Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11/06/2024, 22:51
Static task
static1
Behavioral task
behavioral1
Sample
65b938e7fa958188eb05272c548b5849f71826c882eacbf334e476324562cbaf.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
65b938e7fa958188eb05272c548b5849f71826c882eacbf334e476324562cbaf.exe
Resource
win10v2004-20240508-en
General
-
Target
65b938e7fa958188eb05272c548b5849f71826c882eacbf334e476324562cbaf.exe
-
Size
66KB
-
MD5
64e0703fdb2060ad9a9b51a956395a2f
-
SHA1
fb6fbc8a78f093c28325577d8a2fa59a94d44985
-
SHA256
65b938e7fa958188eb05272c548b5849f71826c882eacbf334e476324562cbaf
-
SHA512
0786af8d971904a1942b7cbe055235d899d455e1f1e3950a03b9d0f56fb8f6065667b36a819ebedab128e2ff0dcda6e72b0762351c8b0279d661ce2d857073dc
-
SSDEEP
1536:EHfetdklPp+07gDSrB8Xru2zGeJxgawTzpXzrDJrXiF:IeklMMYJhqezw/pXzH9iF
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 2628 explorer.exe 2232 spoolsv.exe 4048 svchost.exe 4948 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification \??\c:\windows\system\explorer.exe 65b938e7fa958188eb05272c548b5849f71826c882eacbf334e476324562cbaf.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 352 65b938e7fa958188eb05272c548b5849f71826c882eacbf334e476324562cbaf.exe 352 65b938e7fa958188eb05272c548b5849f71826c882eacbf334e476324562cbaf.exe 2628 explorer.exe 2628 explorer.exe 2628 explorer.exe 2628 explorer.exe 2628 explorer.exe 2628 explorer.exe 4048 svchost.exe 4048 svchost.exe 4048 svchost.exe 4048 svchost.exe 2628 explorer.exe 2628 explorer.exe 4048 svchost.exe 4048 svchost.exe 2628 explorer.exe 2628 explorer.exe 4048 svchost.exe 4048 svchost.exe 2628 explorer.exe 2628 explorer.exe 4048 svchost.exe 4048 svchost.exe 2628 explorer.exe 2628 explorer.exe 4048 svchost.exe 4048 svchost.exe 2628 explorer.exe 2628 explorer.exe 4048 svchost.exe 4048 svchost.exe 2628 explorer.exe 2628 explorer.exe 4048 svchost.exe 4048 svchost.exe 2628 explorer.exe 2628 explorer.exe 4048 svchost.exe 4048 svchost.exe 2628 explorer.exe 2628 explorer.exe 4048 svchost.exe 4048 svchost.exe 2628 explorer.exe 2628 explorer.exe 4048 svchost.exe 4048 svchost.exe 2628 explorer.exe 2628 explorer.exe 4048 svchost.exe 4048 svchost.exe 2628 explorer.exe 2628 explorer.exe 4048 svchost.exe 4048 svchost.exe 2628 explorer.exe 2628 explorer.exe 4048 svchost.exe 4048 svchost.exe 2628 explorer.exe 2628 explorer.exe 4048 svchost.exe 4048 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2628 explorer.exe 4048 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 352 65b938e7fa958188eb05272c548b5849f71826c882eacbf334e476324562cbaf.exe 352 65b938e7fa958188eb05272c548b5849f71826c882eacbf334e476324562cbaf.exe 2628 explorer.exe 2628 explorer.exe 2232 spoolsv.exe 2232 spoolsv.exe 4048 svchost.exe 4048 svchost.exe 4948 spoolsv.exe 4948 spoolsv.exe 2628 explorer.exe 2628 explorer.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 352 wrote to memory of 2628 352 65b938e7fa958188eb05272c548b5849f71826c882eacbf334e476324562cbaf.exe 83 PID 352 wrote to memory of 2628 352 65b938e7fa958188eb05272c548b5849f71826c882eacbf334e476324562cbaf.exe 83 PID 352 wrote to memory of 2628 352 65b938e7fa958188eb05272c548b5849f71826c882eacbf334e476324562cbaf.exe 83 PID 2628 wrote to memory of 2232 2628 explorer.exe 85 PID 2628 wrote to memory of 2232 2628 explorer.exe 85 PID 2628 wrote to memory of 2232 2628 explorer.exe 85 PID 2232 wrote to memory of 4048 2232 spoolsv.exe 86 PID 2232 wrote to memory of 4048 2232 spoolsv.exe 86 PID 2232 wrote to memory of 4048 2232 spoolsv.exe 86 PID 4048 wrote to memory of 4948 4048 svchost.exe 87 PID 4048 wrote to memory of 4948 4048 svchost.exe 87 PID 4048 wrote to memory of 4948 4048 svchost.exe 87 PID 4048 wrote to memory of 2948 4048 svchost.exe 88 PID 4048 wrote to memory of 2948 4048 svchost.exe 88 PID 4048 wrote to memory of 2948 4048 svchost.exe 88 PID 4048 wrote to memory of 1004 4048 svchost.exe 99 PID 4048 wrote to memory of 1004 4048 svchost.exe 99 PID 4048 wrote to memory of 1004 4048 svchost.exe 99 PID 4048 wrote to memory of 2472 4048 svchost.exe 101 PID 4048 wrote to memory of 2472 4048 svchost.exe 101 PID 4048 wrote to memory of 2472 4048 svchost.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\65b938e7fa958188eb05272c548b5849f71826c882eacbf334e476324562cbaf.exe"C:\Users\Admin\AppData\Local\Temp\65b938e7fa958188eb05272c548b5849f71826c882eacbf334e476324562cbaf.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:352 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2628 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2232 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4048 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4948
-
-
C:\Windows\SysWOW64\at.exeat 22:53 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:2948
-
-
C:\Windows\SysWOW64\at.exeat 22:54 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:1004
-
-
C:\Windows\SysWOW64\at.exeat 22:55 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:2472
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD52af89d9fe1ec0c792e63ba0a1226493b
SHA1d69cf511f4c8be5094c071c24f300a96c465df46
SHA256ccc8f2d00c3ef79e08691de1375cc1fbc19bc50fba35672fc56d90a9791d760d
SHA512157e18ec7892d10aca80906ff460bf04b8b7d049824dc2fb13cca3a2749892ff6a8c3a7a5df6eedf645abb6f0dab765ca9e9eae18ef6b763d7cd7208cc632b1c
-
Filesize
66KB
MD506b6c222949d8613afd7f1b667c438a8
SHA11d4f1ffd0bcfa7470162154e5e3c7dbf266cc722
SHA256cde7fd72580c00ae35e8d597ff6b2fbff3a2501f61d1b9240d3eb2c2414da664
SHA5120ec3819f30ab51e1df21c36fb6bc8bf7865ae6e0efe15f91ae6aeee38992b6f0107936ad4cd51237b86701c7fca7f5d8b1ca03bf0009c0142261483c1e18e6b1
-
Filesize
66KB
MD5e344e8a6ccc5d88fc066b57fc5a2873d
SHA1fbbad25eadfce4cba12f77f6d435e5c0485ff280
SHA256bff2d1c580791e100e75a99e39a58d307e9a4b6b7d0e7f1e5d80ac3b3ff78526
SHA512476a354aa5f9f1ec9f8a6ce74b6ff5dcfc136eeb57c92b434a1ebc2bc3b4678234834d5c8f8933edb24abc3109e70e73c6058f14ac7459c71493635f192ff3df
-
Filesize
66KB
MD5a31c448cbc3f0679fcfb4773a219089e
SHA11ae828fe4261c88619c87dc0edb933e3925cf2ae
SHA25607c07e5b12e9c5f21515e60e744541193c8f457281412efd0355d10b118f5816
SHA51240c6765f2bf27c1ff731df2d83c72f79673c1246d0bc02ffef10b979dd6a552365b47d80e5cde65de1c860466601a36b7f759067fbadb5b222a0525e76084cc2