Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    26/03/2024, 02:18

General

  • Target

    559ab607169f48179abd8c8b1d062d6f.exe

  • Size

    17.4MB

  • MD5

    559ab607169f48179abd8c8b1d062d6f

  • SHA1

    395c3c54d44906ed5029bc3734e02572d4127a43

  • SHA256

    0608f245309cd5555269bfb0edda181b5b249ab0426751112a51d24b66878072

  • SHA512

    9294385fa90e29353804d971cdaac6df2367cb74b79bedfe564113b437c6b920d686721871a8f510baa32812bc7d8d947ce17094c78908d6bac41582692d60ca

  • SSDEEP

    393216:zEk4gf8FgP8AxYDX1+TtIiFGuvB5IjWqn6eclz1PyOX8WjD+da/:zwbFbX71QtIZS3ILn6ecnyheD+da/

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 8 IoCs
  • Loads dropped DLL 14 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 5 IoCs
  • Detects Pyinstaller 6 IoCs
  • Creates scheduled task(s) 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 43 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\559ab607169f48179abd8c8b1d062d6f.exe
    "C:\Users\Admin\AppData\Local\Temp\559ab607169f48179abd8c8b1d062d6f.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2900
    • \??\c:\users\admin\appdata\local\temp\559ab607169f48179abd8c8b1d062d6f.exe 
      c:\users\admin\appdata\local\temp\559ab607169f48179abd8c8b1d062d6f.exe 
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2700
      • \??\c:\users\admin\appdata\local\temp\559ab607169f48179abd8c8b1d062d6f.exe 
        c:\users\admin\appdata\local\temp\559ab607169f48179abd8c8b1d062d6f.exe 
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:1588
    • C:\Windows\Resources\Themes\icsys.icn.exe
      C:\Windows\Resources\Themes\icsys.icn.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2112
      • \??\c:\windows\resources\themes\explorer.exe
        c:\windows\resources\themes\explorer.exe
        3⤵
        • Modifies visiblity of hidden/system files in Explorer
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2196
        • \??\c:\windows\resources\spoolsv.exe
          c:\windows\resources\spoolsv.exe SE
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in Windows directory
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1544
          • \??\c:\windows\resources\svchost.exe
            c:\windows\resources\svchost.exe
            5⤵
            • Modifies visiblity of hidden/system files in Explorer
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Drops file in System32 directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:1724
            • \??\c:\windows\resources\spoolsv.exe
              c:\windows\resources\spoolsv.exe PR
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              PID:2964
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 02:21 /f
              6⤵
              • Creates scheduled task(s)
              PID:368
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 02:22 /f
              6⤵
              • Creates scheduled task(s)
              PID:1776
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 02:23 /f
              6⤵
              • Creates scheduled task(s)
              PID:1364
        • C:\Windows\Explorer.exe
          C:\Windows\Explorer.exe
          4⤵
            PID:544

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\559ab607169f48179abd8c8b1d062d6f.exe 

      Filesize

      708KB

      MD5

      8355110e8cd7b8c286ff39a192a5918c

      SHA1

      608b60054d43ce40ec96bc57554b92586f00dc73

      SHA256

      edb8da555789b5aa3f70ad43819f968db49812331701990af19eb6268e89851b

      SHA512

      acd2376b7b2a2cb0e3d6146a1f0704a914b6cb5959ce74e755e2c32f105dc938661a72a3212239bf4501e3453250a619e760406105414392567c18a83d8ea8a9

    • C:\Users\Admin\AppData\Local\Temp\559ab607169f48179abd8c8b1d062d6f.exe 

      Filesize

      2.2MB

      MD5

      99ad16fc6c4ba686cba307827bbec7e9

      SHA1

      4044db4e116f6a4bfbcee57d3244e03764b2bff9

      SHA256

      d3e3927834bc4f026c47899cfe7f8b313c601e9b3aceee80307f4418888f407c

      SHA512

      b9835173d84e44c74d5e80738f6d44ec555c2bbe7fe89579a896230bc4ffa4947d0dafa17dcb5b5b8fccd716d3d02a373daa6cbfe391efdd9d85c816e2200a74

    • C:\Users\Admin\AppData\Local\Temp\_MEI27002\api-ms-win-core-file-l1-2-0.dll

      Filesize

      21KB

      MD5

      bcb8b9f6606d4094270b6d9b2ed92139

      SHA1

      bd55e985db649eadcb444857beed397362a2ba7b

      SHA256

      fa18d63a117153e2ace5400ed89b0806e96f0627d9db935906be9294a3038118

      SHA512

      869b2b38fd528b033b3ec17a4144d818e42242b83d7be48e2e6da6992111758b302f48f52e0dd76becb526a90a2b040ce143c6d4f0e009a513017f06b9a8f2b9

    • C:\Users\Admin\AppData\Local\Temp\_MEI27002\api-ms-win-core-file-l2-1-0.dll

      Filesize

      18KB

      MD5

      bfffa7117fd9b1622c66d949bac3f1d7

      SHA1

      402b7b8f8dcfd321b1d12fc85a1ee5137a5569b2

      SHA256

      1ea267a2e6284f17dd548c6f2285e19f7edb15d6e737a55391140ce5cb95225e

      SHA512

      b319cc7b436b1be165cdf6ffcab8a87fe29de78f7e0b14c8f562be160481fb5483289bd5956fdc1d8660da7a3f86d8eede35c6cc2b7c3d4c852decf4b2dcdb7f

    • C:\Users\Admin\AppData\Local\Temp\_MEI27002\python312.dll

      Filesize

      652KB

      MD5

      49cf5063c1c770de60e1c10b74f87520

      SHA1

      f4f5d1be55ac61bee0fca5015b529be40a8c22a0

      SHA256

      49438d640ef5c76b98b56d4fb8e36f51dfb3425e1142815813de6f9693327f1b

      SHA512

      ac4bf9601d19a0194384403e2857bb4b4ea741ad2aab5ccd0f128bc97eddef65b978f0a87fd5d3bb714044ada79f313aad6025b2edf57aa7a684f202f8d84b12

    • C:\Users\Admin\AppData\Local\Temp\_MEI27002\ucrtbase.dll

      Filesize

      703KB

      MD5

      e0b384303f1457b71b1587e97fdc3f9c

      SHA1

      417972d3fb812cd81107d4c1d4f6e10c6bd72db9

      SHA256

      352cba19ae2299c13a8616997907664a003bab2619b368406eea2dab8d5414fc

      SHA512

      8c9a943e95ebbd697c33efe5e13f5448e5a442ac0baf956b5123d6cfa1efa19ed83d1637599116d000067adc5f4865f60ec8218ea216ee7a4017a6f48fdd3c94

    • \??\c:\users\admin\appdata\local\temp\559ab607169f48179abd8c8b1d062d6f.exe 

      Filesize

      1.6MB

      MD5

      24bf5085ff6fafbed14fc04a2a79d10c

      SHA1

      d79a47ea05e7eb8d22e364835bc8846f482e936b

      SHA256

      1be336c35702d750ee5cd7a87610efc924408f588499345448fd56ea79d93270

      SHA512

      4b31bc935374d6c97a26708441444f77f2cfa77210950f9c17f6db5237c5458abfdfa794f3c9572b9b5585a10988fd2e33f72369f1aca8d4ee673524b42b346f

    • \Users\Admin\AppData\Local\Temp\559ab607169f48179abd8c8b1d062d6f.exe 

      Filesize

      936KB

      MD5

      03306bccbf2f8432366b48385841edc9

      SHA1

      8fb1768a3e4762a2c6cfcda8f7f5c59e20709f9d

      SHA256

      938a0ddac5336997c098df48a4679c978db4f3bc990ef043b735193bdcb67969

      SHA512

      85c890269d103ccda6c11094178a4b3ed980964c9ee338f6e5f2a381f04da1e58e832ec1adb026c72a505426b81d7b1cbe1cccf9b3e128a67a2fb743e5420b53

    • \Users\Admin\AppData\Local\Temp\559ab607169f48179abd8c8b1d062d6f.exe 

      Filesize

      62KB

      MD5

      129f576b6808426d6c52d74315736930

      SHA1

      a539bd005d3bc0ff81bc6b27d7dcc6e9140ed854

      SHA256

      6a9ac3d2a294c4cae0fc260dc99650ba7d610d76b7cec8e34d26e426ec40111d

      SHA512

      b50d3769b5310fae887d525872cc900cc558fb74065fdaa85101cad14cb7aa47b9f542ac03ab51607f84683672e882390e1c93f33963d5f52db8fe0695c1bfeb

    • \Users\Admin\AppData\Local\Temp\559ab607169f48179abd8c8b1d062d6f.exe 

      Filesize

      2.3MB

      MD5

      b56332fee18807f8fc4f79675d78af84

      SHA1

      a2d4075ad8ae4698b0b16271e523a1a1c130b77c

      SHA256

      03e3c283012f002f9ac0759eb11b89c4385ef8128768aa510aca5506ca911103

      SHA512

      118c525e0714e904699309d6fc122feac1ae7df65d865f0d20d998d423baa018207bb0243224b7d0b701d1ced1c894a97e9a476506484af3f57447169992e730

    • \Users\Admin\AppData\Local\Temp\_MEI27002\api-ms-win-core-localization-l1-2-0.dll

      Filesize

      21KB

      MD5

      20ddf543a1abe7aee845de1ec1d3aa8e

      SHA1

      0eaf5de57369e1db7f275a2fffd2d2c9e5af65bf

      SHA256

      d045a72c3e4d21165e9372f76b44ff116446c1e0c221d9cea3ab0a1134a310e8

      SHA512

      96dd48df315a7eea280ca3da0965a937a649ee77a82a1049e3d09b234439f7d927d7fb749073d7af1b23dadb643978b70dcdadc6c503fe850b512b0c9c1c78dd

    • \Users\Admin\AppData\Local\Temp\_MEI27002\api-ms-win-core-processthreads-l1-1-1.dll

      Filesize

      21KB

      MD5

      4380d56a3b83ca19ea269747c9b8302b

      SHA1

      0c4427f6f0f367d180d37fc10ecbe6534ef6469c

      SHA256

      a79c7f86462d8ab8a7b73a3f9e469514f57f9fe456326be3727352b092b6b14a

      SHA512

      1c29c335c55f5f896526c8ee0f7160211fd457c1f1b98915bcc141112f8a730e1a92391ab96688cbb7287e81e6814cc86e3b057e0a6129cbb02892108bfafaf4

    • \Users\Admin\AppData\Local\Temp\_MEI27002\api-ms-win-core-timezone-l1-1-0.dll

      Filesize

      21KB

      MD5

      2554060f26e548a089cab427990aacdf

      SHA1

      8cc7a44a16d6b0a6b7ed444e68990ff296d712fe

      SHA256

      5ab003e899270b04abc7f67be953eaccf980d5bbe80904c47f9aaf5d401bb044

      SHA512

      fd4d5a7fe4da77b0222b040dc38e53f48f7a3379f69e2199639b9f330b2e55939d89ce8361d2135182b607ad75e58ee8e34b90225143927b15dcc116b994c506

    • \Users\Admin\AppData\Local\Temp\_MEI27002\python312.dll

      Filesize

      168KB

      MD5

      809cdaff5d387541a11bfd45f00cdfca

      SHA1

      87b81b38d926ecc2da39563bf9edd953e0ab9543

      SHA256

      a38f5ee3d779d13e3a78d58ff7f7bcd2968d816c1c8c4b20cc7dd1e372563a48

      SHA512

      8ad9a2ce1dfb58c1bb691ec3f580b56662a8e33be32903547dbd350e10b9316079de793b56aa6dd386ae791b213da8975b5ff73ff8823702758a63721c45534d

    • \Users\Admin\AppData\Local\Temp\_MEI27002\ucrtbase.dll

      Filesize

      436KB

      MD5

      aaf522861bf7c7f92aec2a560c6d2a9a

      SHA1

      81a16d390cb5d18c016cbd832d87617c1e78d20e

      SHA256

      39465488d05e6f2d44e393d19b5feff5e9788e2cd128551b4f11571c7a19ab58

      SHA512

      d2bdc8c502589983a928e3c57730a448643b8e5c21b9d721dd1e06199fd870a1ea603d3adfce8e1c341453be06e78b1e53e6e0eea982d720ad97592e974003a1

    • \Windows\Resources\Themes\explorer.exe

      Filesize

      135KB

      MD5

      59d624291961ec021c1b9638d7582398

      SHA1

      5806d8112abd341f0b254f7e80b4f5c4277b7be8

      SHA256

      a91361fb45226ddc62821f6cef8c17a40ddf8ffdd9bde35d76117f4eda7d2d4e

      SHA512

      4265b28d0c7dbc4e13ef99223c9b52869a385344f15182d750e5bfb27eb2993fdae41437cfcca712ac1e7d027327004098643bd09f532a2b1601009b7679f676

    • \Windows\Resources\Themes\icsys.icn.exe

      Filesize

      135KB

      MD5

      b462ea6203adc2a9785233f9e7c809b9

      SHA1

      61ec3a76cd86ba1a292d6aae255960b1055462a8

      SHA256

      1ab5f79e5bcbfd5ccee92bed495a791467022d74da3c64dd63adf0282de2a4e2

      SHA512

      ab76003bff6220749fc6300edd24d6c17b278309c009216975be1bae145344c030511a25c80697f81269a114a8482c76e1256b98826ad38e71f6457bbbca4b03

    • \Windows\Resources\spoolsv.exe

      Filesize

      135KB

      MD5

      66dbd736bceed49eab1312ca68b688e8

      SHA1

      e03a7de2e0d89d7b163227fc11b36442e4c212ef

      SHA256

      0853aa8585c308c13b3531cc925d393db854b83b8ca86005a675e5925ee1751f

      SHA512

      05e54dbf34d340f0635b4d4fce9eba2bba55ed6a704f9671dfa4fab077e4dd8ed981cdbd2354577f9fa64447b71a7993e00e84045ef03d0a8ef143712599d5eb

    • \Windows\Resources\svchost.exe

      Filesize

      135KB

      MD5

      b1a9521c7c9355f245218bef9f9243f5

      SHA1

      26a988695d239db43a7cff0ea765908faa18a89b

      SHA256

      3491a068c8535f1f67676b6bf27ea001fe56303c8b8ef91a506c6c3ca238fa1a

      SHA512

      980c5afa69e003a271b2d9a94750f47bc960ce28e0b06ce4c82a1e8e366de5b2790ac4981a57a7cd68b21096426e30ab09e77c5f95dd453c150b36d1eeff4bb9

    • memory/1544-297-0x00000000002D0000-0x00000000002EF000-memory.dmp

      Filesize

      124KB

    • memory/1544-311-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/1724-306-0x0000000000420000-0x000000000043F000-memory.dmp

      Filesize

      124KB

    • memory/2112-278-0x0000000000340000-0x000000000035F000-memory.dmp

      Filesize

      124KB

    • memory/2112-312-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/2900-0-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/2900-313-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/2964-310-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB