Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
08/06/2024, 21:22
Static task
static1
Behavioral task
behavioral1
Sample
36c694d94e65408b05e8995078b32f08cd93269e8d5b6c43ef738f4af87d7e50.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
36c694d94e65408b05e8995078b32f08cd93269e8d5b6c43ef738f4af87d7e50.exe
Resource
win10v2004-20240508-en
General
-
Target
36c694d94e65408b05e8995078b32f08cd93269e8d5b6c43ef738f4af87d7e50.exe
-
Size
65KB
-
MD5
f34c59e9842a061d69e4cf7c3376ed6b
-
SHA1
05945b177f16120c8a1e708aeb3e4c34fb12d4f0
-
SHA256
36c694d94e65408b05e8995078b32f08cd93269e8d5b6c43ef738f4af87d7e50
-
SHA512
a4506e556db64874c6b3d2a7106e77bb97cfa91041fc3db6b9f90cc8b754525be9eec2de9ac55362d5613ed023e60e80c3e61939fde682135c373315339f3281
-
SSDEEP
1536:ECq3yRuqrI01eArdW/O7JnI2e13XiLij40MkTUVqa/Oum:7WNqkOJWmo1HpM0MkTUmum
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 3668 explorer.exe 4620 spoolsv.exe 3960 svchost.exe 1020 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe 36c694d94e65408b05e8995078b32f08cd93269e8d5b6c43ef738f4af87d7e50.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1644 36c694d94e65408b05e8995078b32f08cd93269e8d5b6c43ef738f4af87d7e50.exe 1644 36c694d94e65408b05e8995078b32f08cd93269e8d5b6c43ef738f4af87d7e50.exe 3668 explorer.exe 3668 explorer.exe 3668 explorer.exe 3668 explorer.exe 3668 explorer.exe 3668 explorer.exe 3960 svchost.exe 3960 svchost.exe 3960 svchost.exe 3960 svchost.exe 3668 explorer.exe 3668 explorer.exe 3960 svchost.exe 3960 svchost.exe 3668 explorer.exe 3668 explorer.exe 3960 svchost.exe 3960 svchost.exe 3668 explorer.exe 3668 explorer.exe 3960 svchost.exe 3960 svchost.exe 3668 explorer.exe 3668 explorer.exe 3960 svchost.exe 3960 svchost.exe 3668 explorer.exe 3668 explorer.exe 3960 svchost.exe 3960 svchost.exe 3668 explorer.exe 3668 explorer.exe 3960 svchost.exe 3960 svchost.exe 3668 explorer.exe 3668 explorer.exe 3960 svchost.exe 3960 svchost.exe 3668 explorer.exe 3668 explorer.exe 3960 svchost.exe 3960 svchost.exe 3668 explorer.exe 3668 explorer.exe 3960 svchost.exe 3960 svchost.exe 3668 explorer.exe 3668 explorer.exe 3960 svchost.exe 3960 svchost.exe 3668 explorer.exe 3668 explorer.exe 3960 svchost.exe 3960 svchost.exe 3668 explorer.exe 3668 explorer.exe 3960 svchost.exe 3960 svchost.exe 3668 explorer.exe 3668 explorer.exe 3960 svchost.exe 3960 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 3668 explorer.exe 3960 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1644 36c694d94e65408b05e8995078b32f08cd93269e8d5b6c43ef738f4af87d7e50.exe 1644 36c694d94e65408b05e8995078b32f08cd93269e8d5b6c43ef738f4af87d7e50.exe 3668 explorer.exe 3668 explorer.exe 4620 spoolsv.exe 4620 spoolsv.exe 3960 svchost.exe 3960 svchost.exe 1020 spoolsv.exe 1020 spoolsv.exe 3668 explorer.exe 3668 explorer.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1644 wrote to memory of 3668 1644 36c694d94e65408b05e8995078b32f08cd93269e8d5b6c43ef738f4af87d7e50.exe 80 PID 1644 wrote to memory of 3668 1644 36c694d94e65408b05e8995078b32f08cd93269e8d5b6c43ef738f4af87d7e50.exe 80 PID 1644 wrote to memory of 3668 1644 36c694d94e65408b05e8995078b32f08cd93269e8d5b6c43ef738f4af87d7e50.exe 80 PID 3668 wrote to memory of 4620 3668 explorer.exe 81 PID 3668 wrote to memory of 4620 3668 explorer.exe 81 PID 3668 wrote to memory of 4620 3668 explorer.exe 81 PID 4620 wrote to memory of 3960 4620 spoolsv.exe 82 PID 4620 wrote to memory of 3960 4620 spoolsv.exe 82 PID 4620 wrote to memory of 3960 4620 spoolsv.exe 82 PID 3960 wrote to memory of 1020 3960 svchost.exe 83 PID 3960 wrote to memory of 1020 3960 svchost.exe 83 PID 3960 wrote to memory of 1020 3960 svchost.exe 83 PID 3960 wrote to memory of 1492 3960 svchost.exe 84 PID 3960 wrote to memory of 1492 3960 svchost.exe 84 PID 3960 wrote to memory of 1492 3960 svchost.exe 84 PID 3960 wrote to memory of 1380 3960 svchost.exe 94 PID 3960 wrote to memory of 1380 3960 svchost.exe 94 PID 3960 wrote to memory of 1380 3960 svchost.exe 94 PID 3960 wrote to memory of 3944 3960 svchost.exe 96 PID 3960 wrote to memory of 3944 3960 svchost.exe 96 PID 3960 wrote to memory of 3944 3960 svchost.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\36c694d94e65408b05e8995078b32f08cd93269e8d5b6c43ef738f4af87d7e50.exe"C:\Users\Admin\AppData\Local\Temp\36c694d94e65408b05e8995078b32f08cd93269e8d5b6c43ef738f4af87d7e50.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1644 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3668 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4620 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3960 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1020
-
-
C:\Windows\SysWOW64\at.exeat 21:24 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:1492
-
-
C:\Windows\SysWOW64\at.exeat 21:25 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:1380
-
-
C:\Windows\SysWOW64\at.exeat 21:26 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:3944
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD5f519e1ec1d3f0e3750ce04854923f5e4
SHA1dfe09156b87cb02df5e0296aacd4cd643ee647ff
SHA256e0d2170d17dfffcc7bd79306bbefb097b86e8ec05108842fc32811cc2df02895
SHA5127404b9cd081ef2249f84fcbbc97826c35ac32e1b8e1b24892489153f35e57b505ccf440c5cfd0933e8265c5c38e5f3492eb6604a98e0c7e6f3571dc81076bede
-
Filesize
65KB
MD581df875280196978b2a8bf05306b195e
SHA114f65468f29f08c4ce3b2b040d0e43f7ee1fc0ce
SHA2569c46ca9a5123e71770ba142bd5b4e568a565cdbb9577ed828a43e9c0e6c37e9f
SHA512d4597af6c2a62741ea6bfd76c6e5957e9dd7b20ffa0bccbed25ba7c14b3d773f47813546963bfdee849044c0c25ffd96efc7ad49486f6b9dbdd8db37d62ba026
-
Filesize
65KB
MD538075ea83aa8dffbdc1e07e0fb5a0038
SHA15450d7af0492cdecf5ab8570edc6098cb69df038
SHA256b6b94d86b5cfd06075280ff609b0086a15fd2a642476f260e86612db9b064c57
SHA5121ddf4ffd767207fbb6be51d426d67777fef27b7ef8fd4ce616ff316782cf681aff0de63385613db64aa2d85f59cf59b47970dfcf7d119474728a6fb91cfa4284
-
Filesize
65KB
MD5f8b9879475d94ae7a487d77d8bb39eb3
SHA1b3c5bb5f21f2598294491d03136d551fa61cbf2d
SHA256e80c4a331919c2f7dd38add723a1874d7b16fe6df1c24af6d045d2d210507a25
SHA512a2274f3a32d569cfaaaa20d576f3e4cc906f90e2d79db0b329f4a63887e5fa0932ee40c35d148c47906b386e2be48ae45b09ae911ebde4b6a5f5a26265bdf7c0