Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
09/06/2024, 03:20 UTC
Static task
static1
Behavioral task
behavioral1
Sample
6fddec5d8fc66bcf441e99b2a3be8830.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
6fddec5d8fc66bcf441e99b2a3be8830.exe
Resource
win10v2004-20240508-en
General
-
Target
6fddec5d8fc66bcf441e99b2a3be8830.exe
-
Size
65KB
-
MD5
6fddec5d8fc66bcf441e99b2a3be8830
-
SHA1
a23f13a250c72c7e033accffcad88c5e3bab5ab4
-
SHA256
d0203818d3d8b32bf5a293d29cb4fef1ccfe0502ca8207977dd70430306f2121
-
SHA512
f4fe79af6cf7836406f6243338ab0f949cfc8ab551a15adc685dd15fb288ce2a037a7c4daf56b80e19e4acbcfc64d1d4695df391c671a8037e1da52a636387ed
-
SSDEEP
1536:ECq3yRuqrI01eArdW/O7JnI2e13XiLij40MkTUVqa/Ouh:7WNqkOJWmo1HpM0MkTUmuh
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 2760 explorer.exe 2828 spoolsv.exe 2776 svchost.exe 2520 spoolsv.exe -
Loads dropped DLL 8 IoCs
pid Process 1028 6fddec5d8fc66bcf441e99b2a3be8830.exe 1028 6fddec5d8fc66bcf441e99b2a3be8830.exe 2760 explorer.exe 2760 explorer.exe 2828 spoolsv.exe 2828 spoolsv.exe 2776 svchost.exe 2776 svchost.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe 6fddec5d8fc66bcf441e99b2a3be8830.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1028 6fddec5d8fc66bcf441e99b2a3be8830.exe 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe 2776 svchost.exe 2776 svchost.exe 2760 explorer.exe 2776 svchost.exe 2760 explorer.exe 2776 svchost.exe 2760 explorer.exe 2776 svchost.exe 2760 explorer.exe 2776 svchost.exe 2760 explorer.exe 2776 svchost.exe 2760 explorer.exe 2776 svchost.exe 2760 explorer.exe 2776 svchost.exe 2760 explorer.exe 2776 svchost.exe 2760 explorer.exe 2776 svchost.exe 2760 explorer.exe 2776 svchost.exe 2760 explorer.exe 2776 svchost.exe 2760 explorer.exe 2776 svchost.exe 2760 explorer.exe 2776 svchost.exe 2760 explorer.exe 2776 svchost.exe 2760 explorer.exe 2776 svchost.exe 2760 explorer.exe 2776 svchost.exe 2760 explorer.exe 2776 svchost.exe 2760 explorer.exe 2776 svchost.exe 2760 explorer.exe 2776 svchost.exe 2760 explorer.exe 2776 svchost.exe 2760 explorer.exe 2776 svchost.exe 2760 explorer.exe 2776 svchost.exe 2760 explorer.exe 2776 svchost.exe 2760 explorer.exe 2776 svchost.exe 2760 explorer.exe 2776 svchost.exe 2760 explorer.exe 2776 svchost.exe 2760 explorer.exe 2776 svchost.exe 2760 explorer.exe 2776 svchost.exe 2760 explorer.exe 2776 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2760 explorer.exe 2776 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1028 6fddec5d8fc66bcf441e99b2a3be8830.exe 1028 6fddec5d8fc66bcf441e99b2a3be8830.exe 2760 explorer.exe 2760 explorer.exe 2828 spoolsv.exe 2828 spoolsv.exe 2776 svchost.exe 2776 svchost.exe 2520 spoolsv.exe 2520 spoolsv.exe 2760 explorer.exe 2760 explorer.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1028 wrote to memory of 2760 1028 6fddec5d8fc66bcf441e99b2a3be8830.exe 28 PID 1028 wrote to memory of 2760 1028 6fddec5d8fc66bcf441e99b2a3be8830.exe 28 PID 1028 wrote to memory of 2760 1028 6fddec5d8fc66bcf441e99b2a3be8830.exe 28 PID 1028 wrote to memory of 2760 1028 6fddec5d8fc66bcf441e99b2a3be8830.exe 28 PID 2760 wrote to memory of 2828 2760 explorer.exe 29 PID 2760 wrote to memory of 2828 2760 explorer.exe 29 PID 2760 wrote to memory of 2828 2760 explorer.exe 29 PID 2760 wrote to memory of 2828 2760 explorer.exe 29 PID 2828 wrote to memory of 2776 2828 spoolsv.exe 30 PID 2828 wrote to memory of 2776 2828 spoolsv.exe 30 PID 2828 wrote to memory of 2776 2828 spoolsv.exe 30 PID 2828 wrote to memory of 2776 2828 spoolsv.exe 30 PID 2776 wrote to memory of 2520 2776 svchost.exe 31 PID 2776 wrote to memory of 2520 2776 svchost.exe 31 PID 2776 wrote to memory of 2520 2776 svchost.exe 31 PID 2776 wrote to memory of 2520 2776 svchost.exe 31 PID 2776 wrote to memory of 2088 2776 svchost.exe 32 PID 2776 wrote to memory of 2088 2776 svchost.exe 32 PID 2776 wrote to memory of 2088 2776 svchost.exe 32 PID 2776 wrote to memory of 2088 2776 svchost.exe 32 PID 2776 wrote to memory of 1556 2776 svchost.exe 36 PID 2776 wrote to memory of 1556 2776 svchost.exe 36 PID 2776 wrote to memory of 1556 2776 svchost.exe 36 PID 2776 wrote to memory of 1556 2776 svchost.exe 36 PID 2776 wrote to memory of 904 2776 svchost.exe 38 PID 2776 wrote to memory of 904 2776 svchost.exe 38 PID 2776 wrote to memory of 904 2776 svchost.exe 38 PID 2776 wrote to memory of 904 2776 svchost.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\6fddec5d8fc66bcf441e99b2a3be8830.exe"C:\Users\Admin\AppData\Local\Temp\6fddec5d8fc66bcf441e99b2a3be8830.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1028 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2760 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2828 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2776 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2520
-
-
C:\Windows\SysWOW64\at.exeat 03:22 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:2088
-
-
C:\Windows\SysWOW64\at.exeat 03:23 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:1556
-
-
C:\Windows\SysWOW64\at.exeat 03:24 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:904
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD5f03926030f62591916770723b3c5c02d
SHA10120c997048d4be6386437cdb4252ba69b6772af
SHA25649d8aafae155b6f95cbac9144454625ca8ff22dacfc95bd63c47de6632644f53
SHA51222721da3dfeb852a513ebebab20c2fb3e91e631ed746c27d1bcba09f33adca536833204d018155efa958933448bfde727d75c7fdb565066300e0bdea94d74e32
-
Filesize
65KB
MD58dcdad81d8b72dc6a7d2186532d9f26c
SHA105adbe8365cba4549f9f58b003336cac8173326c
SHA2560c4e4a8254b22e83a686b30a5b4ddb68e5ac5a9059151dd575197805a276d34f
SHA512cae9968fe3e05a2270cb0eed39ca75fabb40991be22cd00b49a77e2a7088296d054390aa2cb52d20e847f60a3626a74f7bb9740667b0ada9c0591625f385004c
-
Filesize
65KB
MD5638c14db6b673a28c28ef194a04273a6
SHA17bc8c5b59c1e3832b55c5f2cd1a2c9c6bedfa7e0
SHA25667fa1c9930321378026856833007854bc78561d38f87dc1072a410e4144f455f
SHA512505952bcb9d17ce344da5a4dca554618b8ac49ed55abe9f2f8c2c0df94913eadc2dd7d3846ca4d7e11d1914c42da3100e4fb3c6938a359493b44561b7325761e
-
Filesize
65KB
MD56e87f3b24c28551a713daa3fb07e571d
SHA11ac7d839983f6675ba5357427b031ebc0db8bc7c
SHA256a7bdd0f959cfe198c9aae36c06eca8b48daa583d2896ff7d5e743cb151483977
SHA512afcab7d259837d7a957f7c0b0ac79936a94a4a30d96fbb37ca3fc84755da30dfa1aebbfac895a00878bb404f97f1b8374ebc04764852fda43d75e8853e3c63d5