Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
95s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/11/2024, 04:10
Behavioral task
behavioral1
Sample
svClient.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
svClient.exe
Resource
win10v2004-20241007-en
General
-
Target
svClient.exe
-
Size
94KB
-
MD5
2ce6f0a9681d09ad541a00b640c4a7ce
-
SHA1
e3bac43991c9571cbfc516d9c2a2dc21bb5612c8
-
SHA256
d9083880d4fc394283a1640392ddef37a72978800fe3e6cc25561369d888047a
-
SHA512
57c0dc20fe771853f6d21654bd4ce7fb27ea60ee2bccac005779e6cec347628fd0b7b995aaab661a488c6511adcecf51d42545e7c2708ccaa100fef96ca36451
-
SSDEEP
1536:nAWCI6dorHYPvgNFoOE6jEwzGi1dDE3QDAgS:nAEuorHYPvgNJEDi1dI3Sp
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dw20.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 3728 dw20.exe Token: SeBackupPrivilege 3728 dw20.exe Token: SeBackupPrivilege 3728 dw20.exe Token: SeBackupPrivilege 3728 dw20.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1848 wrote to memory of 3728 1848 svClient.exe 83 PID 1848 wrote to memory of 3728 1848 svClient.exe 83 PID 1848 wrote to memory of 3728 1848 svClient.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\svClient.exe"C:\Users\Admin\AppData\Local\Temp\svClient.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 8842⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:3728
-