Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
06/06/2024, 03:11
Static task
static1
Behavioral task
behavioral1
Sample
947349588e2770905f2dc3d1c3fe1ff4515ca4cab16a34e9fd2a1f5bf9bd3bb8.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
947349588e2770905f2dc3d1c3fe1ff4515ca4cab16a34e9fd2a1f5bf9bd3bb8.exe
Resource
win10v2004-20240508-en
General
-
Target
947349588e2770905f2dc3d1c3fe1ff4515ca4cab16a34e9fd2a1f5bf9bd3bb8.exe
-
Size
65KB
-
MD5
3288b56ce2e4cd447873a0a54f69feb7
-
SHA1
852e60f47b3ef3b9715ef4a4bb7a5b029ea52865
-
SHA256
947349588e2770905f2dc3d1c3fe1ff4515ca4cab16a34e9fd2a1f5bf9bd3bb8
-
SHA512
4d3b81155818b9a6d45b472c2362ac9d58b3dbb2fff2714117aac6c15ff13cfe5552d98e0e47f59c5c07d78118e5ba946799b7488845b7655897d3af97442b74
-
SSDEEP
1536:ECq3yRuqrI01eArdW/O7JnI2e13XiLij40MkTUVqa/Oum:7WNqkOJWmo1HpM0MkTUmum
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 4376 explorer.exe 5060 spoolsv.exe 4868 svchost.exe 4976 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe 947349588e2770905f2dc3d1c3fe1ff4515ca4cab16a34e9fd2a1f5bf9bd3bb8.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5780 947349588e2770905f2dc3d1c3fe1ff4515ca4cab16a34e9fd2a1f5bf9bd3bb8.exe 5780 947349588e2770905f2dc3d1c3fe1ff4515ca4cab16a34e9fd2a1f5bf9bd3bb8.exe 4376 explorer.exe 4376 explorer.exe 4376 explorer.exe 4376 explorer.exe 4376 explorer.exe 4376 explorer.exe 4868 svchost.exe 4868 svchost.exe 4868 svchost.exe 4868 svchost.exe 4376 explorer.exe 4376 explorer.exe 4868 svchost.exe 4868 svchost.exe 4376 explorer.exe 4376 explorer.exe 4868 svchost.exe 4868 svchost.exe 4376 explorer.exe 4376 explorer.exe 4868 svchost.exe 4868 svchost.exe 4376 explorer.exe 4376 explorer.exe 4868 svchost.exe 4868 svchost.exe 4376 explorer.exe 4376 explorer.exe 4868 svchost.exe 4868 svchost.exe 4376 explorer.exe 4376 explorer.exe 4868 svchost.exe 4868 svchost.exe 4376 explorer.exe 4376 explorer.exe 4868 svchost.exe 4868 svchost.exe 4376 explorer.exe 4376 explorer.exe 4868 svchost.exe 4868 svchost.exe 4376 explorer.exe 4376 explorer.exe 4868 svchost.exe 4868 svchost.exe 4376 explorer.exe 4376 explorer.exe 4868 svchost.exe 4868 svchost.exe 4376 explorer.exe 4376 explorer.exe 4868 svchost.exe 4868 svchost.exe 4376 explorer.exe 4376 explorer.exe 4868 svchost.exe 4868 svchost.exe 4376 explorer.exe 4376 explorer.exe 4868 svchost.exe 4868 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 4376 explorer.exe 4868 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 5780 947349588e2770905f2dc3d1c3fe1ff4515ca4cab16a34e9fd2a1f5bf9bd3bb8.exe 5780 947349588e2770905f2dc3d1c3fe1ff4515ca4cab16a34e9fd2a1f5bf9bd3bb8.exe 4376 explorer.exe 4376 explorer.exe 5060 spoolsv.exe 5060 spoolsv.exe 4868 svchost.exe 4868 svchost.exe 4976 spoolsv.exe 4976 spoolsv.exe 4376 explorer.exe 4376 explorer.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 5780 wrote to memory of 4376 5780 947349588e2770905f2dc3d1c3fe1ff4515ca4cab16a34e9fd2a1f5bf9bd3bb8.exe 84 PID 5780 wrote to memory of 4376 5780 947349588e2770905f2dc3d1c3fe1ff4515ca4cab16a34e9fd2a1f5bf9bd3bb8.exe 84 PID 5780 wrote to memory of 4376 5780 947349588e2770905f2dc3d1c3fe1ff4515ca4cab16a34e9fd2a1f5bf9bd3bb8.exe 84 PID 4376 wrote to memory of 5060 4376 explorer.exe 85 PID 4376 wrote to memory of 5060 4376 explorer.exe 85 PID 4376 wrote to memory of 5060 4376 explorer.exe 85 PID 5060 wrote to memory of 4868 5060 spoolsv.exe 86 PID 5060 wrote to memory of 4868 5060 spoolsv.exe 86 PID 5060 wrote to memory of 4868 5060 spoolsv.exe 86 PID 4868 wrote to memory of 4976 4868 svchost.exe 88 PID 4868 wrote to memory of 4976 4868 svchost.exe 88 PID 4868 wrote to memory of 4976 4868 svchost.exe 88 PID 4868 wrote to memory of 4192 4868 svchost.exe 89 PID 4868 wrote to memory of 4192 4868 svchost.exe 89 PID 4868 wrote to memory of 4192 4868 svchost.exe 89 PID 4868 wrote to memory of 2984 4868 svchost.exe 109 PID 4868 wrote to memory of 2984 4868 svchost.exe 109 PID 4868 wrote to memory of 2984 4868 svchost.exe 109 PID 4868 wrote to memory of 3088 4868 svchost.exe 121 PID 4868 wrote to memory of 3088 4868 svchost.exe 121 PID 4868 wrote to memory of 3088 4868 svchost.exe 121
Processes
-
C:\Users\Admin\AppData\Local\Temp\947349588e2770905f2dc3d1c3fe1ff4515ca4cab16a34e9fd2a1f5bf9bd3bb8.exe"C:\Users\Admin\AppData\Local\Temp\947349588e2770905f2dc3d1c3fe1ff4515ca4cab16a34e9fd2a1f5bf9bd3bb8.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5780 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4376 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5060 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4868 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4976
-
-
C:\Windows\SysWOW64\at.exeat 03:13 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:4192
-
-
C:\Windows\SysWOW64\at.exeat 03:14 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:2984
-
-
C:\Windows\SysWOW64\at.exeat 03:15 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:3088
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD51399801a5daf4bd05288756053ed4893
SHA19dfc0554969915e37d96ca42bb8db87c5c6a9009
SHA2562e45e42ae6fde24b52eabe0a3b4d161ee03284a4d905b67231b744fc3bb601dc
SHA5120062228aa9d9f78f879f4a42b51fab79f0ce2a11ec77565e805ce709dd397dffce28516cba8cd2cb0983bc4f0c3f808531186099424865e6ddd64d72b1012746
-
Filesize
65KB
MD57802fa8be2065d3dc61823484aaf7b2d
SHA1cd6d0d56ae2c7ad7a3457d06d2e9b4222f475c4b
SHA25675a716d484087b53d781f6d60066aecd506715e5a9be0451c34c38ea9b15837c
SHA512d40e07e519e3e92862f452b50ae35dd959a9b0931bba1525fa55b5e301c69537e6aa0842301475cb0c7d8f078de774325144f20159a7cb52127a7ab8286b364f
-
Filesize
65KB
MD547dbd91d7df86d4fd3a17a204099d312
SHA18896c6f1613bbc19aa839e1c60c3fa87e1b738ac
SHA2568958a900b2cb7c2541435188a8219af067909d04de41a60b88d4c79255ebd3e3
SHA5125ca91bed685027b2b311691f56bf08e85af691a095c6d5534b14740546254cb732d11401b292d19f994c7467fec146c74a3b9da504cd264e84ffd39b6676f4b6
-
Filesize
65KB
MD574d02f420f0bc7e83c7151e0ac71fd80
SHA19cdc62634bfc21627adcb484d36af064f3231b71
SHA2568ff3d9f251d371d6f240a736a65e4cd5d2172f44db1a34d4eee6d8eada08d8b3
SHA51221b8340c5739d17caa13ae6eadc6778d317894e13c9ae85f98c2715be82436601865cf00b91c3b0760caf29ca4bed800032bb36d475151dda55c1278b565e543