Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24/05/2024, 01:36
Static task
static1
Behavioral task
behavioral1
Sample
a8cb4ee765bf0466dd9a02dd22fc5d9a65e7250a1f924de417ab283d2a0a1054.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
a8cb4ee765bf0466dd9a02dd22fc5d9a65e7250a1f924de417ab283d2a0a1054.exe
Resource
win10v2004-20240508-en
General
-
Target
a8cb4ee765bf0466dd9a02dd22fc5d9a65e7250a1f924de417ab283d2a0a1054.exe
-
Size
211KB
-
MD5
0622dbb63e1ea9a865dcc2862318646d
-
SHA1
c9bf1ea146228550404dc0f41aa51f64f0ec02ae
-
SHA256
a8cb4ee765bf0466dd9a02dd22fc5d9a65e7250a1f924de417ab283d2a0a1054
-
SHA512
4468708bd56b9e1966a809525eab9cdc56a94cafc28ab47c7f8c89650ee17beec37de32c4f6117ec5be87c8d38b46e102d7b0f71a877e8953aaa606c33a3ac59
-
SSDEEP
3072:vDEPeJlYW1ea8HKHSRUN3jjXs9Y+MiMVB/w68PEAjAfIrAvGPZz6sPJBIiFe/GcX:vSAl1IK1aY+MiMVBSeh
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\userinit.exe" userinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\userinit.exe" swchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" userinit.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" swchost.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Local\\mrsys.exe MR" swchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} swchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} swchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Local\\mrsys.exe MR" swchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} swchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} userinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Local\\mrsys.exe MR" userinit.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} swchost.exe -
Executes dropped EXE 4 IoCs
pid Process 1636 userinit.exe 1664 spoolsw.exe 3956 swchost.exe 1608 spoolsw.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\userinit = "c:\\windows\\userinit.exe RO" userinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Swchost = "c:\\windows\\swchost.exe RO" userinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\userinit = "c:\\windows\\userinit.exe RO" swchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Swchost = "c:\\windows\\swchost.exe RO" swchost.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\udsys.exe userinit.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification \??\c:\windows\swchost.exe spoolsw.exe File opened for modification \??\c:\windows\userinit.exe userinit.exe File opened for modification \??\c:\windows\swchost.exe swchost.exe File opened for modification \??\c:\windows\userinit.exe a8cb4ee765bf0466dd9a02dd22fc5d9a65e7250a1f924de417ab283d2a0a1054.exe File opened for modification \??\c:\windows\spoolsw.exe userinit.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3164 a8cb4ee765bf0466dd9a02dd22fc5d9a65e7250a1f924de417ab283d2a0a1054.exe 3164 a8cb4ee765bf0466dd9a02dd22fc5d9a65e7250a1f924de417ab283d2a0a1054.exe 1636 userinit.exe 1636 userinit.exe 1636 userinit.exe 1636 userinit.exe 1636 userinit.exe 1636 userinit.exe 3956 swchost.exe 3956 swchost.exe 3956 swchost.exe 3956 swchost.exe 1636 userinit.exe 1636 userinit.exe 3956 swchost.exe 3956 swchost.exe 1636 userinit.exe 1636 userinit.exe 3956 swchost.exe 3956 swchost.exe 1636 userinit.exe 1636 userinit.exe 3956 swchost.exe 3956 swchost.exe 1636 userinit.exe 1636 userinit.exe 3956 swchost.exe 3956 swchost.exe 1636 userinit.exe 1636 userinit.exe 3956 swchost.exe 3956 swchost.exe 1636 userinit.exe 1636 userinit.exe 3956 swchost.exe 3956 swchost.exe 1636 userinit.exe 1636 userinit.exe 3956 swchost.exe 3956 swchost.exe 1636 userinit.exe 1636 userinit.exe 3956 swchost.exe 3956 swchost.exe 1636 userinit.exe 1636 userinit.exe 3956 swchost.exe 3956 swchost.exe 1636 userinit.exe 1636 userinit.exe 3956 swchost.exe 3956 swchost.exe 1636 userinit.exe 1636 userinit.exe 3956 swchost.exe 3956 swchost.exe 1636 userinit.exe 1636 userinit.exe 3956 swchost.exe 3956 swchost.exe 1636 userinit.exe 1636 userinit.exe 3956 swchost.exe 3956 swchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 1636 userinit.exe 3956 swchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3164 a8cb4ee765bf0466dd9a02dd22fc5d9a65e7250a1f924de417ab283d2a0a1054.exe 3164 a8cb4ee765bf0466dd9a02dd22fc5d9a65e7250a1f924de417ab283d2a0a1054.exe 1636 userinit.exe 1636 userinit.exe 1664 spoolsw.exe 1664 spoolsw.exe 3956 swchost.exe 3956 swchost.exe 1608 spoolsw.exe 1608 spoolsw.exe 1636 userinit.exe 1636 userinit.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3164 wrote to memory of 1636 3164 a8cb4ee765bf0466dd9a02dd22fc5d9a65e7250a1f924de417ab283d2a0a1054.exe 84 PID 3164 wrote to memory of 1636 3164 a8cb4ee765bf0466dd9a02dd22fc5d9a65e7250a1f924de417ab283d2a0a1054.exe 84 PID 3164 wrote to memory of 1636 3164 a8cb4ee765bf0466dd9a02dd22fc5d9a65e7250a1f924de417ab283d2a0a1054.exe 84 PID 1636 wrote to memory of 1664 1636 userinit.exe 85 PID 1636 wrote to memory of 1664 1636 userinit.exe 85 PID 1636 wrote to memory of 1664 1636 userinit.exe 85 PID 1664 wrote to memory of 3956 1664 spoolsw.exe 86 PID 1664 wrote to memory of 3956 1664 spoolsw.exe 86 PID 1664 wrote to memory of 3956 1664 spoolsw.exe 86 PID 3956 wrote to memory of 1608 3956 swchost.exe 88 PID 3956 wrote to memory of 1608 3956 swchost.exe 88 PID 3956 wrote to memory of 1608 3956 swchost.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\a8cb4ee765bf0466dd9a02dd22fc5d9a65e7250a1f924de417ab283d2a0a1054.exe"C:\Users\Admin\AppData\Local\Temp\a8cb4ee765bf0466dd9a02dd22fc5d9a65e7250a1f924de417ab283d2a0a1054.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3164 -
\??\c:\windows\userinit.exec:\windows\userinit.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1636 -
\??\c:\windows\spoolsw.exec:\windows\spoolsw.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1664 -
\??\c:\windows\swchost.exec:\windows\swchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3956 -
\??\c:\windows\spoolsw.exec:\windows\spoolsw.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1608
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
211KB
MD501e55f43a33b41eb966e11ca95af6a0e
SHA16890abe1d5321678435ba0cd2dd35b92e55e0a62
SHA2567fccfca1b2423fc00c5046a28da288990896cb4ba2e177f1b6c378fef188c54b
SHA5126442ac465eb74733de69349747a8ab465d47ee6d6a3fbd49a779335c01e1549e93aeaf9e03b67648c7a5a9d3de8d6b4f13c9afbc2a103f78ac7a16cf17133e37
-
Filesize
211KB
MD5a9c11bdac519e366d39bd7e6ae17375d
SHA177f2ffa6304299567b1a5e21830542d6a3dc98dc
SHA2561ec50782711a147b88bc2f69bcc803ea5d579d412d71a17caae9f8ad47333a9b
SHA51279e08f214d31ee3e583a6c770a3dd6d5c2123b5e5e454230bb90ed767e755eb9ce23aa280ae84c7cc558fcf97a8f633cca7f71e019188d75e54ed0d7d4fb21de
-
Filesize
211KB
MD5a0bc360106533a19c5fc3823c10a9a61
SHA1b43ee839ebc06d45bd617809fed8a9dbbec9618a
SHA256f923f238240f21bc80da9753eacec216a5c505cef9a09f5550bc22e15e913d36
SHA512267d44c68f9ef72ab17e37e03fa270ada863cedaa4407119134aaf22651f31cadd18c74589c0dedaab45f6813300b180dce0daa4ca331e1d9bf353b01073f79d
-
Filesize
211KB
MD542e7e78aadcca1a0f87c30aa46675c39
SHA158e204aeecd1376ad49a70c63a37e7d545068eb6
SHA256c86986c6bd2d8364543a7cb9cdeabfa938edd6980098aa17e589ad5bd047bbe7
SHA51220e93b5b356666fb9fc57f32f6c72469e204735ee5a983da2ef17dc9ff9fa41ab7539aaa6dca62ca8494b18b7f0b0763b15b641ce9c7512c782a456b28fd3593