Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
10/06/2024, 14:51
Static task
static1
Behavioral task
behavioral1
Sample
933ab605c5393352301c1033a4b88613b0c47b833b8deea695a1e750f336f071.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
933ab605c5393352301c1033a4b88613b0c47b833b8deea695a1e750f336f071.exe
Resource
win10v2004-20240426-en
General
-
Target
933ab605c5393352301c1033a4b88613b0c47b833b8deea695a1e750f336f071.exe
-
Size
66KB
-
MD5
766daa59bb63db8c6743ea35e10ee3bf
-
SHA1
73e4b640c09ea9a74604422b6524f9cada87465d
-
SHA256
933ab605c5393352301c1033a4b88613b0c47b833b8deea695a1e750f336f071
-
SHA512
86952fe8682bec94f5db178c4a5ebf294ac14ae4da28f54b7fcb4b73bbd4d159a7943237776fa616b0da4d5cee9647e1f6f4ab847f0112f029e9ecdcb32cb659
-
SSDEEP
1536:EHfetdklPp+07gDSrB8Xru2zGeJxgawTzpXzrDJrXis:IeklMMYJhqezw/pXzH9is
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 3400 explorer.exe 4232 spoolsv.exe 2844 svchost.exe 4376 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe 933ab605c5393352301c1033a4b88613b0c47b833b8deea695a1e750f336f071.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2604 933ab605c5393352301c1033a4b88613b0c47b833b8deea695a1e750f336f071.exe 2604 933ab605c5393352301c1033a4b88613b0c47b833b8deea695a1e750f336f071.exe 3400 explorer.exe 3400 explorer.exe 3400 explorer.exe 3400 explorer.exe 3400 explorer.exe 3400 explorer.exe 3400 explorer.exe 2844 svchost.exe 3400 explorer.exe 2844 svchost.exe 2844 svchost.exe 2844 svchost.exe 2844 svchost.exe 3400 explorer.exe 3400 explorer.exe 2844 svchost.exe 3400 explorer.exe 2844 svchost.exe 3400 explorer.exe 2844 svchost.exe 3400 explorer.exe 2844 svchost.exe 3400 explorer.exe 2844 svchost.exe 2844 svchost.exe 3400 explorer.exe 3400 explorer.exe 2844 svchost.exe 3400 explorer.exe 2844 svchost.exe 3400 explorer.exe 2844 svchost.exe 3400 explorer.exe 2844 svchost.exe 3400 explorer.exe 2844 svchost.exe 3400 explorer.exe 2844 svchost.exe 3400 explorer.exe 2844 svchost.exe 3400 explorer.exe 2844 svchost.exe 3400 explorer.exe 2844 svchost.exe 3400 explorer.exe 2844 svchost.exe 3400 explorer.exe 2844 svchost.exe 3400 explorer.exe 2844 svchost.exe 3400 explorer.exe 2844 svchost.exe 3400 explorer.exe 2844 svchost.exe 3400 explorer.exe 2844 svchost.exe 3400 explorer.exe 2844 svchost.exe 3400 explorer.exe 2844 svchost.exe 3400 explorer.exe 2844 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 3400 explorer.exe 2844 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2604 933ab605c5393352301c1033a4b88613b0c47b833b8deea695a1e750f336f071.exe 2604 933ab605c5393352301c1033a4b88613b0c47b833b8deea695a1e750f336f071.exe 3400 explorer.exe 3400 explorer.exe 4232 spoolsv.exe 4232 spoolsv.exe 2844 svchost.exe 2844 svchost.exe 4376 spoolsv.exe 4376 spoolsv.exe 3400 explorer.exe 3400 explorer.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2604 wrote to memory of 3400 2604 933ab605c5393352301c1033a4b88613b0c47b833b8deea695a1e750f336f071.exe 80 PID 2604 wrote to memory of 3400 2604 933ab605c5393352301c1033a4b88613b0c47b833b8deea695a1e750f336f071.exe 80 PID 2604 wrote to memory of 3400 2604 933ab605c5393352301c1033a4b88613b0c47b833b8deea695a1e750f336f071.exe 80 PID 3400 wrote to memory of 4232 3400 explorer.exe 81 PID 3400 wrote to memory of 4232 3400 explorer.exe 81 PID 3400 wrote to memory of 4232 3400 explorer.exe 81 PID 4232 wrote to memory of 2844 4232 spoolsv.exe 82 PID 4232 wrote to memory of 2844 4232 spoolsv.exe 82 PID 4232 wrote to memory of 2844 4232 spoolsv.exe 82 PID 2844 wrote to memory of 4376 2844 svchost.exe 83 PID 2844 wrote to memory of 4376 2844 svchost.exe 83 PID 2844 wrote to memory of 4376 2844 svchost.exe 83 PID 2844 wrote to memory of 3512 2844 svchost.exe 84 PID 2844 wrote to memory of 3512 2844 svchost.exe 84 PID 2844 wrote to memory of 3512 2844 svchost.exe 84 PID 2844 wrote to memory of 1628 2844 svchost.exe 94 PID 2844 wrote to memory of 1628 2844 svchost.exe 94 PID 2844 wrote to memory of 1628 2844 svchost.exe 94 PID 2844 wrote to memory of 992 2844 svchost.exe 96 PID 2844 wrote to memory of 992 2844 svchost.exe 96 PID 2844 wrote to memory of 992 2844 svchost.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\933ab605c5393352301c1033a4b88613b0c47b833b8deea695a1e750f336f071.exe"C:\Users\Admin\AppData\Local\Temp\933ab605c5393352301c1033a4b88613b0c47b833b8deea695a1e750f336f071.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2604 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3400 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4232 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2844 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4376
-
-
C:\Windows\SysWOW64\at.exeat 14:53 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:3512
-
-
C:\Windows\SysWOW64\at.exeat 14:54 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:1628
-
-
C:\Windows\SysWOW64\at.exeat 14:55 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:992
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD5f3f56fb4f0cc96ef75bd49cc1a79d936
SHA19cd7df0c3a9527781c77e1651add94b09f422e6a
SHA256b37d8235161cef62b3e3eacd2c480db51485cec330619b713331256d4f1e580a
SHA512c5452ad59197984fb68667be7c17d2eca625d09953783816a002cfad700d23444b7113823ebedcd1e74b67d132de9327acaa8c881be4155953fb0c1aa3e63f46
-
Filesize
66KB
MD5f0559233ea8912ac0edd36040b9e4b2b
SHA123b0d585c0636db4bff00a1cc52a76f36ba10943
SHA256e509b113127a505456f6a9209cf7a32bf8fa7be925b5747ac16c8c911e53be2e
SHA512f9dde8059c25c0d41d18a702423c06faa0627a85cea8edacb460b46373fc26deede033480c01a05abf9fdcc5ed22f4134b6c2a9ca78ad461a8fbaa38c0cb98e2
-
Filesize
66KB
MD55f756fb5207dbff8952cbafbf3986695
SHA13993d451311ee498a8caa58cda7ac15498b2448b
SHA256c7b53c2d3c8cd76583452be771d7df91a4850070d30e05d2b69e62d3028765dd
SHA512ee8282afdd9f01c541dec3d8c99da7f29a62e9afd804f5224a3c5087658e133ed9411c9b6a9a05787bd56a154b3201f630f1eb9071c43c54bd38639d22c2355d
-
Filesize
66KB
MD511f47980450f187e30b8818f62f8d59a
SHA16a585f7718d3d2f854233d4bcea738043bd6c789
SHA25653af2d32384c3391ac627bb843fc81ff60d8aac0f3e22c050023f5d991d9e531
SHA5126fadc4ab7835124880745ca9aba7fe0f18406fd8ea586f9a2d5084af2353197f0d41fe33ad1758cb6d846875c5beec3807e5340bd045dce3f6e53c58284482b9