Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
25/05/2024, 04:35
Static task
static1
Behavioral task
behavioral1
Sample
dd4abed8aceb1a0d51995261cab8e68d0ac832c6872db6a098d0c38d7a1ff4fa.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
dd4abed8aceb1a0d51995261cab8e68d0ac832c6872db6a098d0c38d7a1ff4fa.exe
Resource
win10v2004-20240426-en
General
-
Target
dd4abed8aceb1a0d51995261cab8e68d0ac832c6872db6a098d0c38d7a1ff4fa.exe
-
Size
66KB
-
MD5
7af92f5c044483ff6391b30c319d67cf
-
SHA1
0a7f034acd5e866a66f48f5e0e714a8f49df8dcb
-
SHA256
dd4abed8aceb1a0d51995261cab8e68d0ac832c6872db6a098d0c38d7a1ff4fa
-
SHA512
a2d6ae83bcb42fe0f037a0e89c48449766210227667b047cde66fbda78bced21a17b0ce3a83fe82d0b90a1eb18d920575deae40a7b4a335717be04ea6f6d03e4
-
SSDEEP
1536:EHfetdklPp+07gDSrB8Xru2zGeJxgawTzpXzrDJrXi7:IeklMMYJhqezw/pXzH9i7
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 5132 explorer.exe 5632 spoolsv.exe 4984 svchost.exe 2564 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\system\udsys.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe dd4abed8aceb1a0d51995261cab8e68d0ac832c6872db6a098d0c38d7a1ff4fa.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4712 dd4abed8aceb1a0d51995261cab8e68d0ac832c6872db6a098d0c38d7a1ff4fa.exe 4712 dd4abed8aceb1a0d51995261cab8e68d0ac832c6872db6a098d0c38d7a1ff4fa.exe 5132 explorer.exe 5132 explorer.exe 5132 explorer.exe 5132 explorer.exe 5132 explorer.exe 5132 explorer.exe 4984 svchost.exe 4984 svchost.exe 4984 svchost.exe 4984 svchost.exe 5132 explorer.exe 5132 explorer.exe 4984 svchost.exe 4984 svchost.exe 5132 explorer.exe 5132 explorer.exe 4984 svchost.exe 4984 svchost.exe 5132 explorer.exe 5132 explorer.exe 4984 svchost.exe 4984 svchost.exe 5132 explorer.exe 5132 explorer.exe 4984 svchost.exe 4984 svchost.exe 5132 explorer.exe 5132 explorer.exe 4984 svchost.exe 4984 svchost.exe 5132 explorer.exe 5132 explorer.exe 4984 svchost.exe 4984 svchost.exe 5132 explorer.exe 5132 explorer.exe 4984 svchost.exe 4984 svchost.exe 5132 explorer.exe 5132 explorer.exe 4984 svchost.exe 4984 svchost.exe 5132 explorer.exe 5132 explorer.exe 4984 svchost.exe 4984 svchost.exe 5132 explorer.exe 5132 explorer.exe 4984 svchost.exe 4984 svchost.exe 5132 explorer.exe 5132 explorer.exe 4984 svchost.exe 4984 svchost.exe 5132 explorer.exe 5132 explorer.exe 4984 svchost.exe 4984 svchost.exe 5132 explorer.exe 5132 explorer.exe 4984 svchost.exe 4984 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 5132 explorer.exe 4984 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 4712 dd4abed8aceb1a0d51995261cab8e68d0ac832c6872db6a098d0c38d7a1ff4fa.exe 4712 dd4abed8aceb1a0d51995261cab8e68d0ac832c6872db6a098d0c38d7a1ff4fa.exe 5132 explorer.exe 5132 explorer.exe 5632 spoolsv.exe 5632 spoolsv.exe 4984 svchost.exe 4984 svchost.exe 2564 spoolsv.exe 2564 spoolsv.exe 5132 explorer.exe 5132 explorer.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 4712 wrote to memory of 5132 4712 dd4abed8aceb1a0d51995261cab8e68d0ac832c6872db6a098d0c38d7a1ff4fa.exe 82 PID 4712 wrote to memory of 5132 4712 dd4abed8aceb1a0d51995261cab8e68d0ac832c6872db6a098d0c38d7a1ff4fa.exe 82 PID 4712 wrote to memory of 5132 4712 dd4abed8aceb1a0d51995261cab8e68d0ac832c6872db6a098d0c38d7a1ff4fa.exe 82 PID 5132 wrote to memory of 5632 5132 explorer.exe 83 PID 5132 wrote to memory of 5632 5132 explorer.exe 83 PID 5132 wrote to memory of 5632 5132 explorer.exe 83 PID 5632 wrote to memory of 4984 5632 spoolsv.exe 84 PID 5632 wrote to memory of 4984 5632 spoolsv.exe 84 PID 5632 wrote to memory of 4984 5632 spoolsv.exe 84 PID 4984 wrote to memory of 2564 4984 svchost.exe 85 PID 4984 wrote to memory of 2564 4984 svchost.exe 85 PID 4984 wrote to memory of 2564 4984 svchost.exe 85 PID 4984 wrote to memory of 1304 4984 svchost.exe 86 PID 4984 wrote to memory of 1304 4984 svchost.exe 86 PID 4984 wrote to memory of 1304 4984 svchost.exe 86 PID 4984 wrote to memory of 4988 4984 svchost.exe 102 PID 4984 wrote to memory of 4988 4984 svchost.exe 102 PID 4984 wrote to memory of 4988 4984 svchost.exe 102 PID 4984 wrote to memory of 4724 4984 svchost.exe 111 PID 4984 wrote to memory of 4724 4984 svchost.exe 111 PID 4984 wrote to memory of 4724 4984 svchost.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\dd4abed8aceb1a0d51995261cab8e68d0ac832c6872db6a098d0c38d7a1ff4fa.exe"C:\Users\Admin\AppData\Local\Temp\dd4abed8aceb1a0d51995261cab8e68d0ac832c6872db6a098d0c38d7a1ff4fa.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4712 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5132 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5632 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4984 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2564
-
-
C:\Windows\SysWOW64\at.exeat 04:37 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:1304
-
-
C:\Windows\SysWOW64\at.exeat 04:38 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:4988
-
-
C:\Windows\SysWOW64\at.exeat 04:39 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:4724
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD5f2eb0d01d52d396195df508764cb2977
SHA173d4d0bb392f682af090408196f3c1d2d8d3b772
SHA256e2f6827b8d407d565efba8e379857f97fc2c8301eb616a8bce416e6629a7d4c8
SHA512bc585e4bc517c3bff4be4e30edf53ee9aa1374f9c8ad374704a0eadd13a97bf3ca0eafaad3decadfca8edd0ebb769e4cc5e5b1fd9f6226cd60c381afd215e6bb
-
Filesize
66KB
MD5ead9516033a3af1225247d762addd598
SHA1a85fa2a4ab1af117ec768cf82a593aefffed8bd2
SHA2567f4a1524c0a4fdce4ab4e33e1b5a181aa0e13ae97b6312510d837e3906fad966
SHA512f87fb914acea73290d179781d30789e02e4ee98423904cfb0ed958902db224dcba3e899920ce7cfd282bdadab7c3434594d6be198ce50f6e1023c47526b19ddc
-
Filesize
66KB
MD5acafa2d9096da750b82d43fa19f8d88b
SHA16d6ebc84d6a725f4f3a684a14a6ce2b5f908b12d
SHA256b3ffe57c03c8b45fe9adbbe762af1aefa92a22efcd565abddf58df083acf4125
SHA512e3e228f9e4847f1719d0b0ed8775f5b93513a3e53dc724c9f7df07568fbd4fc84c3ff1fdd5a860fad8724bd2305f53ca5cf20d75e026dd818bdd7013ad150812
-
Filesize
66KB
MD50390c76b775315248c627dc1ac6bb876
SHA18ff066316612b2dbb405661ef0a63428d5447aa8
SHA256cec5bd4d03629702387c2e433da759bd1f26bf277f0a05ab4631f88f471677ec
SHA512d3a3399990bcf0bfa76c180043fc48f9956c9f3e9bb8038c3e60674e15f478506f99ae879c073de33c3b5630c422ca024197a81524df7e5b4fa52222481ab8aa