Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
218s -
max time network
246s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/12/2023, 22:37
Static task
static1
Behavioral task
behavioral1
Sample
1641e1409f7b6d48073434e6339c6efa.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1641e1409f7b6d48073434e6339c6efa.exe
Resource
win10v2004-20231215-en
General
-
Target
1641e1409f7b6d48073434e6339c6efa.exe
-
Size
208KB
-
MD5
1641e1409f7b6d48073434e6339c6efa
-
SHA1
4ca96ed444c10aee0269f134353f7714626e56f4
-
SHA256
b133a914b8f620889a023dea94aa2ae8880edd7a33502a99718ccf67b3a6bcec
-
SHA512
7edd7205419f33f484c6ed9a582ad5d26580837a9b831613b3cb30ec9bc36db07a6b24e3a1a0b9d01765d8854277be5ff00eafd634892655c925512bca373ec0
-
SSDEEP
6144:tRRy5nnu5W98TFK/fObT/bGiA14DFsqmVrWpMY9Fpp:t/Qu5W98TFK/fObT/bGidIrW39Fpp
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 1641e1409f7b6d48073434e6339c6efa.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" tskis.exe -
Executes dropped EXE 1 IoCs
pid Process 2024 tskis.exe -
Loads dropped DLL 2 IoCs
pid Process 2544 1641e1409f7b6d48073434e6339c6efa.exe 2544 1641e1409f7b6d48073434e6339c6efa.exe -
Adds Run key to start application 2 TTPs 51 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\tskis = "C:\\Users\\Admin\\tskis.exe /N" tskis.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\tskis = "C:\\Users\\Admin\\tskis.exe /B" tskis.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\tskis = "C:\\Users\\Admin\\tskis.exe /e" tskis.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\tskis = "C:\\Users\\Admin\\tskis.exe /Q" tskis.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\tskis = "C:\\Users\\Admin\\tskis.exe /y" tskis.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\tskis = "C:\\Users\\Admin\\tskis.exe /k" tskis.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\tskis = "C:\\Users\\Admin\\tskis.exe /x" tskis.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\tskis = "C:\\Users\\Admin\\tskis.exe /t" tskis.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\tskis = "C:\\Users\\Admin\\tskis.exe /W" tskis.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\tskis = "C:\\Users\\Admin\\tskis.exe /a" tskis.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\tskis = "C:\\Users\\Admin\\tskis.exe /X" tskis.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\tskis = "C:\\Users\\Admin\\tskis.exe /V" 1641e1409f7b6d48073434e6339c6efa.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\tskis = "C:\\Users\\Admin\\tskis.exe /p" tskis.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\tskis = "C:\\Users\\Admin\\tskis.exe /i" tskis.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\tskis = "C:\\Users\\Admin\\tskis.exe /z" tskis.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\tskis = "C:\\Users\\Admin\\tskis.exe /h" tskis.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\tskis = "C:\\Users\\Admin\\tskis.exe /U" tskis.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\tskis = "C:\\Users\\Admin\\tskis.exe /q" tskis.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\tskis = "C:\\Users\\Admin\\tskis.exe /T" tskis.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\tskis = "C:\\Users\\Admin\\tskis.exe /j" tskis.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\tskis = "C:\\Users\\Admin\\tskis.exe /b" tskis.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\tskis = "C:\\Users\\Admin\\tskis.exe /V" tskis.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\tskis = "C:\\Users\\Admin\\tskis.exe /M" tskis.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\tskis = "C:\\Users\\Admin\\tskis.exe /l" tskis.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\tskis = "C:\\Users\\Admin\\tskis.exe /g" tskis.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\tskis = "C:\\Users\\Admin\\tskis.exe /n" tskis.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\tskis = "C:\\Users\\Admin\\tskis.exe /v" tskis.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\tskis = "C:\\Users\\Admin\\tskis.exe /c" tskis.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\tskis = "C:\\Users\\Admin\\tskis.exe /P" tskis.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\tskis = "C:\\Users\\Admin\\tskis.exe /m" tskis.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\tskis = "C:\\Users\\Admin\\tskis.exe /D" tskis.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\tskis = "C:\\Users\\Admin\\tskis.exe /C" tskis.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\tskis = "C:\\Users\\Admin\\tskis.exe /Y" tskis.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\tskis = "C:\\Users\\Admin\\tskis.exe /I" tskis.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\tskis = "C:\\Users\\Admin\\tskis.exe /A" tskis.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\tskis = "C:\\Users\\Admin\\tskis.exe /R" tskis.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\tskis = "C:\\Users\\Admin\\tskis.exe /f" tskis.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\tskis = "C:\\Users\\Admin\\tskis.exe /r" tskis.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\tskis = "C:\\Users\\Admin\\tskis.exe /O" tskis.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\tskis = "C:\\Users\\Admin\\tskis.exe /F" tskis.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\tskis = "C:\\Users\\Admin\\tskis.exe /K" tskis.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\tskis = "C:\\Users\\Admin\\tskis.exe /d" tskis.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\tskis = "C:\\Users\\Admin\\tskis.exe /L" tskis.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\tskis = "C:\\Users\\Admin\\tskis.exe /s" tskis.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\tskis = "C:\\Users\\Admin\\tskis.exe /G" tskis.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\tskis = "C:\\Users\\Admin\\tskis.exe /Z" tskis.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\tskis = "C:\\Users\\Admin\\tskis.exe /E" tskis.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\tskis = "C:\\Users\\Admin\\tskis.exe /J" tskis.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\tskis = "C:\\Users\\Admin\\tskis.exe /u" tskis.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\tskis = "C:\\Users\\Admin\\tskis.exe /S" tskis.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\tskis = "C:\\Users\\Admin\\tskis.exe /w" tskis.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2544 1641e1409f7b6d48073434e6339c6efa.exe 2024 tskis.exe 2024 tskis.exe 2024 tskis.exe 2024 tskis.exe 2024 tskis.exe 2024 tskis.exe 2024 tskis.exe 2024 tskis.exe 2024 tskis.exe 2024 tskis.exe 2024 tskis.exe 2024 tskis.exe 2024 tskis.exe 2024 tskis.exe 2024 tskis.exe 2024 tskis.exe 2024 tskis.exe 2024 tskis.exe 2024 tskis.exe 2024 tskis.exe 2024 tskis.exe 2024 tskis.exe 2024 tskis.exe 2024 tskis.exe 2024 tskis.exe 2024 tskis.exe 2024 tskis.exe 2024 tskis.exe 2024 tskis.exe 2024 tskis.exe 2024 tskis.exe 2024 tskis.exe 2024 tskis.exe 2024 tskis.exe 2024 tskis.exe 2024 tskis.exe 2024 tskis.exe 2024 tskis.exe 2024 tskis.exe 2024 tskis.exe 2024 tskis.exe 2024 tskis.exe 2024 tskis.exe 2024 tskis.exe 2024 tskis.exe 2024 tskis.exe 2024 tskis.exe 2024 tskis.exe 2024 tskis.exe 2024 tskis.exe 2024 tskis.exe 2024 tskis.exe 2024 tskis.exe 2024 tskis.exe 2024 tskis.exe 2024 tskis.exe 2024 tskis.exe 2024 tskis.exe 2024 tskis.exe 2024 tskis.exe 2024 tskis.exe 2024 tskis.exe 2024 tskis.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2544 1641e1409f7b6d48073434e6339c6efa.exe 2024 tskis.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2544 wrote to memory of 2024 2544 1641e1409f7b6d48073434e6339c6efa.exe 29 PID 2544 wrote to memory of 2024 2544 1641e1409f7b6d48073434e6339c6efa.exe 29 PID 2544 wrote to memory of 2024 2544 1641e1409f7b6d48073434e6339c6efa.exe 29 PID 2544 wrote to memory of 2024 2544 1641e1409f7b6d48073434e6339c6efa.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\1641e1409f7b6d48073434e6339c6efa.exe"C:\Users\Admin\AppData\Local\Temp\1641e1409f7b6d48073434e6339c6efa.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Users\Admin\tskis.exe"C:\Users\Admin\tskis.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2024
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
208KB
MD56a7c970ad168201153a3997ecc554831
SHA197a3ffbdc3285a97ad3daf5c8760e414c6bac9ba
SHA256fa1a82be21d58b5fec2ca11d4a800ee10dcd412291f146dcfdf93ceea2229708
SHA5124c4cecce4e0109278f9f1f4f029b508a6c9c94cd48ac45927d1a5ebd177e2c20857c5cca4c8fffd73dbf43e249de50ca9f749db679cc283d4a97fc7131bf273e