Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25/05/2024, 04:35
Static task
static1
Behavioral task
behavioral1
Sample
dd4abed8aceb1a0d51995261cab8e68d0ac832c6872db6a098d0c38d7a1ff4fa.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
dd4abed8aceb1a0d51995261cab8e68d0ac832c6872db6a098d0c38d7a1ff4fa.exe
Resource
win10v2004-20240426-en
General
-
Target
dd4abed8aceb1a0d51995261cab8e68d0ac832c6872db6a098d0c38d7a1ff4fa.exe
-
Size
66KB
-
MD5
7af92f5c044483ff6391b30c319d67cf
-
SHA1
0a7f034acd5e866a66f48f5e0e714a8f49df8dcb
-
SHA256
dd4abed8aceb1a0d51995261cab8e68d0ac832c6872db6a098d0c38d7a1ff4fa
-
SHA512
a2d6ae83bcb42fe0f037a0e89c48449766210227667b047cde66fbda78bced21a17b0ce3a83fe82d0b90a1eb18d920575deae40a7b4a335717be04ea6f6d03e4
-
SSDEEP
1536:EHfetdklPp+07gDSrB8Xru2zGeJxgawTzpXzrDJrXi7:IeklMMYJhqezw/pXzH9i7
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 3016 explorer.exe 2612 spoolsv.exe 2280 svchost.exe 2396 spoolsv.exe -
Loads dropped DLL 8 IoCs
pid Process 1652 dd4abed8aceb1a0d51995261cab8e68d0ac832c6872db6a098d0c38d7a1ff4fa.exe 1652 dd4abed8aceb1a0d51995261cab8e68d0ac832c6872db6a098d0c38d7a1ff4fa.exe 3016 explorer.exe 3016 explorer.exe 2612 spoolsv.exe 2612 spoolsv.exe 2280 svchost.exe 2280 svchost.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe dd4abed8aceb1a0d51995261cab8e68d0ac832c6872db6a098d0c38d7a1ff4fa.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1652 dd4abed8aceb1a0d51995261cab8e68d0ac832c6872db6a098d0c38d7a1ff4fa.exe 3016 explorer.exe 3016 explorer.exe 3016 explorer.exe 3016 explorer.exe 2280 svchost.exe 2280 svchost.exe 3016 explorer.exe 2280 svchost.exe 3016 explorer.exe 2280 svchost.exe 3016 explorer.exe 2280 svchost.exe 3016 explorer.exe 2280 svchost.exe 3016 explorer.exe 2280 svchost.exe 3016 explorer.exe 2280 svchost.exe 3016 explorer.exe 2280 svchost.exe 3016 explorer.exe 2280 svchost.exe 3016 explorer.exe 2280 svchost.exe 3016 explorer.exe 2280 svchost.exe 3016 explorer.exe 2280 svchost.exe 3016 explorer.exe 2280 svchost.exe 3016 explorer.exe 2280 svchost.exe 3016 explorer.exe 2280 svchost.exe 3016 explorer.exe 2280 svchost.exe 3016 explorer.exe 2280 svchost.exe 3016 explorer.exe 2280 svchost.exe 3016 explorer.exe 2280 svchost.exe 3016 explorer.exe 2280 svchost.exe 3016 explorer.exe 2280 svchost.exe 3016 explorer.exe 2280 svchost.exe 3016 explorer.exe 2280 svchost.exe 3016 explorer.exe 2280 svchost.exe 3016 explorer.exe 2280 svchost.exe 3016 explorer.exe 2280 svchost.exe 3016 explorer.exe 2280 svchost.exe 3016 explorer.exe 2280 svchost.exe 3016 explorer.exe 2280 svchost.exe 3016 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 3016 explorer.exe 2280 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1652 dd4abed8aceb1a0d51995261cab8e68d0ac832c6872db6a098d0c38d7a1ff4fa.exe 1652 dd4abed8aceb1a0d51995261cab8e68d0ac832c6872db6a098d0c38d7a1ff4fa.exe 3016 explorer.exe 3016 explorer.exe 2612 spoolsv.exe 2612 spoolsv.exe 2280 svchost.exe 2280 svchost.exe 2396 spoolsv.exe 2396 spoolsv.exe 3016 explorer.exe 3016 explorer.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1652 wrote to memory of 3016 1652 dd4abed8aceb1a0d51995261cab8e68d0ac832c6872db6a098d0c38d7a1ff4fa.exe 28 PID 1652 wrote to memory of 3016 1652 dd4abed8aceb1a0d51995261cab8e68d0ac832c6872db6a098d0c38d7a1ff4fa.exe 28 PID 1652 wrote to memory of 3016 1652 dd4abed8aceb1a0d51995261cab8e68d0ac832c6872db6a098d0c38d7a1ff4fa.exe 28 PID 1652 wrote to memory of 3016 1652 dd4abed8aceb1a0d51995261cab8e68d0ac832c6872db6a098d0c38d7a1ff4fa.exe 28 PID 3016 wrote to memory of 2612 3016 explorer.exe 29 PID 3016 wrote to memory of 2612 3016 explorer.exe 29 PID 3016 wrote to memory of 2612 3016 explorer.exe 29 PID 3016 wrote to memory of 2612 3016 explorer.exe 29 PID 2612 wrote to memory of 2280 2612 spoolsv.exe 30 PID 2612 wrote to memory of 2280 2612 spoolsv.exe 30 PID 2612 wrote to memory of 2280 2612 spoolsv.exe 30 PID 2612 wrote to memory of 2280 2612 spoolsv.exe 30 PID 2280 wrote to memory of 2396 2280 svchost.exe 31 PID 2280 wrote to memory of 2396 2280 svchost.exe 31 PID 2280 wrote to memory of 2396 2280 svchost.exe 31 PID 2280 wrote to memory of 2396 2280 svchost.exe 31 PID 2280 wrote to memory of 2712 2280 svchost.exe 32 PID 2280 wrote to memory of 2712 2280 svchost.exe 32 PID 2280 wrote to memory of 2712 2280 svchost.exe 32 PID 2280 wrote to memory of 2712 2280 svchost.exe 32 PID 2280 wrote to memory of 836 2280 svchost.exe 36 PID 2280 wrote to memory of 836 2280 svchost.exe 36 PID 2280 wrote to memory of 836 2280 svchost.exe 36 PID 2280 wrote to memory of 836 2280 svchost.exe 36 PID 2280 wrote to memory of 3020 2280 svchost.exe 38 PID 2280 wrote to memory of 3020 2280 svchost.exe 38 PID 2280 wrote to memory of 3020 2280 svchost.exe 38 PID 2280 wrote to memory of 3020 2280 svchost.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\dd4abed8aceb1a0d51995261cab8e68d0ac832c6872db6a098d0c38d7a1ff4fa.exe"C:\Users\Admin\AppData\Local\Temp\dd4abed8aceb1a0d51995261cab8e68d0ac832c6872db6a098d0c38d7a1ff4fa.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1652 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3016 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2612 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2280 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2396
-
-
C:\Windows\SysWOW64\at.exeat 04:37 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:2712
-
-
C:\Windows\SysWOW64\at.exeat 04:38 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:836
-
-
C:\Windows\SysWOW64\at.exeat 04:39 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:3020
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD5d229f617db1d3f689434d4df7181dd7c
SHA1c6fa5b2e55414a721511255cf352db05cb3b003c
SHA256f700a949e887bde25749b81eb46cc46063a2fca01bfb845bf4350fbf3f9c96e0
SHA512361442ea8533341cac7eda15ef8ad611ccf4f39364963f211bb0fdf1f35ad708a871a280073e9c6b796e67f313ef5162d738b9a13d909ecefb444e45b13003ac
-
Filesize
66KB
MD5a57d58d0a646528ed98d7d5edddfec67
SHA1592065f9e0070c942c900d44a78669e4cd280bda
SHA2562ee1fbcd2d2266cab7050efeac7dcbc84c1e92765c69ec4152ff3ca7268bd650
SHA512b90c2b0c786e15134f6e1f952eb458bfd5d8db1ca620840c217e251acc0234e5182f7bf11c703aedca2f77d03af30f825d2b035f582ebea5b8e5c05194d9b987
-
Filesize
66KB
MD5b40493f827a1045987dc790565e196d6
SHA1272c550f8e6b839d98f9632456206c7f67c2731c
SHA25686b95ab90c88c120ecbd7c388782b2706788380c7eebd82ae934339c4f6858e7
SHA512b0a43a5e6044c9a8513a69ad912a0d28a4f659cbc3d96c8878af4f3cf7c575a4e6a516a00591ebf0dc14ffea61b53eee8725bc3f68e346716e1cbe8e43e6d855
-
Filesize
66KB
MD534dfb4fc23c5eb5424cca92568198160
SHA146af543395dd0f6a8cd19390193e79cc76e4f40e
SHA2567743fdeb189409ea55b41fe982be58a69e1d31615fae3385176cce024407ea33
SHA51244b047b5b76b681f0abdbe9ae7af7430519dd607ecb5ccfe731183fb6264f0a90521d675b5fa07ae5c75712b79fbca69cb5e56bd1f42ed657bb18763ccbc9930