Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
11/06/2024, 01:01
Behavioral task
behavioral1
Sample
00fe05de6b1f112a3e17659ec0bb2dd0.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
00fe05de6b1f112a3e17659ec0bb2dd0.exe
Resource
win10v2004-20240226-en
General
-
Target
00fe05de6b1f112a3e17659ec0bb2dd0.exe
-
Size
2.5MB
-
MD5
00fe05de6b1f112a3e17659ec0bb2dd0
-
SHA1
47d3f75cc6abe09abff2b2e7b342608aed1e9d3a
-
SHA256
70b3b5426fea00573d7e5f93cd050357c1fcc3fa3ecfa5e41c5ffe71854ff2ce
-
SHA512
c36f588f83e9b830de82c99506f1fe02f23c1d1e33828d93c68449ce3166c991acbf68e7a509c32f020520928df9a61a36793f8e2ad6712b261633646a5d761f
-
SSDEEP
49152:hxmvumkQ9lY9sgUXdTPSxdQ8KX75IyuWuCjcCqWOyxJ:hxx9NUFkQx753uWuCyyxJ
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 00fe05de6b1f112a3e17659ec0bb2dd0.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorer.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ spoolsv.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ spoolsv.exe -
Checks BIOS information in registry 2 TTPs 10 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion spoolsv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion spoolsv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion spoolsv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 00fe05de6b1f112a3e17659ec0bb2dd0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 00fe05de6b1f112a3e17659ec0bb2dd0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion spoolsv.exe -
Executes dropped EXE 4 IoCs
pid Process 2884 explorer.exe 2988 spoolsv.exe 2672 svchost.exe 2776 spoolsv.exe -
Loads dropped DLL 4 IoCs
pid Process 2064 00fe05de6b1f112a3e17659ec0bb2dd0.exe 2884 explorer.exe 2988 spoolsv.exe 2672 svchost.exe -
resource yara_rule behavioral1/memory/2064-0-0x0000000000400000-0x0000000000A0E000-memory.dmp themida behavioral1/files/0x0033000000015d85-7.dat themida behavioral1/memory/2884-11-0x0000000000400000-0x0000000000A0E000-memory.dmp themida behavioral1/files/0x00080000000161ee-16.dat themida behavioral1/memory/2988-23-0x0000000000400000-0x0000000000A0E000-memory.dmp themida behavioral1/files/0x00080000000163eb-30.dat themida behavioral1/memory/2672-35-0x0000000000400000-0x0000000000A0E000-memory.dmp themida behavioral1/memory/2776-43-0x0000000000400000-0x0000000000A0E000-memory.dmp themida behavioral1/memory/2064-42-0x0000000000400000-0x0000000000A0E000-memory.dmp themida behavioral1/memory/2776-49-0x0000000000400000-0x0000000000A0E000-memory.dmp themida behavioral1/memory/2988-51-0x0000000000400000-0x0000000000A0E000-memory.dmp themida behavioral1/memory/2064-53-0x0000000000400000-0x0000000000A0E000-memory.dmp themida behavioral1/memory/2884-54-0x0000000000400000-0x0000000000A0E000-memory.dmp themida behavioral1/memory/2884-55-0x0000000000400000-0x0000000000A0E000-memory.dmp themida behavioral1/memory/2672-56-0x0000000000400000-0x0000000000A0E000-memory.dmp themida behavioral1/memory/2884-67-0x0000000000400000-0x0000000000A0E000-memory.dmp themida behavioral1/memory/2672-74-0x0000000000400000-0x0000000000A0E000-memory.dmp themida behavioral1/memory/2672-76-0x0000000000400000-0x0000000000A0E000-memory.dmp themida -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 00fe05de6b1f112a3e17659ec0bb2dd0.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA explorer.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA spoolsv.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA svchost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA spoolsv.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 2064 00fe05de6b1f112a3e17659ec0bb2dd0.exe 2884 explorer.exe 2988 spoolsv.exe 2672 svchost.exe 2776 spoolsv.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\themes\explorer.exe 00fe05de6b1f112a3e17659ec0bb2dd0.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2936 schtasks.exe 1000 schtasks.exe 2912 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2064 00fe05de6b1f112a3e17659ec0bb2dd0.exe 2064 00fe05de6b1f112a3e17659ec0bb2dd0.exe 2064 00fe05de6b1f112a3e17659ec0bb2dd0.exe 2064 00fe05de6b1f112a3e17659ec0bb2dd0.exe 2064 00fe05de6b1f112a3e17659ec0bb2dd0.exe 2064 00fe05de6b1f112a3e17659ec0bb2dd0.exe 2064 00fe05de6b1f112a3e17659ec0bb2dd0.exe 2064 00fe05de6b1f112a3e17659ec0bb2dd0.exe 2064 00fe05de6b1f112a3e17659ec0bb2dd0.exe 2064 00fe05de6b1f112a3e17659ec0bb2dd0.exe 2064 00fe05de6b1f112a3e17659ec0bb2dd0.exe 2064 00fe05de6b1f112a3e17659ec0bb2dd0.exe 2064 00fe05de6b1f112a3e17659ec0bb2dd0.exe 2064 00fe05de6b1f112a3e17659ec0bb2dd0.exe 2064 00fe05de6b1f112a3e17659ec0bb2dd0.exe 2064 00fe05de6b1f112a3e17659ec0bb2dd0.exe 2064 00fe05de6b1f112a3e17659ec0bb2dd0.exe 2884 explorer.exe 2884 explorer.exe 2884 explorer.exe 2884 explorer.exe 2884 explorer.exe 2884 explorer.exe 2884 explorer.exe 2884 explorer.exe 2884 explorer.exe 2884 explorer.exe 2884 explorer.exe 2884 explorer.exe 2884 explorer.exe 2884 explorer.exe 2884 explorer.exe 2884 explorer.exe 2672 svchost.exe 2672 svchost.exe 2672 svchost.exe 2672 svchost.exe 2672 svchost.exe 2672 svchost.exe 2672 svchost.exe 2672 svchost.exe 2672 svchost.exe 2672 svchost.exe 2672 svchost.exe 2672 svchost.exe 2672 svchost.exe 2672 svchost.exe 2672 svchost.exe 2672 svchost.exe 2884 explorer.exe 2672 svchost.exe 2672 svchost.exe 2884 explorer.exe 2884 explorer.exe 2672 svchost.exe 2884 explorer.exe 2884 explorer.exe 2672 svchost.exe 2672 svchost.exe 2884 explorer.exe 2884 explorer.exe 2672 svchost.exe 2672 svchost.exe 2884 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2672 svchost.exe 2884 explorer.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 2064 00fe05de6b1f112a3e17659ec0bb2dd0.exe 2064 00fe05de6b1f112a3e17659ec0bb2dd0.exe 2884 explorer.exe 2884 explorer.exe 2988 spoolsv.exe 2988 spoolsv.exe 2672 svchost.exe 2672 svchost.exe 2776 spoolsv.exe 2776 spoolsv.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 2064 wrote to memory of 2884 2064 00fe05de6b1f112a3e17659ec0bb2dd0.exe 28 PID 2064 wrote to memory of 2884 2064 00fe05de6b1f112a3e17659ec0bb2dd0.exe 28 PID 2064 wrote to memory of 2884 2064 00fe05de6b1f112a3e17659ec0bb2dd0.exe 28 PID 2064 wrote to memory of 2884 2064 00fe05de6b1f112a3e17659ec0bb2dd0.exe 28 PID 2884 wrote to memory of 2988 2884 explorer.exe 29 PID 2884 wrote to memory of 2988 2884 explorer.exe 29 PID 2884 wrote to memory of 2988 2884 explorer.exe 29 PID 2884 wrote to memory of 2988 2884 explorer.exe 29 PID 2988 wrote to memory of 2672 2988 spoolsv.exe 30 PID 2988 wrote to memory of 2672 2988 spoolsv.exe 30 PID 2988 wrote to memory of 2672 2988 spoolsv.exe 30 PID 2988 wrote to memory of 2672 2988 spoolsv.exe 30 PID 2672 wrote to memory of 2776 2672 svchost.exe 31 PID 2672 wrote to memory of 2776 2672 svchost.exe 31 PID 2672 wrote to memory of 2776 2672 svchost.exe 31 PID 2672 wrote to memory of 2776 2672 svchost.exe 31 PID 2884 wrote to memory of 2600 2884 explorer.exe 32 PID 2884 wrote to memory of 2600 2884 explorer.exe 32 PID 2884 wrote to memory of 2600 2884 explorer.exe 32 PID 2884 wrote to memory of 2600 2884 explorer.exe 32 PID 2672 wrote to memory of 2936 2672 svchost.exe 33 PID 2672 wrote to memory of 2936 2672 svchost.exe 33 PID 2672 wrote to memory of 2936 2672 svchost.exe 33 PID 2672 wrote to memory of 2936 2672 svchost.exe 33 PID 2672 wrote to memory of 1000 2672 svchost.exe 38 PID 2672 wrote to memory of 1000 2672 svchost.exe 38 PID 2672 wrote to memory of 1000 2672 svchost.exe 38 PID 2672 wrote to memory of 1000 2672 svchost.exe 38 PID 2672 wrote to memory of 2912 2672 svchost.exe 40 PID 2672 wrote to memory of 2912 2672 svchost.exe 40 PID 2672 wrote to memory of 2912 2672 svchost.exe 40 PID 2672 wrote to memory of 2912 2672 svchost.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\00fe05de6b1f112a3e17659ec0bb2dd0.exe"C:\Users\Admin\AppData\Local\Temp\00fe05de6b1f112a3e17659ec0bb2dd0.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2064 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2884 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2988 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2672 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:2776
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 01:03 /f5⤵
- Creates scheduled task(s)
PID:2936
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 01:04 /f5⤵
- Creates scheduled task(s)
PID:1000
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 01:05 /f5⤵
- Creates scheduled task(s)
PID:2912
-
-
-
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe3⤵PID:2600
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Virtualization/Sandbox Evasion
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.5MB
MD5d997df8ec8f5f7d8f56cbc2eeed39be4
SHA145db32bb5b9c2acfdc1c8730f8aed38be124d75d
SHA2562af230b805daf148758153fdf81061658a80d2d7a03fc24784c716c601f64648
SHA5125c4430f84424d5bd1df5f43449fb50eddb386ff98a363ff9b0c4fbb04e4a3992515289f27523f3215ab56c9207e3cf43886fea8e3927c89bed1466c8e6a07961
-
Filesize
2.5MB
MD57c63500e4a0fdfd3011a5889abf2c4b9
SHA1da6382a17ebeaa614c6efe9ba4ed5743043dd288
SHA25627bd7b4ec460f04a0fd86782158d37c453fc165809f2153d99b7dd5d490de347
SHA512c8782d44c9bb34b75b2b425c406709bfefbce4510bd5c3d43f4aa065959d0d529a418d8511ac08d9764a6a170542107048c8c8692a602d71142a8cfffb8a5123
-
Filesize
2.5MB
MD5c2bc525f451907b1cd4347e4c28dfe39
SHA188315dd3924280aa15fc5c8d0725a9e542cfe71f
SHA256ffce71526b386f54ff70256626846437eaaa14f32bd7554a51ac82f70d2b2562
SHA51240222eafd4ccd0515519b91abca70376c09d0f6f80a1def00e99da2be65292d9af5eb59af5b9fa33a99f18f4911a157fc6edb4d3fe6382b0388a23bb47b5603c