Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/06/2024, 21:22

General

  • Target

    36c694d94e65408b05e8995078b32f08cd93269e8d5b6c43ef738f4af87d7e50.exe

  • Size

    65KB

  • MD5

    f34c59e9842a061d69e4cf7c3376ed6b

  • SHA1

    05945b177f16120c8a1e708aeb3e4c34fb12d4f0

  • SHA256

    36c694d94e65408b05e8995078b32f08cd93269e8d5b6c43ef738f4af87d7e50

  • SHA512

    a4506e556db64874c6b3d2a7106e77bb97cfa91041fc3db6b9f90cc8b754525be9eec2de9ac55362d5613ed023e60e80c3e61939fde682135c373315339f3281

  • SSDEEP

    1536:ECq3yRuqrI01eArdW/O7JnI2e13XiLij40MkTUVqa/Oum:7WNqkOJWmo1HpM0MkTUmum

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Modifies Installed Components in the registry 2 TTPs 8 IoCs
  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\36c694d94e65408b05e8995078b32f08cd93269e8d5b6c43ef738f4af87d7e50.exe
    "C:\Users\Admin\AppData\Local\Temp\36c694d94e65408b05e8995078b32f08cd93269e8d5b6c43ef738f4af87d7e50.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1644
    • \??\c:\windows\system\explorer.exe
      c:\windows\system\explorer.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visiblity of hidden/system files in Explorer
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3668
      • \??\c:\windows\system\spoolsv.exe
        c:\windows\system\spoolsv.exe SE
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4620
        • \??\c:\windows\system\svchost.exe
          c:\windows\system\svchost.exe
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visiblity of hidden/system files in Explorer
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:3960
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe PR
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:1020
          • C:\Windows\SysWOW64\at.exe
            at 21:24 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
            5⤵
              PID:1492
            • C:\Windows\SysWOW64\at.exe
              at 21:25 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
              5⤵
                PID:1380
              • C:\Windows\SysWOW64\at.exe
                at 21:26 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
                5⤵
                  PID:3944

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\mrsys.exe

          Filesize

          65KB

          MD5

          f519e1ec1d3f0e3750ce04854923f5e4

          SHA1

          dfe09156b87cb02df5e0296aacd4cd643ee647ff

          SHA256

          e0d2170d17dfffcc7bd79306bbefb097b86e8ec05108842fc32811cc2df02895

          SHA512

          7404b9cd081ef2249f84fcbbc97826c35ac32e1b8e1b24892489153f35e57b505ccf440c5cfd0933e8265c5c38e5f3492eb6604a98e0c7e6f3571dc81076bede

        • C:\Windows\System\explorer.exe

          Filesize

          65KB

          MD5

          81df875280196978b2a8bf05306b195e

          SHA1

          14f65468f29f08c4ce3b2b040d0e43f7ee1fc0ce

          SHA256

          9c46ca9a5123e71770ba142bd5b4e568a565cdbb9577ed828a43e9c0e6c37e9f

          SHA512

          d4597af6c2a62741ea6bfd76c6e5957e9dd7b20ffa0bccbed25ba7c14b3d773f47813546963bfdee849044c0c25ffd96efc7ad49486f6b9dbdd8db37d62ba026

        • C:\Windows\System\spoolsv.exe

          Filesize

          65KB

          MD5

          38075ea83aa8dffbdc1e07e0fb5a0038

          SHA1

          5450d7af0492cdecf5ab8570edc6098cb69df038

          SHA256

          b6b94d86b5cfd06075280ff609b0086a15fd2a642476f260e86612db9b064c57

          SHA512

          1ddf4ffd767207fbb6be51d426d67777fef27b7ef8fd4ce616ff316782cf681aff0de63385613db64aa2d85f59cf59b47970dfcf7d119474728a6fb91cfa4284

        • C:\Windows\System\svchost.exe

          Filesize

          65KB

          MD5

          f8b9879475d94ae7a487d77d8bb39eb3

          SHA1

          b3c5bb5f21f2598294491d03136d551fa61cbf2d

          SHA256

          e80c4a331919c2f7dd38add723a1874d7b16fe6df1c24af6d045d2d210507a25

          SHA512

          a2274f3a32d569cfaaaa20d576f3e4cc906f90e2d79db0b329f4a63887e5fa0932ee40c35d148c47906b386e2be48ae45b09ae911ebde4b6a5f5a26265bdf7c0

        • memory/1020-45-0x0000000074DA0000-0x0000000074EFD000-memory.dmp

          Filesize

          1.4MB

        • memory/1020-53-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/1644-0-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/1644-6-0x0000000000401000-0x000000000042E000-memory.dmp

          Filesize

          180KB

        • memory/1644-56-0x0000000000401000-0x000000000042E000-memory.dmp

          Filesize

          180KB

        • memory/1644-55-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/1644-3-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/1644-2-0x0000000074DA0000-0x0000000074EFD000-memory.dmp

          Filesize

          1.4MB

        • memory/1644-1-0x00000000001C0000-0x00000000001C4000-memory.dmp

          Filesize

          16KB

        • memory/3668-14-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/3668-17-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/3668-15-0x0000000074DA0000-0x0000000074EFD000-memory.dmp

          Filesize

          1.4MB

        • memory/3668-13-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/3668-58-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/3668-69-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/3960-38-0x0000000074DA0000-0x0000000074EFD000-memory.dmp

          Filesize

          1.4MB

        • memory/3960-42-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/3960-60-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/4620-31-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/4620-27-0x0000000074DA0000-0x0000000074EFD000-memory.dmp

          Filesize

          1.4MB

        • memory/4620-26-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/4620-54-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB