Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
107s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
27/05/2024, 18:32
Static task
static1
Behavioral task
behavioral1
Sample
0742b44b245affa4d76e5b90e8b647f72be79c8cbbc9b419f29509606bfa03ff.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0742b44b245affa4d76e5b90e8b647f72be79c8cbbc9b419f29509606bfa03ff.exe
Resource
win10v2004-20240508-en
General
-
Target
0742b44b245affa4d76e5b90e8b647f72be79c8cbbc9b419f29509606bfa03ff.exe
-
Size
66KB
-
MD5
a4b05dbb75c8eec38f583b931c430a20
-
SHA1
7d0636576d3dbb1a27bcd897d41e9e949a493552
-
SHA256
0742b44b245affa4d76e5b90e8b647f72be79c8cbbc9b419f29509606bfa03ff
-
SHA512
765f0a10bf8aae54e2e18b777ccdf5727c3f69029289baa635c6526dab15c75c0cb2ee65a4dac062edf7d724e7ae7c6b558e70fa7aab5740083350627ba01fd3
-
SSDEEP
1536:EHfetdklPp+07gDSrB8Xru2zGeJxgawTzpXzrDJrXi7CCCCCCCCCCCCCCCCCCCC7:IeklMMYJhqezw/pXzH9iP
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 1592 explorer.exe 3124 spoolsv.exe 6040 svchost.exe 5612 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification \??\c:\windows\system\explorer.exe 0742b44b245affa4d76e5b90e8b647f72be79c8cbbc9b419f29509606bfa03ff.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2996 0742b44b245affa4d76e5b90e8b647f72be79c8cbbc9b419f29509606bfa03ff.exe 2996 0742b44b245affa4d76e5b90e8b647f72be79c8cbbc9b419f29509606bfa03ff.exe 1592 explorer.exe 1592 explorer.exe 1592 explorer.exe 1592 explorer.exe 1592 explorer.exe 1592 explorer.exe 1592 explorer.exe 6040 svchost.exe 1592 explorer.exe 6040 svchost.exe 6040 svchost.exe 6040 svchost.exe 6040 svchost.exe 1592 explorer.exe 1592 explorer.exe 6040 svchost.exe 6040 svchost.exe 1592 explorer.exe 1592 explorer.exe 6040 svchost.exe 1592 explorer.exe 6040 svchost.exe 1592 explorer.exe 6040 svchost.exe 1592 explorer.exe 6040 svchost.exe 1592 explorer.exe 6040 svchost.exe 1592 explorer.exe 6040 svchost.exe 1592 explorer.exe 6040 svchost.exe 1592 explorer.exe 1592 explorer.exe 6040 svchost.exe 6040 svchost.exe 1592 explorer.exe 1592 explorer.exe 6040 svchost.exe 6040 svchost.exe 1592 explorer.exe 1592 explorer.exe 6040 svchost.exe 6040 svchost.exe 6040 svchost.exe 1592 explorer.exe 6040 svchost.exe 1592 explorer.exe 1592 explorer.exe 6040 svchost.exe 1592 explorer.exe 6040 svchost.exe 1592 explorer.exe 6040 svchost.exe 1592 explorer.exe 6040 svchost.exe 1592 explorer.exe 6040 svchost.exe 1592 explorer.exe 6040 svchost.exe 1592 explorer.exe 6040 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 1592 explorer.exe 6040 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2996 0742b44b245affa4d76e5b90e8b647f72be79c8cbbc9b419f29509606bfa03ff.exe 2996 0742b44b245affa4d76e5b90e8b647f72be79c8cbbc9b419f29509606bfa03ff.exe 1592 explorer.exe 1592 explorer.exe 3124 spoolsv.exe 3124 spoolsv.exe 6040 svchost.exe 6040 svchost.exe 5612 spoolsv.exe 5612 spoolsv.exe 1592 explorer.exe 1592 explorer.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2996 wrote to memory of 1592 2996 0742b44b245affa4d76e5b90e8b647f72be79c8cbbc9b419f29509606bfa03ff.exe 83 PID 2996 wrote to memory of 1592 2996 0742b44b245affa4d76e5b90e8b647f72be79c8cbbc9b419f29509606bfa03ff.exe 83 PID 2996 wrote to memory of 1592 2996 0742b44b245affa4d76e5b90e8b647f72be79c8cbbc9b419f29509606bfa03ff.exe 83 PID 1592 wrote to memory of 3124 1592 explorer.exe 84 PID 1592 wrote to memory of 3124 1592 explorer.exe 84 PID 1592 wrote to memory of 3124 1592 explorer.exe 84 PID 3124 wrote to memory of 6040 3124 spoolsv.exe 86 PID 3124 wrote to memory of 6040 3124 spoolsv.exe 86 PID 3124 wrote to memory of 6040 3124 spoolsv.exe 86 PID 6040 wrote to memory of 5612 6040 svchost.exe 87 PID 6040 wrote to memory of 5612 6040 svchost.exe 87 PID 6040 wrote to memory of 5612 6040 svchost.exe 87 PID 6040 wrote to memory of 4104 6040 svchost.exe 88 PID 6040 wrote to memory of 4104 6040 svchost.exe 88 PID 6040 wrote to memory of 4104 6040 svchost.exe 88 PID 6040 wrote to memory of 5700 6040 svchost.exe 109 PID 6040 wrote to memory of 5700 6040 svchost.exe 109 PID 6040 wrote to memory of 5700 6040 svchost.exe 109 PID 6040 wrote to memory of 1920 6040 svchost.exe 120 PID 6040 wrote to memory of 1920 6040 svchost.exe 120 PID 6040 wrote to memory of 1920 6040 svchost.exe 120
Processes
-
C:\Users\Admin\AppData\Local\Temp\0742b44b245affa4d76e5b90e8b647f72be79c8cbbc9b419f29509606bfa03ff.exe"C:\Users\Admin\AppData\Local\Temp\0742b44b245affa4d76e5b90e8b647f72be79c8cbbc9b419f29509606bfa03ff.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2996 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1592 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3124 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:6040 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5612
-
-
C:\Windows\SysWOW64\at.exeat 18:34 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:4104
-
-
C:\Windows\SysWOW64\at.exeat 18:35 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:5700
-
-
C:\Windows\SysWOW64\at.exeat 18:36 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:1920
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD58be9ae60bcb978511f9a0a5fba91086a
SHA1f076f238fa3929cb3c83699c78c22f89dde5047a
SHA2561d5a3c58f252b579ebf424f31a8be3047613519f9812a192dd567386e35fa67b
SHA5123c8a215456d987bad5a1df830793da49699979239c2b9424f7bd1e7ff297bc4af588c6cc36e5b424d928ab80c325f7f5daeea33c0bf49dd7f843ecbc61da64c5
-
Filesize
66KB
MD5cfcc804cc2a61fa1e9f2724a4c2435b1
SHA120d43da8e400598c06ad0db0fcdd6e19e989350a
SHA2565b42bea9c56fa3c433e1b36f832968cabddaaffef5e9a49646d70707692857f6
SHA512f9e4b13940b10f5b077bfedc12478406342daf8988e1b9d5c1b0e490ca568342b320e5200459c0c209ad106ab5baa609fb2309166321797d55d935c25d06adcb
-
Filesize
66KB
MD537935e88377734403c84fbc82d9eab14
SHA1ec7c972d620cd18a59a1f6cd076636cccb0c6889
SHA256f4b6cbb1e1144239ae59370ae6350b68ff346704cf8c65d488f58e4d575d6621
SHA512063399344ad729197e51bb7f932b2535fe3c45cbd3ab857a22bad55f44d9f2c69a0dac8fcbd213e6395d857c86b6d66a4a539daacb73102499da15a66b5b3826
-
Filesize
66KB
MD582abe62c272e643cb43fdc8e2e1b4a0e
SHA158aadd4383b9f9fb14e9a780b38616663a4d26f3
SHA2562c05c98efd9aaf4078059427a7c71c42d401a146e2634034304326de181f58b5
SHA51298fc3c177c6845bb625bbc80582f1c1d4f71f86d24413897f64c355d9c82bb7d78a5580abb9036320d46a6974ddc40fcbe76a4961ef10ce0b7f96b6198c653de