4b5618db028127d0025eef90c242fd98fae3c5f1c5d84ddb