Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
16/04/2024, 02:58
Static task
static1
Behavioral task
behavioral1
Sample
e530feb69c9a3fb9ad68ba3a9da6a4bbdb6e530e95b6a50b87cd6ca39ec61fb3.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e530feb69c9a3fb9ad68ba3a9da6a4bbdb6e530e95b6a50b87cd6ca39ec61fb3.exe
Resource
win10v2004-20240412-en
General
-
Target
e530feb69c9a3fb9ad68ba3a9da6a4bbdb6e530e95b6a50b87cd6ca39ec61fb3.exe
-
Size
206KB
-
MD5
23b8389fd7dac23be82bc5943fd1093a
-
SHA1
b58b4eb52b3781814d75efe07c3a940a36beab5c
-
SHA256
e530feb69c9a3fb9ad68ba3a9da6a4bbdb6e530e95b6a50b87cd6ca39ec61fb3
-
SHA512
791ce1a30dfa36c1b5ecb3b7f1df3bccaff675b240fc8bdaa42925fb46f9023932611323e4916a88511264b45b07cf8e8ff31c7954e5a49f61aaee8a3f2ba978
-
SSDEEP
1536:/fsEqouTRcG/Mzvgf7xEuvnXNTRdUzwTekUOisZ1yDDajtXbJdVx:/VqoCl/YgjxEufVU0TbTyDDalbVx
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-553605503-2331009851-2137262461-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-553605503-2331009851-2137262461-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 4924 explorer.exe 4548 spoolsv.exe 3084 svchost.exe 3884 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\themes\explorer.exe e530feb69c9a3fb9ad68ba3a9da6a4bbdb6e530e95b6a50b87cd6ca39ec61fb3.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3936 e530feb69c9a3fb9ad68ba3a9da6a4bbdb6e530e95b6a50b87cd6ca39ec61fb3.exe 3936 e530feb69c9a3fb9ad68ba3a9da6a4bbdb6e530e95b6a50b87cd6ca39ec61fb3.exe 3936 e530feb69c9a3fb9ad68ba3a9da6a4bbdb6e530e95b6a50b87cd6ca39ec61fb3.exe 3936 e530feb69c9a3fb9ad68ba3a9da6a4bbdb6e530e95b6a50b87cd6ca39ec61fb3.exe 3936 e530feb69c9a3fb9ad68ba3a9da6a4bbdb6e530e95b6a50b87cd6ca39ec61fb3.exe 3936 e530feb69c9a3fb9ad68ba3a9da6a4bbdb6e530e95b6a50b87cd6ca39ec61fb3.exe 3936 e530feb69c9a3fb9ad68ba3a9da6a4bbdb6e530e95b6a50b87cd6ca39ec61fb3.exe 3936 e530feb69c9a3fb9ad68ba3a9da6a4bbdb6e530e95b6a50b87cd6ca39ec61fb3.exe 3936 e530feb69c9a3fb9ad68ba3a9da6a4bbdb6e530e95b6a50b87cd6ca39ec61fb3.exe 3936 e530feb69c9a3fb9ad68ba3a9da6a4bbdb6e530e95b6a50b87cd6ca39ec61fb3.exe 3936 e530feb69c9a3fb9ad68ba3a9da6a4bbdb6e530e95b6a50b87cd6ca39ec61fb3.exe 3936 e530feb69c9a3fb9ad68ba3a9da6a4bbdb6e530e95b6a50b87cd6ca39ec61fb3.exe 3936 e530feb69c9a3fb9ad68ba3a9da6a4bbdb6e530e95b6a50b87cd6ca39ec61fb3.exe 3936 e530feb69c9a3fb9ad68ba3a9da6a4bbdb6e530e95b6a50b87cd6ca39ec61fb3.exe 3936 e530feb69c9a3fb9ad68ba3a9da6a4bbdb6e530e95b6a50b87cd6ca39ec61fb3.exe 3936 e530feb69c9a3fb9ad68ba3a9da6a4bbdb6e530e95b6a50b87cd6ca39ec61fb3.exe 3936 e530feb69c9a3fb9ad68ba3a9da6a4bbdb6e530e95b6a50b87cd6ca39ec61fb3.exe 3936 e530feb69c9a3fb9ad68ba3a9da6a4bbdb6e530e95b6a50b87cd6ca39ec61fb3.exe 3936 e530feb69c9a3fb9ad68ba3a9da6a4bbdb6e530e95b6a50b87cd6ca39ec61fb3.exe 3936 e530feb69c9a3fb9ad68ba3a9da6a4bbdb6e530e95b6a50b87cd6ca39ec61fb3.exe 3936 e530feb69c9a3fb9ad68ba3a9da6a4bbdb6e530e95b6a50b87cd6ca39ec61fb3.exe 3936 e530feb69c9a3fb9ad68ba3a9da6a4bbdb6e530e95b6a50b87cd6ca39ec61fb3.exe 3936 e530feb69c9a3fb9ad68ba3a9da6a4bbdb6e530e95b6a50b87cd6ca39ec61fb3.exe 3936 e530feb69c9a3fb9ad68ba3a9da6a4bbdb6e530e95b6a50b87cd6ca39ec61fb3.exe 3936 e530feb69c9a3fb9ad68ba3a9da6a4bbdb6e530e95b6a50b87cd6ca39ec61fb3.exe 3936 e530feb69c9a3fb9ad68ba3a9da6a4bbdb6e530e95b6a50b87cd6ca39ec61fb3.exe 3936 e530feb69c9a3fb9ad68ba3a9da6a4bbdb6e530e95b6a50b87cd6ca39ec61fb3.exe 3936 e530feb69c9a3fb9ad68ba3a9da6a4bbdb6e530e95b6a50b87cd6ca39ec61fb3.exe 3936 e530feb69c9a3fb9ad68ba3a9da6a4bbdb6e530e95b6a50b87cd6ca39ec61fb3.exe 3936 e530feb69c9a3fb9ad68ba3a9da6a4bbdb6e530e95b6a50b87cd6ca39ec61fb3.exe 3936 e530feb69c9a3fb9ad68ba3a9da6a4bbdb6e530e95b6a50b87cd6ca39ec61fb3.exe 3936 e530feb69c9a3fb9ad68ba3a9da6a4bbdb6e530e95b6a50b87cd6ca39ec61fb3.exe 3936 e530feb69c9a3fb9ad68ba3a9da6a4bbdb6e530e95b6a50b87cd6ca39ec61fb3.exe 3936 e530feb69c9a3fb9ad68ba3a9da6a4bbdb6e530e95b6a50b87cd6ca39ec61fb3.exe 4924 explorer.exe 4924 explorer.exe 4924 explorer.exe 4924 explorer.exe 4924 explorer.exe 4924 explorer.exe 4924 explorer.exe 4924 explorer.exe 4924 explorer.exe 4924 explorer.exe 4924 explorer.exe 4924 explorer.exe 4924 explorer.exe 4924 explorer.exe 4924 explorer.exe 4924 explorer.exe 4924 explorer.exe 4924 explorer.exe 4924 explorer.exe 4924 explorer.exe 4924 explorer.exe 4924 explorer.exe 4924 explorer.exe 4924 explorer.exe 4924 explorer.exe 4924 explorer.exe 4924 explorer.exe 4924 explorer.exe 4924 explorer.exe 4924 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 4924 explorer.exe 3084 svchost.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 3936 e530feb69c9a3fb9ad68ba3a9da6a4bbdb6e530e95b6a50b87cd6ca39ec61fb3.exe 3936 e530feb69c9a3fb9ad68ba3a9da6a4bbdb6e530e95b6a50b87cd6ca39ec61fb3.exe 4924 explorer.exe 4924 explorer.exe 4548 spoolsv.exe 4548 spoolsv.exe 3084 svchost.exe 3084 svchost.exe 3884 spoolsv.exe 3884 spoolsv.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3936 wrote to memory of 4924 3936 e530feb69c9a3fb9ad68ba3a9da6a4bbdb6e530e95b6a50b87cd6ca39ec61fb3.exe 86 PID 3936 wrote to memory of 4924 3936 e530feb69c9a3fb9ad68ba3a9da6a4bbdb6e530e95b6a50b87cd6ca39ec61fb3.exe 86 PID 3936 wrote to memory of 4924 3936 e530feb69c9a3fb9ad68ba3a9da6a4bbdb6e530e95b6a50b87cd6ca39ec61fb3.exe 86 PID 4924 wrote to memory of 4548 4924 explorer.exe 88 PID 4924 wrote to memory of 4548 4924 explorer.exe 88 PID 4924 wrote to memory of 4548 4924 explorer.exe 88 PID 4548 wrote to memory of 3084 4548 spoolsv.exe 90 PID 4548 wrote to memory of 3084 4548 spoolsv.exe 90 PID 4548 wrote to memory of 3084 4548 spoolsv.exe 90 PID 3084 wrote to memory of 3884 3084 svchost.exe 91 PID 3084 wrote to memory of 3884 3084 svchost.exe 91 PID 3084 wrote to memory of 3884 3084 svchost.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\e530feb69c9a3fb9ad68ba3a9da6a4bbdb6e530e95b6a50b87cd6ca39ec61fb3.exe"C:\Users\Admin\AppData\Local\Temp\e530feb69c9a3fb9ad68ba3a9da6a4bbdb6e530e95b6a50b87cd6ca39ec61fb3.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3936 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4924 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4548 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3084 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3884
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD5f87945abca215f35adb59ea93d5ebd1a
SHA140fc51183da678c6246bd75a41ae8d93aa70549d
SHA2564e5ed638f48ce13d679b072f8936d22c1c14bc16ddd5d0eb5224dd7a890ff95d
SHA51232c7b64092f99567248d792bff0f04e2f25c1e09129b830d9ef8bbdc6a0b08f68e5ca1e09d3c4bef2e551ce1f9e00f8e8b3022302922f244b73160896d2abb28
-
Filesize
206KB
MD56e864cbf42bfd1a8bb26e8348bb88e74
SHA196928a70321458fe119dd1295bc0946903aea339
SHA256c61a6328845a3cb15e8c64f53fd3ec9b5506e3c0b73620b417b9241d17e87b1c
SHA512288351f45009bd9e91ebe2f8a7111a28b55662be1f7023e7f5e10e1601157833cdfecd2b62a6821ff456bf5e1bf165462987c19bc28f0375786e2021c16afe44
-
Filesize
206KB
MD5f9a2d60a2cbb942b5d73b10df4237c8b
SHA1624867df084d3d140ab989e6bdb3a74014b75a80
SHA256d73be8e902dae653419776af18e8e45f322cf12eb30ca3d6e9c5f654f8da5368
SHA5127c1535b11c82cc83a4cbd9c7e33bf7229b9ff05d69e37e7416818abb909bcb81765c6e0d6da0c01bb4da2bf9eb752794561b8f942d860e1af042e8a1229ea76d