Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
27/05/2024, 01:19
Static task
static1
Behavioral task
behavioral1
Sample
aa86ac9b16f68b14add9690ac2fe63426bdc3649dfbbd3be0b43c22be246ad54.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
aa86ac9b16f68b14add9690ac2fe63426bdc3649dfbbd3be0b43c22be246ad54.exe
Resource
win10v2004-20240508-en
General
-
Target
aa86ac9b16f68b14add9690ac2fe63426bdc3649dfbbd3be0b43c22be246ad54.exe
-
Size
66KB
-
MD5
9556cd0936956a7c89dd986f2a67cba2
-
SHA1
a56fdfa018015497791bd666508b2c897ca384d6
-
SHA256
aa86ac9b16f68b14add9690ac2fe63426bdc3649dfbbd3be0b43c22be246ad54
-
SHA512
d28ef7f05190417c4b9c85d9e107c9ddca7a8559ebcfca88d1a26c23a97f813facf8245517ad4a24e5f1688c13c09237d16e4d2f2c65596ea33938e552d35211
-
SSDEEP
1536:EHfetdklPp+07gDSrB8Xru2zGeJxgawTzpXzrDJrXip55555555555555555555b:IeklMMYJhqezw/pXzH9iR
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe -
Executes dropped EXE 4 IoCs
pid Process 4012 explorer.exe 644 spoolsv.exe 5008 svchost.exe 4124 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe aa86ac9b16f68b14add9690ac2fe63426bdc3649dfbbd3be0b43c22be246ad54.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1284 aa86ac9b16f68b14add9690ac2fe63426bdc3649dfbbd3be0b43c22be246ad54.exe 1284 aa86ac9b16f68b14add9690ac2fe63426bdc3649dfbbd3be0b43c22be246ad54.exe 4012 explorer.exe 4012 explorer.exe 4012 explorer.exe 4012 explorer.exe 4012 explorer.exe 4012 explorer.exe 4012 explorer.exe 4012 explorer.exe 5008 svchost.exe 5008 svchost.exe 5008 svchost.exe 5008 svchost.exe 4012 explorer.exe 4012 explorer.exe 5008 svchost.exe 5008 svchost.exe 4012 explorer.exe 4012 explorer.exe 5008 svchost.exe 5008 svchost.exe 4012 explorer.exe 4012 explorer.exe 5008 svchost.exe 5008 svchost.exe 4012 explorer.exe 4012 explorer.exe 5008 svchost.exe 5008 svchost.exe 4012 explorer.exe 4012 explorer.exe 5008 svchost.exe 5008 svchost.exe 4012 explorer.exe 4012 explorer.exe 5008 svchost.exe 5008 svchost.exe 4012 explorer.exe 4012 explorer.exe 5008 svchost.exe 5008 svchost.exe 4012 explorer.exe 4012 explorer.exe 5008 svchost.exe 5008 svchost.exe 4012 explorer.exe 4012 explorer.exe 5008 svchost.exe 5008 svchost.exe 4012 explorer.exe 4012 explorer.exe 5008 svchost.exe 5008 svchost.exe 4012 explorer.exe 4012 explorer.exe 5008 svchost.exe 5008 svchost.exe 4012 explorer.exe 4012 explorer.exe 5008 svchost.exe 5008 svchost.exe 4012 explorer.exe 4012 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 4012 explorer.exe 5008 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1284 aa86ac9b16f68b14add9690ac2fe63426bdc3649dfbbd3be0b43c22be246ad54.exe 1284 aa86ac9b16f68b14add9690ac2fe63426bdc3649dfbbd3be0b43c22be246ad54.exe 4012 explorer.exe 4012 explorer.exe 644 spoolsv.exe 644 spoolsv.exe 5008 svchost.exe 5008 svchost.exe 4124 spoolsv.exe 4124 spoolsv.exe 4012 explorer.exe 4012 explorer.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1284 wrote to memory of 4012 1284 aa86ac9b16f68b14add9690ac2fe63426bdc3649dfbbd3be0b43c22be246ad54.exe 85 PID 1284 wrote to memory of 4012 1284 aa86ac9b16f68b14add9690ac2fe63426bdc3649dfbbd3be0b43c22be246ad54.exe 85 PID 1284 wrote to memory of 4012 1284 aa86ac9b16f68b14add9690ac2fe63426bdc3649dfbbd3be0b43c22be246ad54.exe 85 PID 4012 wrote to memory of 644 4012 explorer.exe 86 PID 4012 wrote to memory of 644 4012 explorer.exe 86 PID 4012 wrote to memory of 644 4012 explorer.exe 86 PID 644 wrote to memory of 5008 644 spoolsv.exe 87 PID 644 wrote to memory of 5008 644 spoolsv.exe 87 PID 644 wrote to memory of 5008 644 spoolsv.exe 87 PID 5008 wrote to memory of 4124 5008 svchost.exe 88 PID 5008 wrote to memory of 4124 5008 svchost.exe 88 PID 5008 wrote to memory of 4124 5008 svchost.exe 88 PID 5008 wrote to memory of 3584 5008 svchost.exe 89 PID 5008 wrote to memory of 3584 5008 svchost.exe 89 PID 5008 wrote to memory of 3584 5008 svchost.exe 89 PID 5008 wrote to memory of 4756 5008 svchost.exe 107 PID 5008 wrote to memory of 4756 5008 svchost.exe 107 PID 5008 wrote to memory of 4756 5008 svchost.exe 107 PID 5008 wrote to memory of 4516 5008 svchost.exe 116 PID 5008 wrote to memory of 4516 5008 svchost.exe 116 PID 5008 wrote to memory of 4516 5008 svchost.exe 116
Processes
-
C:\Users\Admin\AppData\Local\Temp\aa86ac9b16f68b14add9690ac2fe63426bdc3649dfbbd3be0b43c22be246ad54.exe"C:\Users\Admin\AppData\Local\Temp\aa86ac9b16f68b14add9690ac2fe63426bdc3649dfbbd3be0b43c22be246ad54.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1284 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4012 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:644 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5008 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4124
-
-
C:\Windows\SysWOW64\at.exeat 01:21 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:3584
-
-
C:\Windows\SysWOW64\at.exeat 01:22 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:4756
-
-
C:\Windows\SysWOW64\at.exeat 01:23 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:4516
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD5541915795f44ee05842cebea1b6c8368
SHA13cefb210949eb8c6f76725064c23089e0736bff9
SHA25623571d69b2159987f007e30304d3994c4b00ad275e1f6533b56f3612bbb3d798
SHA512f556540440d587540d4b41b8e4ca31db68a630b6dfb645c04f8164098b2b32e7a5d93b3608e65943235913208e95300ee3614acfe38b259b39befe46018e388e
-
Filesize
66KB
MD5e47741943aa5b858bdf35c2e640b1c1e
SHA16d7f1170e30c1a938b7585c79893233713e4e737
SHA256bd0be4226a32ea0db3b125deb79fef123349dfb99ec75da2a06259895010b894
SHA512940d7c864b89fac773329536bdfdd905d932d91b9d289ca8d18e6a8698c0631c35812509b891c998a7e14e8869272c7340f232683b35ac73b7e601a59879dbca
-
Filesize
66KB
MD53ad155278f75a3fc35c9cacae31304fd
SHA121456e374e93861cf101ef7f66d3592f8c221d12
SHA2564f85e63b3f89b727e953561636a1d1551fa8f651cff48a43da7bf721cbd38ac4
SHA512c0f9e152b71973b203041850d6c459e0ec24a84b08a2ccc059b9cdb1b77b78a4a7d9b6716978328be8bacb5512491b6975ac633e69418e67248399aaa7e397d4
-
Filesize
66KB
MD5294946f8ae6193ef8d3cdff76bf0434b
SHA17d95d2410dfbc678db6b71399707c8e132f82965
SHA25652055bbaa8a08e9b8175cf96c63dfef7c60e6c3dac7b2884edcfba497c19b5d8
SHA5120dbd4459498da346ef85672b98082203acddcd74f56946aed2a252449e2ec44540634ec75a2e4802ef61b3d62fbb45fbd6dbed766f8542d365b6d1258ceb6e73