Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10/06/2024, 11:49
Static task
static1
Behavioral task
behavioral1
Sample
49c43f4b6b46642ef80ea0720fd4aa272ab33749bfc7b8e7449852fd3753afc6.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
49c43f4b6b46642ef80ea0720fd4aa272ab33749bfc7b8e7449852fd3753afc6.exe
Resource
win10v2004-20240508-en
General
-
Target
49c43f4b6b46642ef80ea0720fd4aa272ab33749bfc7b8e7449852fd3753afc6.exe
-
Size
65KB
-
MD5
94ab93ffcd0e6b2d04ffc12dcc71a7b6
-
SHA1
2ea97e1684433771d31076576fbda8aa99feac20
-
SHA256
49c43f4b6b46642ef80ea0720fd4aa272ab33749bfc7b8e7449852fd3753afc6
-
SHA512
d455d755633abd0754dea452a093bc816eaa1f01cfb95e6de154d3ca1529f41cb905836a804a672c16b428933bebca7cc8baa5506e87a8dd806686ca9d05ad55
-
SSDEEP
1536:ECq3yRuqrI01eArdW/O7JnI2e13XiLij40MkTUVqa/OuP:7WNqkOJWmo1HpM0MkTUmuP
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 3936 explorer.exe 3656 spoolsv.exe 2808 svchost.exe 3984 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\system\udsys.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe 49c43f4b6b46642ef80ea0720fd4aa272ab33749bfc7b8e7449852fd3753afc6.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4508 49c43f4b6b46642ef80ea0720fd4aa272ab33749bfc7b8e7449852fd3753afc6.exe 4508 49c43f4b6b46642ef80ea0720fd4aa272ab33749bfc7b8e7449852fd3753afc6.exe 3936 explorer.exe 3936 explorer.exe 3936 explorer.exe 3936 explorer.exe 3936 explorer.exe 3936 explorer.exe 3936 explorer.exe 2808 svchost.exe 3936 explorer.exe 2808 svchost.exe 2808 svchost.exe 2808 svchost.exe 3936 explorer.exe 2808 svchost.exe 3936 explorer.exe 2808 svchost.exe 2808 svchost.exe 3936 explorer.exe 2808 svchost.exe 3936 explorer.exe 3936 explorer.exe 2808 svchost.exe 3936 explorer.exe 2808 svchost.exe 3936 explorer.exe 2808 svchost.exe 3936 explorer.exe 2808 svchost.exe 3936 explorer.exe 2808 svchost.exe 3936 explorer.exe 2808 svchost.exe 3936 explorer.exe 2808 svchost.exe 3936 explorer.exe 2808 svchost.exe 3936 explorer.exe 2808 svchost.exe 3936 explorer.exe 2808 svchost.exe 3936 explorer.exe 2808 svchost.exe 3936 explorer.exe 2808 svchost.exe 2808 svchost.exe 3936 explorer.exe 3936 explorer.exe 2808 svchost.exe 2808 svchost.exe 2808 svchost.exe 3936 explorer.exe 3936 explorer.exe 3936 explorer.exe 3936 explorer.exe 2808 svchost.exe 2808 svchost.exe 2808 svchost.exe 3936 explorer.exe 3936 explorer.exe 2808 svchost.exe 2808 svchost.exe 3936 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 3936 explorer.exe 2808 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 4508 49c43f4b6b46642ef80ea0720fd4aa272ab33749bfc7b8e7449852fd3753afc6.exe 4508 49c43f4b6b46642ef80ea0720fd4aa272ab33749bfc7b8e7449852fd3753afc6.exe 3936 explorer.exe 3936 explorer.exe 3656 spoolsv.exe 3656 spoolsv.exe 2808 svchost.exe 2808 svchost.exe 3984 spoolsv.exe 3984 spoolsv.exe 3936 explorer.exe 3936 explorer.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 4508 wrote to memory of 3936 4508 49c43f4b6b46642ef80ea0720fd4aa272ab33749bfc7b8e7449852fd3753afc6.exe 82 PID 4508 wrote to memory of 3936 4508 49c43f4b6b46642ef80ea0720fd4aa272ab33749bfc7b8e7449852fd3753afc6.exe 82 PID 4508 wrote to memory of 3936 4508 49c43f4b6b46642ef80ea0720fd4aa272ab33749bfc7b8e7449852fd3753afc6.exe 82 PID 3936 wrote to memory of 3656 3936 explorer.exe 83 PID 3936 wrote to memory of 3656 3936 explorer.exe 83 PID 3936 wrote to memory of 3656 3936 explorer.exe 83 PID 3656 wrote to memory of 2808 3656 spoolsv.exe 84 PID 3656 wrote to memory of 2808 3656 spoolsv.exe 84 PID 3656 wrote to memory of 2808 3656 spoolsv.exe 84 PID 2808 wrote to memory of 3984 2808 svchost.exe 86 PID 2808 wrote to memory of 3984 2808 svchost.exe 86 PID 2808 wrote to memory of 3984 2808 svchost.exe 86 PID 2808 wrote to memory of 4556 2808 svchost.exe 88 PID 2808 wrote to memory of 4556 2808 svchost.exe 88 PID 2808 wrote to memory of 4556 2808 svchost.exe 88 PID 2808 wrote to memory of 3980 2808 svchost.exe 99 PID 2808 wrote to memory of 3980 2808 svchost.exe 99 PID 2808 wrote to memory of 3980 2808 svchost.exe 99 PID 2808 wrote to memory of 4368 2808 svchost.exe 101 PID 2808 wrote to memory of 4368 2808 svchost.exe 101 PID 2808 wrote to memory of 4368 2808 svchost.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\49c43f4b6b46642ef80ea0720fd4aa272ab33749bfc7b8e7449852fd3753afc6.exe"C:\Users\Admin\AppData\Local\Temp\49c43f4b6b46642ef80ea0720fd4aa272ab33749bfc7b8e7449852fd3753afc6.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4508 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3936 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3656 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2808 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3984
-
-
C:\Windows\SysWOW64\at.exeat 11:51 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:4556
-
-
C:\Windows\SysWOW64\at.exeat 11:52 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:3980
-
-
C:\Windows\SysWOW64\at.exeat 11:53 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:4368
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD52b531b41b3dc14237c2e0b1f1fe8cb5d
SHA1037c7f9fb187b1ce427f86620f815e6adfab8ab8
SHA256dca496b27bb6edac4c1a40fcbe400947976c0e3c510e907d4830d7e6593bd7b3
SHA5125001a66a7633fc55c63963f45e64747dbaf2e3403746fc7782355c64461135c7ba91341ad0ffcd9ecae7e1d79cf6b41588ec0c78f075db62eed323ae42b5c9a4
-
Filesize
65KB
MD5f0851c0f215fd229e86b6b6adc6e327c
SHA193a4b5f421ed62ee7da3d36f6830c55c7c386ea8
SHA256e3fef39e83dd6bdb0f372df00de309144da529669fb9efa7f91f00154376589b
SHA5124446fbe8daf06213dc3e24b8c8281d58816e3a6c8057308a7c3c81b3b6976fe6fe9571c9518c8850a0931638b5f07ba389994a6696f2fb6fb4fd934122404972
-
Filesize
65KB
MD509df32baacd1645e819117e7a31afd7a
SHA1b7839039dfb5c23da4e27d7a52bf246d948a5d26
SHA256e13cf053fe06fc9d8fb5fec81b2169bfa94aca2572c865f3e342730f732ce088
SHA51299687decff9ac77c7df0993eecebf850282a30e7513ab1fd11a8ceb5c9cb394ffd9df9bed736d5c9db87d4b7f045edda50b8f462358d8489206dedd5ae8f7143
-
Filesize
65KB
MD5ab263e269d713875572debf3d7b88645
SHA148e1b665385189d6e5a24f34b42fb5123670bf06
SHA256e24de185a7c107b8883ebd0fd7bf7cca7eae96fe5675aa5dd25d5aff380051d1
SHA512895d66c21c5e114f1db122e29590726a388268a0f5ca577d007fc6385c182ec9848252f7334f142ebc555abf846005b410a99c4be802d4f4482e8f17dbbff41c