Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    29/06/2024, 01:20

General

  • Target

    aaddcb0a5d7993bd1da7b9e5d999c72984ef571d5cd1269087e5fc6210c60a7a.exe

  • Size

    741KB

  • MD5

    296d46df103012c3bb0c64bd262b532e

  • SHA1

    8409505d00f4356a257ada95e3991a0c828522f7

  • SHA256

    aaddcb0a5d7993bd1da7b9e5d999c72984ef571d5cd1269087e5fc6210c60a7a

  • SHA512

    1145936f13795b1a549dda2d9f60ef84d131db71db59dbb04710db4cf6f2ee252c0559027b8d895fed0993ae5335e49701768f80e22cd979f507b8209b5aa72a

  • SSDEEP

    12288:ltTuhrf45I8jWtJ8OgL27rd69bk5NCgGhSFB79gYhLIf6EQ9EYcw1Fj:lIt4kt0Kd6F6CNzYhUiEWEYcwb

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 19 IoCs
  • Drops file in Windows directory 4 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 15 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\aaddcb0a5d7993bd1da7b9e5d999c72984ef571d5cd1269087e5fc6210c60a7a.exe
    "C:\Users\Admin\AppData\Local\Temp\aaddcb0a5d7993bd1da7b9e5d999c72984ef571d5cd1269087e5fc6210c60a7a.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1556
    • \??\c:\windows\resources\themes\explorer.exe
      c:\windows\resources\themes\explorer.exe
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in System32 directory
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:636
      • \??\c:\windows\resources\spoolsv.exe
        c:\windows\resources\spoolsv.exe SE
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:808
        • \??\c:\windows\resources\svchost.exe
          c:\windows\resources\svchost.exe
          4⤵
          • Modifies visiblity of hidden/system files in Explorer
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Drops file in System32 directory
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2920
          • \??\c:\windows\resources\spoolsv.exe
            c:\windows\resources\spoolsv.exe PR
            5⤵
            • Executes dropped EXE
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Suspicious use of SetWindowsHookEx
            PID:2592
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 01:22 /f
            5⤵
            • Scheduled Task/Job: Scheduled Task
            PID:2608
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 01:23 /f
            5⤵
            • Scheduled Task/Job: Scheduled Task
            PID:1068
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 01:24 /f
            5⤵
            • Scheduled Task/Job: Scheduled Task
            PID:556
      • C:\Windows\Explorer.exe
        C:\Windows\Explorer.exe
        3⤵
          PID:1436

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • \Windows\Resources\Themes\explorer.exe

      Filesize

      741KB

      MD5

      a26aad77021f8ea32910136586375c04

      SHA1

      1105f14543162456aee4e448aad7e601f180cd95

      SHA256

      e0e0853e2ef20470aeb9596e3ce3fcd685635481bfdd07d0c36f4c7b508c6e23

      SHA512

      2cc85537398edea0f636e6997fbafd1e9f8c49343946f3715e061f9aec80154ab48f66bef730220a5cbe7e78f4b0c65918967dbbad415f96644138d0abf0ba4f

    • \Windows\Resources\spoolsv.exe

      Filesize

      741KB

      MD5

      506129aeac212d52c47375ecdcd7df5b

      SHA1

      7027d198d576a1ec1f4e139c12f614b92e708075

      SHA256

      becdf5834e3432735918d55fa33776ae8c99a4ee7e4100897cfab1cd1b159e9f

      SHA512

      0ed948904ff123cdcc48f51cdb48fd44f0579c6510461f5426c2ec8376d64025bb5f90f8e2f98afb2de4a646f3a817c2c6d9838ba55750540e7301c80abbe4c6

    • \Windows\Resources\svchost.exe

      Filesize

      741KB

      MD5

      b683a65253ec7076568125edd2f9415e

      SHA1

      4bf356d900e37266fbe51c69925eccbaea9aba16

      SHA256

      77e793b40626345b6a731d615f84ed1ca54c9d1eead64ea57dee320f2ea84051

      SHA512

      7d28f15dca6235a71b91cf531fddabc54619a50df8ce687917bbf105a9a9cbc676e6a8a97877b16d52c5692f2ddc71546fba46a542eabdb970b3ffba9d662d7a

    • memory/636-54-0x0000000000400000-0x0000000000772000-memory.dmp

      Filesize

      3.4MB

    • memory/636-10-0x0000000000400000-0x0000000000772000-memory.dmp

      Filesize

      3.4MB

    • memory/636-81-0x0000000000400000-0x0000000000772000-memory.dmp

      Filesize

      3.4MB

    • memory/636-21-0x0000000003D50000-0x00000000040C2000-memory.dmp

      Filesize

      3.4MB

    • memory/636-69-0x0000000000400000-0x0000000000772000-memory.dmp

      Filesize

      3.4MB

    • memory/636-67-0x0000000000400000-0x0000000000772000-memory.dmp

      Filesize

      3.4MB

    • memory/636-65-0x0000000000400000-0x0000000000772000-memory.dmp

      Filesize

      3.4MB

    • memory/636-63-0x0000000000400000-0x0000000000772000-memory.dmp

      Filesize

      3.4MB

    • memory/636-59-0x0000000000400000-0x0000000000772000-memory.dmp

      Filesize

      3.4MB

    • memory/808-31-0x0000000003C60000-0x0000000003FD2000-memory.dmp

      Filesize

      3.4MB

    • memory/808-49-0x0000000000400000-0x0000000000772000-memory.dmp

      Filesize

      3.4MB

    • memory/808-22-0x0000000000400000-0x0000000000772000-memory.dmp

      Filesize

      3.4MB

    • memory/1556-50-0x0000000000400000-0x0000000000772000-memory.dmp

      Filesize

      3.4MB

    • memory/1556-51-0x0000000003DF0000-0x0000000004162000-memory.dmp

      Filesize

      3.4MB

    • memory/1556-52-0x0000000000400000-0x0000000000772000-memory.dmp

      Filesize

      3.4MB

    • memory/1556-0-0x0000000000400000-0x0000000000772000-memory.dmp

      Filesize

      3.4MB

    • memory/2592-47-0x0000000000400000-0x0000000000772000-memory.dmp

      Filesize

      3.4MB

    • memory/2592-42-0x0000000000400000-0x0000000000772000-memory.dmp

      Filesize

      3.4MB

    • memory/2920-40-0x00000000037E0000-0x0000000003B52000-memory.dmp

      Filesize

      3.4MB

    • memory/2920-64-0x0000000000400000-0x0000000000772000-memory.dmp

      Filesize

      3.4MB

    • memory/2920-66-0x0000000000400000-0x0000000000772000-memory.dmp

      Filesize

      3.4MB

    • memory/2920-60-0x0000000000400000-0x0000000000772000-memory.dmp

      Filesize

      3.4MB

    • memory/2920-34-0x0000000000400000-0x0000000000772000-memory.dmp

      Filesize

      3.4MB

    • memory/2920-58-0x00000000037E0000-0x0000000003B52000-memory.dmp

      Filesize

      3.4MB

    • memory/2920-74-0x0000000000400000-0x0000000000772000-memory.dmp

      Filesize

      3.4MB

    • memory/2920-76-0x0000000000400000-0x0000000000772000-memory.dmp

      Filesize

      3.4MB

    • memory/2920-55-0x0000000000400000-0x0000000000772000-memory.dmp

      Filesize

      3.4MB