Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
15/09/2024, 09:16
Static task
static1
Behavioral task
behavioral1
Sample
8658fe4c7b2264420a8f2538baa66ca0N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8658fe4c7b2264420a8f2538baa66ca0N.exe
Resource
win10v2004-20240802-en
General
-
Target
8658fe4c7b2264420a8f2538baa66ca0N.exe
-
Size
150KB
-
MD5
8658fe4c7b2264420a8f2538baa66ca0
-
SHA1
b59922464557a7b3ffdb962568be27e083d17d40
-
SHA256
27bbcb849c6fd672625123581a661e62ee17465be0e42757308a859362707e16
-
SHA512
fa1155c632a76a257d5ad866fd66ff2c7f49d04792daebc457d30a4226c94887bf7b5efe05f13a77b19fdbd47302178ce9c7e071418bcd9f9772a40ac8107077
-
SSDEEP
3072:buuczBGY3j4nLXhfRf70MCRRb85TFcMo7xQGHMOfAVTzXW:blcEY3iLXXgvRG5TFZoFQaMrHX
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2776 svchost.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\400a3ec7 = "C:\\Windows\\apppatch\\svchost.exe" 8658fe4c7b2264420a8f2538baa66ca0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\400a3ec7 = "C:\\Windows\\apppatch\\svchost.exe" svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe 8658fe4c7b2264420a8f2538baa66ca0N.exe File opened for modification C:\Windows\apppatch\svchost.exe 8658fe4c7b2264420a8f2538baa66ca0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8658fe4c7b2264420a8f2538baa66ca0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2776 svchost.exe 2776 svchost.exe 2776 svchost.exe 2776 svchost.exe 2776 svchost.exe 2776 svchost.exe 2776 svchost.exe 2776 svchost.exe 2776 svchost.exe 2776 svchost.exe 2776 svchost.exe 2776 svchost.exe 2776 svchost.exe 2776 svchost.exe 2776 svchost.exe 2776 svchost.exe 2776 svchost.exe 2776 svchost.exe 2776 svchost.exe 2776 svchost.exe 2776 svchost.exe 2776 svchost.exe 2776 svchost.exe 2776 svchost.exe 2776 svchost.exe 2776 svchost.exe 2776 svchost.exe 2776 svchost.exe 2776 svchost.exe 2776 svchost.exe 2776 svchost.exe 2776 svchost.exe 2776 svchost.exe 2776 svchost.exe 2776 svchost.exe 2776 svchost.exe 2776 svchost.exe 2776 svchost.exe 2776 svchost.exe 2776 svchost.exe 2776 svchost.exe 2776 svchost.exe 2776 svchost.exe 2776 svchost.exe 2776 svchost.exe 2776 svchost.exe 2776 svchost.exe 2776 svchost.exe 2776 svchost.exe 2776 svchost.exe 2776 svchost.exe 2776 svchost.exe 2776 svchost.exe 2776 svchost.exe 2776 svchost.exe 2776 svchost.exe 2776 svchost.exe 2776 svchost.exe 2776 svchost.exe 2776 svchost.exe 2776 svchost.exe 2776 svchost.exe 2776 svchost.exe 2776 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3092 8658fe4c7b2264420a8f2538baa66ca0N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3092 wrote to memory of 2776 3092 8658fe4c7b2264420a8f2538baa66ca0N.exe 91 PID 3092 wrote to memory of 2776 3092 8658fe4c7b2264420a8f2538baa66ca0N.exe 91 PID 3092 wrote to memory of 2776 3092 8658fe4c7b2264420a8f2538baa66ca0N.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\8658fe4c7b2264420a8f2538baa66ca0N.exe"C:\Users\Admin\AppData\Local\Temp\8658fe4c7b2264420a8f2538baa66ca0N.exe"1⤵
- Modifies WinLogon
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:3092 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=1028,i,12470628711992022444,7767535593390851522,262144 --variations-seed-version --mojo-platform-channel-handle=4064 /prefetch:81⤵PID:436
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
150KB
MD59aaa0b3ab5186299e5903de92d697960
SHA1fb15eab2635b3f2e23d95770dfba489fd1cae510
SHA256c523097a9cbcf428469c2cf9f02cfb3e5562a79db97e844ed246ca57e5f4567c
SHA51278847866ea2f96814ed7201688dfdcd8ad87c0d3b04679e45934a535e42286d934a718a60b021aa8bee5b18c97e6ba5e73d1c616f9e24670def1ec52d8602a5a