Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    09/06/2024, 09:29

General

  • Target

    c9b924e833a8196e85215a4de2b2dac97a615050e1542a483703011a3bcf7083.exe

  • Size

    65KB

  • MD5

    aa531d6157cc02a3909d85d3f38a12c8

  • SHA1

    08cb365b3c3143eaae2236841f6f2aa0d33e8565

  • SHA256

    c9b924e833a8196e85215a4de2b2dac97a615050e1542a483703011a3bcf7083

  • SHA512

    64b0b10c7ab71e0084614d9967b2e80bbd45a8794adb2ad13f0449c12d0ef73c49e17f68408d035f9b773f690a3b1ba48290d642a32c9bf0b4391e218ee3fc28

  • SSDEEP

    1536:ECq3yRuqrI01eArdW/O7JnI2e13XiLij40MkTUVqa/Oun:7WNqkOJWmo1HpM0MkTUmun

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Modifies Installed Components in the registry 2 TTPs 8 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 8 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c9b924e833a8196e85215a4de2b2dac97a615050e1542a483703011a3bcf7083.exe
    "C:\Users\Admin\AppData\Local\Temp\c9b924e833a8196e85215a4de2b2dac97a615050e1542a483703011a3bcf7083.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2916
    • \??\c:\windows\system\explorer.exe
      c:\windows\system\explorer.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visiblity of hidden/system files in Explorer
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3052
      • \??\c:\windows\system\spoolsv.exe
        c:\windows\system\spoolsv.exe SE
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2588
        • \??\c:\windows\system\svchost.exe
          c:\windows\system\svchost.exe
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visiblity of hidden/system files in Explorer
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2864
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe PR
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:2572
          • C:\Windows\SysWOW64\at.exe
            at 09:32 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
            5⤵
              PID:2944
            • C:\Windows\SysWOW64\at.exe
              at 09:33 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
              5⤵
                PID:1716
              • C:\Windows\SysWOW64\at.exe
                at 09:34 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
                5⤵
                  PID:384

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\mrsys.exe

          Filesize

          65KB

          MD5

          2d9f9f97c71127e1625aae37e3c010eb

          SHA1

          a3aeb87d95eeeab332deaa71803d385f175e2b7a

          SHA256

          74a7c3fd88bdc8bf94c1f35139e312b836ce556e01569e2407e2c073a0639c14

          SHA512

          320b2b4306b4ea7eb50423c597a2d6319ae356cec4bbb86afdad2ca760179c58afd7b80685b752ff763ed487655da4a676b5ca889f6f1d0a524532e248f1d5f1

        • \Windows\system\explorer.exe

          Filesize

          65KB

          MD5

          74845602994a7c090afa50ff5a5bce15

          SHA1

          3293ed9ca5414c7b61a7307fe75618c1773e5e62

          SHA256

          13a981e4e3d382ea008a6d96a2587fbcbd41617e8385774e2fad845abe46a2e8

          SHA512

          eadb909b837c62e193f3ebefcdbcd049126c683a81718ca83bb064b00024ccbb8b32b61604f5cd23346679e4f589714e285f053d27cdabe96cfcf4de6108592c

        • \Windows\system\spoolsv.exe

          Filesize

          65KB

          MD5

          223e7694f0beb3d5e028ed70e9df2e9b

          SHA1

          62805f3059ca6bd3ea322dbb95c5e798aaa698ef

          SHA256

          004879728c2bc106cab522fa2cf167b9501cf34bd2247188bb47e96752be37b5

          SHA512

          cba06b602cdedc6acf3912ac7852a04cd96ccde7c52a390fc0eaa4e6fcd7b8bf48dcc4f3d4d22ac5e604a4362535721b5e0ad5ebef7035842377068dc0a9b33a

        • \Windows\system\svchost.exe

          Filesize

          65KB

          MD5

          0189a3a08273878a4611809b6bd1e5b2

          SHA1

          f6b7b4cf019e2914c2f44f5d9a6dc47935e8c633

          SHA256

          a2eeb79a08484722c9231df216559694ec874f661d87ebac182c931b75f4cf6d

          SHA512

          9954b293f1dd9bf72baddbe16c8359fb8e46c2dc6fe8aaaafbb7b92a099e0e689fe370686a5a3090f82e6505ad5ab8b5da1c9c4838d7862c9a05cf181cf52a5a

        • memory/2572-68-0x0000000072940000-0x0000000072A93000-memory.dmp

          Filesize

          1.3MB

        • memory/2572-74-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/2588-36-0x0000000072940000-0x0000000072A93000-memory.dmp

          Filesize

          1.3MB

        • memory/2588-78-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/2588-54-0x00000000025A0000-0x00000000025D1000-memory.dmp

          Filesize

          196KB

        • memory/2588-40-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/2588-52-0x00000000025A0000-0x00000000025D1000-memory.dmp

          Filesize

          196KB

        • memory/2864-56-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/2864-57-0x0000000072940000-0x0000000072A93000-memory.dmp

          Filesize

          1.3MB

        • memory/2864-61-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/2864-83-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/2916-53-0x0000000000401000-0x000000000042E000-memory.dmp

          Filesize

          180KB

        • memory/2916-80-0x0000000000401000-0x000000000042E000-memory.dmp

          Filesize

          180KB

        • memory/2916-47-0x0000000000020000-0x0000000000024000-memory.dmp

          Filesize

          16KB

        • memory/2916-0-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/2916-3-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/2916-1-0x0000000000020000-0x0000000000024000-memory.dmp

          Filesize

          16KB

        • memory/2916-2-0x0000000072940000-0x0000000072A93000-memory.dmp

          Filesize

          1.3MB

        • memory/2916-16-0x0000000003210000-0x0000000003241000-memory.dmp

          Filesize

          196KB

        • memory/2916-17-0x0000000003210000-0x0000000003241000-memory.dmp

          Filesize

          196KB

        • memory/2916-79-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/2916-4-0x0000000000401000-0x000000000042E000-memory.dmp

          Filesize

          180KB

        • memory/3052-19-0x0000000072940000-0x0000000072A93000-memory.dmp

          Filesize

          1.3MB

        • memory/3052-65-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/3052-82-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/3052-23-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/3052-92-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/3052-35-0x0000000002330000-0x0000000002361000-memory.dmp

          Filesize

          196KB