Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/09/2024, 09:16

General

  • Target

    8658fe4c7b2264420a8f2538baa66ca0N.exe

  • Size

    150KB

  • MD5

    8658fe4c7b2264420a8f2538baa66ca0

  • SHA1

    b59922464557a7b3ffdb962568be27e083d17d40

  • SHA256

    27bbcb849c6fd672625123581a661e62ee17465be0e42757308a859362707e16

  • SHA512

    fa1155c632a76a257d5ad866fd66ff2c7f49d04792daebc457d30a4226c94887bf7b5efe05f13a77b19fdbd47302178ce9c7e071418bcd9f9772a40ac8107077

  • SSDEEP

    3072:buuczBGY3j4nLXhfRf70MCRRb85TFcMo7xQGHMOfAVTzXW:blcEY3iLXXgvRG5TFZoFQaMrHX

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8658fe4c7b2264420a8f2538baa66ca0N.exe
    "C:\Users\Admin\AppData\Local\Temp\8658fe4c7b2264420a8f2538baa66ca0N.exe"
    1⤵
    • Modifies WinLogon
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:3092
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Modifies WinLogon
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2776
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=1028,i,12470628711992022444,7767535593390851522,262144 --variations-seed-version --mojo-platform-channel-handle=4064 /prefetch:8
    1⤵
      PID:436

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\apppatch\svchost.exe

      Filesize

      150KB

      MD5

      9aaa0b3ab5186299e5903de92d697960

      SHA1

      fb15eab2635b3f2e23d95770dfba489fd1cae510

      SHA256

      c523097a9cbcf428469c2cf9f02cfb3e5562a79db97e844ed246ca57e5f4567c

      SHA512

      78847866ea2f96814ed7201688dfdcd8ad87c0d3b04679e45934a535e42286d934a718a60b021aa8bee5b18c97e6ba5e73d1c616f9e24670def1ec52d8602a5a

    • memory/2776-16-0x0000000000400000-0x000000000044E000-memory.dmp

      Filesize

      312KB

    • memory/2776-19-0x0000000000400000-0x000000000044E000-memory.dmp

      Filesize

      312KB

    • memory/2776-27-0x0000000002B00000-0x0000000002B4A000-memory.dmp

      Filesize

      296KB

    • memory/2776-12-0x0000000000400000-0x000000000044E000-memory.dmp

      Filesize

      312KB

    • memory/2776-17-0x0000000000400000-0x000000000044E000-memory.dmp

      Filesize

      312KB

    • memory/2776-22-0x0000000002B00000-0x0000000002B4A000-memory.dmp

      Filesize

      296KB

    • memory/2776-24-0x0000000002B00000-0x0000000002B4A000-memory.dmp

      Filesize

      296KB

    • memory/2776-18-0x0000000002740000-0x0000000002786000-memory.dmp

      Filesize

      280KB

    • memory/2776-20-0x0000000002B00000-0x0000000002B4A000-memory.dmp

      Filesize

      296KB

    • memory/3092-13-0x0000000000400000-0x000000000044E000-memory.dmp

      Filesize

      312KB

    • memory/3092-0-0x0000000000400000-0x000000000044E000-memory.dmp

      Filesize

      312KB

    • memory/3092-14-0x00000000021A0000-0x00000000021D9000-memory.dmp

      Filesize

      228KB

    • memory/3092-2-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/3092-15-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/3092-1-0x00000000021A0000-0x00000000021D9000-memory.dmp

      Filesize

      228KB