Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    31/05/2024, 21:35

General

  • Target

    4f675ed468c929047177a9f6aa1b48ef72a407b55638b507c88c0776c880747b.exe

  • Size

    636KB

  • MD5

    5a4624a300095f24a92f98bcf5592053

  • SHA1

    244e911a5e463d79932d3396af38b73af90e55ec

  • SHA256

    4f675ed468c929047177a9f6aa1b48ef72a407b55638b507c88c0776c880747b

  • SHA512

    406ac3714704865375ddea04f087f6c17609589e6a0e2feb659ebab53fecbe5ec717737a56efbbf2faf8a7191473d3614bc0a6a5f5fd164158af72b8380d1ef0

  • SSDEEP

    6144:UsLqdufVUNDalaB5Ra5KjbaFmsb/IbPU2K5XYjP3slUvZZIU5OS:PFUNDalaB5M5KjGwUk0JAOS

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 6 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 5 IoCs
  • Creates scheduled task(s) 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4f675ed468c929047177a9f6aa1b48ef72a407b55638b507c88c0776c880747b.exe
    "C:\Users\Admin\AppData\Local\Temp\4f675ed468c929047177a9f6aa1b48ef72a407b55638b507c88c0776c880747b.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1044
    • \??\c:\users\admin\appdata\local\temp\4f675ed468c929047177a9f6aa1b48ef72a407b55638b507c88c0776c880747b.exe 
      c:\users\admin\appdata\local\temp\4f675ed468c929047177a9f6aa1b48ef72a407b55638b507c88c0776c880747b.exe 
      2⤵
      • Executes dropped EXE
      PID:2736
    • C:\Windows\Resources\Themes\icsys.icn.exe
      C:\Windows\Resources\Themes\icsys.icn.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1712
      • \??\c:\windows\resources\themes\explorer.exe
        c:\windows\resources\themes\explorer.exe
        3⤵
        • Modifies visiblity of hidden/system files in Explorer
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2156
        • \??\c:\windows\resources\spoolsv.exe
          c:\windows\resources\spoolsv.exe SE
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in Windows directory
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2276
          • \??\c:\windows\resources\svchost.exe
            c:\windows\resources\svchost.exe
            5⤵
            • Modifies visiblity of hidden/system files in Explorer
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Drops file in System32 directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2700
            • \??\c:\windows\resources\spoolsv.exe
              c:\windows\resources\spoolsv.exe PR
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              PID:2712
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 21:37 /f
              6⤵
              • Creates scheduled task(s)
              PID:2480
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 21:38 /f
              6⤵
              • Creates scheduled task(s)
              PID:340
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 21:39 /f
              6⤵
              • Creates scheduled task(s)
              PID:876
        • C:\Windows\Explorer.exe
          C:\Windows\Explorer.exe
          4⤵
            PID:2492

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\Resources\Themes\explorer.exe

      Filesize

      135KB

      MD5

      c83a84ae80885c91a93ebbb247e088b8

      SHA1

      91e0ab9bc25dcb0e82b9b69720e552f003a7e570

      SHA256

      7270a48e4d2a2b422ca30b8037a73e6a034064d0e94018bb6cda3057bf987ad7

      SHA512

      edbad7b96c5970ce54d6ca892e2ff89a83e629fb628c934461bc63b10de50cb150017628256ddea2d8eee4f2e7407263c41aee2f7d3a8591171b04a68070da99

    • \Users\Admin\AppData\Local\Temp\4f675ed468c929047177a9f6aa1b48ef72a407b55638b507c88c0776c880747b.exe 

      Filesize

      501KB

      MD5

      92e18c9f1e6c9f4ad8f03c78f6437942

      SHA1

      40b8ec37f3a192074df7a68ce19ee1c3549a8e60

      SHA256

      e77d0af823e37c326222ad804b56da70c3dcb1fcf469dc4dc782a592ef4f6e0b

      SHA512

      ffef00b80c5cb99dc25e2ba3ab2935fd0fb380abf32d742b69090ca4539477e96bf408bc5477143233b8760b92119684f859106ed1ce860bb32b37cebe818df1

    • \Windows\Resources\Themes\icsys.icn.exe

      Filesize

      135KB

      MD5

      59dc5e9d9e1f40eb87bda1eb09826327

      SHA1

      dfa6de35475afaa05de5efdc9251a169d3b1c39e

      SHA256

      9aacf57aa2ce957c8a613ff6c606f354d2b46ce35c1e0f1a9068fc32eb76ef4d

      SHA512

      1cf784c9e3d58b3be59e501918d5e3cbcf18200804e8cd834db23f8131f0840928984e89243ce110b9b47f4564b1a23f8ffb9baefc4f64f0dff1e3487b7f404f

    • \Windows\Resources\spoolsv.exe

      Filesize

      135KB

      MD5

      8a5910c440c7b051ef524c68f9e107d2

      SHA1

      fd0db5fbdca35dd277b9fa6c148fc124971a8875

      SHA256

      f5c525a947c413ae3dff0231e2d702ee1a853297704bed4bb05c5f49bffc614d

      SHA512

      15a8c07a29e0eaa950abe8fdd6134548bc9ce377bcc76c7da8c4b5c8e563e8d6b07d3d119a3324ec145f951b7d39be1bbab60c922bfd085f1fdebcb18f28f80e

    • \Windows\Resources\svchost.exe

      Filesize

      135KB

      MD5

      44c88f92706d4c4713623f460213ba2e

      SHA1

      5e8d1d6ebc86b0fdaffb487f10f42ae8a3502e62

      SHA256

      7a55ef6eff7d3cf454ae3f69b00aed26ecb780052a484f0133d4102781ef4d30

      SHA512

      8936ff39b1194d7af8fb847705e48c576614ac849f244b1ea159b1e76c417b794746bf98809a956e8680b1cca29fd98144b5fbd5cc0e27f1de6030222444f24a

    • memory/1044-0-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/1044-59-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/1712-58-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/1712-22-0x0000000000320000-0x000000000033F000-memory.dmp

      Filesize

      124KB

    • memory/2156-34-0x0000000000330000-0x000000000034F000-memory.dmp

      Filesize

      124KB

    • memory/2276-57-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/2700-51-0x0000000000320000-0x000000000033F000-memory.dmp

      Filesize

      124KB

    • memory/2700-47-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/2712-56-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB