Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20/05/2024, 20:04
Behavioral task
behavioral1
Sample
003dd6fec0a0beb289d7d5ab5db1a7be0e5d817e884949cc83e37070bd813b76.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
003dd6fec0a0beb289d7d5ab5db1a7be0e5d817e884949cc83e37070bd813b76.exe
Resource
win10v2004-20240508-en
General
-
Target
003dd6fec0a0beb289d7d5ab5db1a7be0e5d817e884949cc83e37070bd813b76.exe
-
Size
69KB
-
MD5
4b2749d64840214a4436e83243e44a37
-
SHA1
a3c12a438c10a6918114ee780ff28d586d5e856e
-
SHA256
003dd6fec0a0beb289d7d5ab5db1a7be0e5d817e884949cc83e37070bd813b76
-
SHA512
15ff28f2fc3927679dfa71b3a347f4c06599616301679fe5220975c9530fdd2c2acbc92cd0d810d1f22dfefd67cbad38202a5c4e41696b40ecc1c472d1cc135d
-
SSDEEP
1536:EJrFDMRyriCY/qXfatMp4Q2V6fIMxIpLw:0F8dCY85TE6fIMSRw
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe -
Executes dropped EXE 4 IoCs
pid Process 996 explorer.exe 1216 spoolsv.exe 4200 svchost.exe 1336 spoolsv.exe -
resource yara_rule behavioral2/memory/116-0-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral2/files/0x00080000000233c7-7.dat upx behavioral2/files/0x00080000000233c9-13.dat upx behavioral2/files/0x00080000000233cb-23.dat upx behavioral2/memory/4200-25-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral2/memory/1336-36-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral2/memory/116-40-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral2/memory/1216-38-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral2/files/0x00090000000233ca-41.dat upx behavioral2/memory/996-42-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral2/memory/4200-43-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral2/memory/996-52-0x0000000000400000-0x0000000000434000-memory.dmp upx -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification \??\c:\windows\system\explorer.exe 003dd6fec0a0beb289d7d5ab5db1a7be0e5d817e884949cc83e37070bd813b76.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 116 003dd6fec0a0beb289d7d5ab5db1a7be0e5d817e884949cc83e37070bd813b76.exe 116 003dd6fec0a0beb289d7d5ab5db1a7be0e5d817e884949cc83e37070bd813b76.exe 996 explorer.exe 996 explorer.exe 996 explorer.exe 996 explorer.exe 996 explorer.exe 996 explorer.exe 996 explorer.exe 996 explorer.exe 4200 svchost.exe 4200 svchost.exe 4200 svchost.exe 4200 svchost.exe 4200 svchost.exe 996 explorer.exe 996 explorer.exe 4200 svchost.exe 996 explorer.exe 4200 svchost.exe 996 explorer.exe 4200 svchost.exe 996 explorer.exe 4200 svchost.exe 996 explorer.exe 4200 svchost.exe 996 explorer.exe 4200 svchost.exe 996 explorer.exe 4200 svchost.exe 996 explorer.exe 4200 svchost.exe 996 explorer.exe 4200 svchost.exe 996 explorer.exe 4200 svchost.exe 996 explorer.exe 4200 svchost.exe 4200 svchost.exe 996 explorer.exe 996 explorer.exe 4200 svchost.exe 996 explorer.exe 4200 svchost.exe 996 explorer.exe 4200 svchost.exe 4200 svchost.exe 996 explorer.exe 996 explorer.exe 4200 svchost.exe 4200 svchost.exe 996 explorer.exe 996 explorer.exe 4200 svchost.exe 996 explorer.exe 4200 svchost.exe 996 explorer.exe 4200 svchost.exe 996 explorer.exe 4200 svchost.exe 996 explorer.exe 4200 svchost.exe 996 explorer.exe 4200 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 996 explorer.exe 4200 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 116 003dd6fec0a0beb289d7d5ab5db1a7be0e5d817e884949cc83e37070bd813b76.exe 116 003dd6fec0a0beb289d7d5ab5db1a7be0e5d817e884949cc83e37070bd813b76.exe 996 explorer.exe 996 explorer.exe 1216 spoolsv.exe 1216 spoolsv.exe 4200 svchost.exe 4200 svchost.exe 1336 spoolsv.exe 1336 spoolsv.exe 996 explorer.exe 996 explorer.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 116 wrote to memory of 996 116 003dd6fec0a0beb289d7d5ab5db1a7be0e5d817e884949cc83e37070bd813b76.exe 82 PID 116 wrote to memory of 996 116 003dd6fec0a0beb289d7d5ab5db1a7be0e5d817e884949cc83e37070bd813b76.exe 82 PID 116 wrote to memory of 996 116 003dd6fec0a0beb289d7d5ab5db1a7be0e5d817e884949cc83e37070bd813b76.exe 82 PID 996 wrote to memory of 1216 996 explorer.exe 83 PID 996 wrote to memory of 1216 996 explorer.exe 83 PID 996 wrote to memory of 1216 996 explorer.exe 83 PID 1216 wrote to memory of 4200 1216 spoolsv.exe 84 PID 1216 wrote to memory of 4200 1216 spoolsv.exe 84 PID 1216 wrote to memory of 4200 1216 spoolsv.exe 84 PID 4200 wrote to memory of 1336 4200 svchost.exe 85 PID 4200 wrote to memory of 1336 4200 svchost.exe 85 PID 4200 wrote to memory of 1336 4200 svchost.exe 85 PID 4200 wrote to memory of 4772 4200 svchost.exe 86 PID 4200 wrote to memory of 4772 4200 svchost.exe 86 PID 4200 wrote to memory of 4772 4200 svchost.exe 86 PID 4200 wrote to memory of 2536 4200 svchost.exe 96 PID 4200 wrote to memory of 2536 4200 svchost.exe 96 PID 4200 wrote to memory of 2536 4200 svchost.exe 96 PID 4200 wrote to memory of 2208 4200 svchost.exe 98 PID 4200 wrote to memory of 2208 4200 svchost.exe 98 PID 4200 wrote to memory of 2208 4200 svchost.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\003dd6fec0a0beb289d7d5ab5db1a7be0e5d817e884949cc83e37070bd813b76.exe"C:\Users\Admin\AppData\Local\Temp\003dd6fec0a0beb289d7d5ab5db1a7be0e5d817e884949cc83e37070bd813b76.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:116 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:996 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1216 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4200 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1336
-
-
C:\Windows\SysWOW64\at.exeat 20:43 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:4772
-
-
C:\Windows\SysWOW64\at.exeat 20:44 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:2536
-
-
C:\Windows\SysWOW64\at.exeat 20:45 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:2208
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
69KB
MD5e9cbf86f2483e7b002e4092fc9bf1da4
SHA1e2d73bb6fa83a685582d651b6ee6bdf0e497ea85
SHA256fc47e525e2fefdc299276b22e64e746dfcee52f363a36f760011900430c637bf
SHA512e81b5d2c8e9b89c65ce8b94528c7f4c594d4cf1f74788e137792779c22b93d866d61b056a2d43a6d9cf8ad2580f1d3502fed733f953b8ca1a5a32275f5296cba
-
Filesize
69KB
MD53313ce16f04ff2e1531deb7aeace31d0
SHA18686a45b35da384c2d10df9a82e38746356a5acd
SHA256aaf0992f5d1e961f0fdd92f44582c24ec251e13f044e8fc1e71c02ba9a982e90
SHA512fa13c634dbfcdad50e76b14a2b9ab3b6c8d9b1f56af94b3b09dded7d19bcf85ada118c316a2a460ed7937e6efb908140cf5e66d6bacdd72e0600b11f3a900811
-
Filesize
69KB
MD52da3d97c3ec52f346fbcf3b9b2586779
SHA11a3a73e607f33eb74386d8bb3946f712575ad4d2
SHA2569a8408e76f7ba7356515739140cf384144fd229e117756ec631e4a88ec361adc
SHA512524bd041bc977ac2ee75cd9923f27b5ab2655370232b15f0cf927156aa164fabd6a2c1dd1d769bb9d7e43e317bc2c6df28111dd754507565b28c653191dd763d
-
Filesize
70KB
MD57da7dde3b1bdf3c36f5c3a8cd2a5484a
SHA18801b763d4cc6c70e3e9766b4e12730150523b43
SHA2564f4ec9aa9548763da1ac509e7cb4409fdb5597520c92d6761709f472b1734dcb
SHA512b6258cc2393b7d7ad1f1d3d692b7b32169105ee804b7938416219010e095ed78ab821dfa4ee5c8327eca73cbedd3bfb3e854e5719e85a02dbbfd53a1a32d410f