Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
31/05/2024, 21:35
Static task
static1
Behavioral task
behavioral1
Sample
4f675ed468c929047177a9f6aa1b48ef72a407b55638b507c88c0776c880747b.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
4f675ed468c929047177a9f6aa1b48ef72a407b55638b507c88c0776c880747b.exe
Resource
win10v2004-20240508-en
General
-
Target
4f675ed468c929047177a9f6aa1b48ef72a407b55638b507c88c0776c880747b.exe
-
Size
636KB
-
MD5
5a4624a300095f24a92f98bcf5592053
-
SHA1
244e911a5e463d79932d3396af38b73af90e55ec
-
SHA256
4f675ed468c929047177a9f6aa1b48ef72a407b55638b507c88c0776c880747b
-
SHA512
406ac3714704865375ddea04f087f6c17609589e6a0e2feb659ebab53fecbe5ec717737a56efbbf2faf8a7191473d3614bc0a6a5f5fd164158af72b8380d1ef0
-
SSDEEP
6144:UsLqdufVUNDalaB5Ra5KjbaFmsb/IbPU2K5XYjP3slUvZZIU5OS:PFUNDalaB5M5KjGwUk0JAOS
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 6 IoCs
pid Process 2736 4f675ed468c929047177a9f6aa1b48ef72a407b55638b507c88c0776c880747b.exe 1712 icsys.icn.exe 2156 explorer.exe 2276 spoolsv.exe 2700 svchost.exe 2712 spoolsv.exe -
Loads dropped DLL 6 IoCs
pid Process 1044 4f675ed468c929047177a9f6aa1b48ef72a407b55638b507c88c0776c880747b.exe 1044 4f675ed468c929047177a9f6aa1b48ef72a407b55638b507c88c0776c880747b.exe 1712 icsys.icn.exe 2156 explorer.exe 2276 spoolsv.exe 2700 svchost.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\Resources\Themes\icsys.icn.exe 4f675ed468c929047177a9f6aa1b48ef72a407b55638b507c88c0776c880747b.exe File opened for modification \??\c:\windows\resources\themes\explorer.exe icsys.icn.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2480 schtasks.exe 340 schtasks.exe 876 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1044 4f675ed468c929047177a9f6aa1b48ef72a407b55638b507c88c0776c880747b.exe 1044 4f675ed468c929047177a9f6aa1b48ef72a407b55638b507c88c0776c880747b.exe 1044 4f675ed468c929047177a9f6aa1b48ef72a407b55638b507c88c0776c880747b.exe 1044 4f675ed468c929047177a9f6aa1b48ef72a407b55638b507c88c0776c880747b.exe 1044 4f675ed468c929047177a9f6aa1b48ef72a407b55638b507c88c0776c880747b.exe 1044 4f675ed468c929047177a9f6aa1b48ef72a407b55638b507c88c0776c880747b.exe 1044 4f675ed468c929047177a9f6aa1b48ef72a407b55638b507c88c0776c880747b.exe 1044 4f675ed468c929047177a9f6aa1b48ef72a407b55638b507c88c0776c880747b.exe 1044 4f675ed468c929047177a9f6aa1b48ef72a407b55638b507c88c0776c880747b.exe 1044 4f675ed468c929047177a9f6aa1b48ef72a407b55638b507c88c0776c880747b.exe 1044 4f675ed468c929047177a9f6aa1b48ef72a407b55638b507c88c0776c880747b.exe 1044 4f675ed468c929047177a9f6aa1b48ef72a407b55638b507c88c0776c880747b.exe 1044 4f675ed468c929047177a9f6aa1b48ef72a407b55638b507c88c0776c880747b.exe 1044 4f675ed468c929047177a9f6aa1b48ef72a407b55638b507c88c0776c880747b.exe 1044 4f675ed468c929047177a9f6aa1b48ef72a407b55638b507c88c0776c880747b.exe 1044 4f675ed468c929047177a9f6aa1b48ef72a407b55638b507c88c0776c880747b.exe 1712 icsys.icn.exe 1712 icsys.icn.exe 1712 icsys.icn.exe 1712 icsys.icn.exe 1712 icsys.icn.exe 1712 icsys.icn.exe 1712 icsys.icn.exe 1712 icsys.icn.exe 1712 icsys.icn.exe 1712 icsys.icn.exe 1712 icsys.icn.exe 1712 icsys.icn.exe 1712 icsys.icn.exe 1712 icsys.icn.exe 1712 icsys.icn.exe 1712 icsys.icn.exe 1712 icsys.icn.exe 2156 explorer.exe 2156 explorer.exe 2156 explorer.exe 2156 explorer.exe 2156 explorer.exe 2156 explorer.exe 2156 explorer.exe 2156 explorer.exe 2156 explorer.exe 2156 explorer.exe 2156 explorer.exe 2156 explorer.exe 2156 explorer.exe 2156 explorer.exe 2156 explorer.exe 2156 explorer.exe 2700 svchost.exe 2700 svchost.exe 2700 svchost.exe 2700 svchost.exe 2700 svchost.exe 2700 svchost.exe 2700 svchost.exe 2700 svchost.exe 2700 svchost.exe 2700 svchost.exe 2700 svchost.exe 2700 svchost.exe 2700 svchost.exe 2700 svchost.exe 2700 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2156 explorer.exe 2700 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1044 4f675ed468c929047177a9f6aa1b48ef72a407b55638b507c88c0776c880747b.exe 1044 4f675ed468c929047177a9f6aa1b48ef72a407b55638b507c88c0776c880747b.exe 1712 icsys.icn.exe 1712 icsys.icn.exe 2156 explorer.exe 2156 explorer.exe 2276 spoolsv.exe 2276 spoolsv.exe 2700 svchost.exe 2700 svchost.exe 2712 spoolsv.exe 2712 spoolsv.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 1044 wrote to memory of 2736 1044 4f675ed468c929047177a9f6aa1b48ef72a407b55638b507c88c0776c880747b.exe 28 PID 1044 wrote to memory of 2736 1044 4f675ed468c929047177a9f6aa1b48ef72a407b55638b507c88c0776c880747b.exe 28 PID 1044 wrote to memory of 2736 1044 4f675ed468c929047177a9f6aa1b48ef72a407b55638b507c88c0776c880747b.exe 28 PID 1044 wrote to memory of 2736 1044 4f675ed468c929047177a9f6aa1b48ef72a407b55638b507c88c0776c880747b.exe 28 PID 1044 wrote to memory of 1712 1044 4f675ed468c929047177a9f6aa1b48ef72a407b55638b507c88c0776c880747b.exe 29 PID 1044 wrote to memory of 1712 1044 4f675ed468c929047177a9f6aa1b48ef72a407b55638b507c88c0776c880747b.exe 29 PID 1044 wrote to memory of 1712 1044 4f675ed468c929047177a9f6aa1b48ef72a407b55638b507c88c0776c880747b.exe 29 PID 1044 wrote to memory of 1712 1044 4f675ed468c929047177a9f6aa1b48ef72a407b55638b507c88c0776c880747b.exe 29 PID 1712 wrote to memory of 2156 1712 icsys.icn.exe 30 PID 1712 wrote to memory of 2156 1712 icsys.icn.exe 30 PID 1712 wrote to memory of 2156 1712 icsys.icn.exe 30 PID 1712 wrote to memory of 2156 1712 icsys.icn.exe 30 PID 2156 wrote to memory of 2276 2156 explorer.exe 31 PID 2156 wrote to memory of 2276 2156 explorer.exe 31 PID 2156 wrote to memory of 2276 2156 explorer.exe 31 PID 2156 wrote to memory of 2276 2156 explorer.exe 31 PID 2276 wrote to memory of 2700 2276 spoolsv.exe 32 PID 2276 wrote to memory of 2700 2276 spoolsv.exe 32 PID 2276 wrote to memory of 2700 2276 spoolsv.exe 32 PID 2276 wrote to memory of 2700 2276 spoolsv.exe 32 PID 2700 wrote to memory of 2712 2700 svchost.exe 33 PID 2700 wrote to memory of 2712 2700 svchost.exe 33 PID 2700 wrote to memory of 2712 2700 svchost.exe 33 PID 2700 wrote to memory of 2712 2700 svchost.exe 33 PID 2156 wrote to memory of 2492 2156 explorer.exe 34 PID 2156 wrote to memory of 2492 2156 explorer.exe 34 PID 2156 wrote to memory of 2492 2156 explorer.exe 34 PID 2156 wrote to memory of 2492 2156 explorer.exe 34 PID 2700 wrote to memory of 2480 2700 svchost.exe 35 PID 2700 wrote to memory of 2480 2700 svchost.exe 35 PID 2700 wrote to memory of 2480 2700 svchost.exe 35 PID 2700 wrote to memory of 2480 2700 svchost.exe 35 PID 2700 wrote to memory of 340 2700 svchost.exe 40 PID 2700 wrote to memory of 340 2700 svchost.exe 40 PID 2700 wrote to memory of 340 2700 svchost.exe 40 PID 2700 wrote to memory of 340 2700 svchost.exe 40 PID 2700 wrote to memory of 876 2700 svchost.exe 42 PID 2700 wrote to memory of 876 2700 svchost.exe 42 PID 2700 wrote to memory of 876 2700 svchost.exe 42 PID 2700 wrote to memory of 876 2700 svchost.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\4f675ed468c929047177a9f6aa1b48ef72a407b55638b507c88c0776c880747b.exe"C:\Users\Admin\AppData\Local\Temp\4f675ed468c929047177a9f6aa1b48ef72a407b55638b507c88c0776c880747b.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1044 -
\??\c:\users\admin\appdata\local\temp\4f675ed468c929047177a9f6aa1b48ef72a407b55638b507c88c0776c880747b.exec:\users\admin\appdata\local\temp\4f675ed468c929047177a9f6aa1b48ef72a407b55638b507c88c0776c880747b.exe2⤵
- Executes dropped EXE
PID:2736
-
-
C:\Windows\Resources\Themes\icsys.icn.exeC:\Windows\Resources\Themes\icsys.icn.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1712 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe3⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2156 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2276 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe5⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2700 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2712
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 21:37 /f6⤵
- Creates scheduled task(s)
PID:2480
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 21:38 /f6⤵
- Creates scheduled task(s)
PID:340
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 21:39 /f6⤵
- Creates scheduled task(s)
PID:876
-
-
-
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe4⤵PID:2492
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135KB
MD5c83a84ae80885c91a93ebbb247e088b8
SHA191e0ab9bc25dcb0e82b9b69720e552f003a7e570
SHA2567270a48e4d2a2b422ca30b8037a73e6a034064d0e94018bb6cda3057bf987ad7
SHA512edbad7b96c5970ce54d6ca892e2ff89a83e629fb628c934461bc63b10de50cb150017628256ddea2d8eee4f2e7407263c41aee2f7d3a8591171b04a68070da99
-
\Users\Admin\AppData\Local\Temp\4f675ed468c929047177a9f6aa1b48ef72a407b55638b507c88c0776c880747b.exe
Filesize501KB
MD592e18c9f1e6c9f4ad8f03c78f6437942
SHA140b8ec37f3a192074df7a68ce19ee1c3549a8e60
SHA256e77d0af823e37c326222ad804b56da70c3dcb1fcf469dc4dc782a592ef4f6e0b
SHA512ffef00b80c5cb99dc25e2ba3ab2935fd0fb380abf32d742b69090ca4539477e96bf408bc5477143233b8760b92119684f859106ed1ce860bb32b37cebe818df1
-
Filesize
135KB
MD559dc5e9d9e1f40eb87bda1eb09826327
SHA1dfa6de35475afaa05de5efdc9251a169d3b1c39e
SHA2569aacf57aa2ce957c8a613ff6c606f354d2b46ce35c1e0f1a9068fc32eb76ef4d
SHA5121cf784c9e3d58b3be59e501918d5e3cbcf18200804e8cd834db23f8131f0840928984e89243ce110b9b47f4564b1a23f8ffb9baefc4f64f0dff1e3487b7f404f
-
Filesize
135KB
MD58a5910c440c7b051ef524c68f9e107d2
SHA1fd0db5fbdca35dd277b9fa6c148fc124971a8875
SHA256f5c525a947c413ae3dff0231e2d702ee1a853297704bed4bb05c5f49bffc614d
SHA51215a8c07a29e0eaa950abe8fdd6134548bc9ce377bcc76c7da8c4b5c8e563e8d6b07d3d119a3324ec145f951b7d39be1bbab60c922bfd085f1fdebcb18f28f80e
-
Filesize
135KB
MD544c88f92706d4c4713623f460213ba2e
SHA15e8d1d6ebc86b0fdaffb487f10f42ae8a3502e62
SHA2567a55ef6eff7d3cf454ae3f69b00aed26ecb780052a484f0133d4102781ef4d30
SHA5128936ff39b1194d7af8fb847705e48c576614ac849f244b1ea159b1e76c417b794746bf98809a956e8680b1cca29fd98144b5fbd5cc0e27f1de6030222444f24a