Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
84s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
07/07/2024, 03:11
Static task
static1
Behavioral task
behavioral1
Sample
c367c25212dcad569631aded689e2c6fb67f1a853a73ac13eb33aa9e36ef5e4c.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c367c25212dcad569631aded689e2c6fb67f1a853a73ac13eb33aa9e36ef5e4c.exe
Resource
win10v2004-20240704-en
General
-
Target
c367c25212dcad569631aded689e2c6fb67f1a853a73ac13eb33aa9e36ef5e4c.exe
-
Size
741KB
-
MD5
9c119f7c587b2f0a3dcc004835cc1f2d
-
SHA1
a51180e0e088cf2e9d7817fad22b3013148ae051
-
SHA256
c367c25212dcad569631aded689e2c6fb67f1a853a73ac13eb33aa9e36ef5e4c
-
SHA512
f85e7d96db173812b8ad9e34a8228dfdeff2610b9fa7b87052ffaabf741fd21dcce46dd469b7541ec4fa73f1ea34272e6b7a197aee9be6206cd5583f204f0789
-
SSDEEP
12288:ltTuhrf45I8jWtJ8OgL27rd69bk5NCgGhSFB79gYhLIf6EQ9EYcw1F388888888K:lIt4kt0Kd6F6CNzYhUiEWEYcwP88888z
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 2280 explorer.exe 2908 spoolsv.exe 2328 svchost.exe 2844 spoolsv.exe -
Loads dropped DLL 4 IoCs
pid Process 2552 c367c25212dcad569631aded689e2c6fb67f1a853a73ac13eb33aa9e36ef5e4c.exe 2280 explorer.exe 2908 spoolsv.exe 2328 svchost.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 13 IoCs
pid Process 2552 c367c25212dcad569631aded689e2c6fb67f1a853a73ac13eb33aa9e36ef5e4c.exe 2280 explorer.exe 2908 spoolsv.exe 2328 svchost.exe 2844 spoolsv.exe 2280 explorer.exe 2328 svchost.exe 2280 explorer.exe 2328 svchost.exe 2280 explorer.exe 2328 svchost.exe 2280 explorer.exe 2328 svchost.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\themes\explorer.exe c367c25212dcad569631aded689e2c6fb67f1a853a73ac13eb33aa9e36ef5e4c.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2624 schtasks.exe 304 schtasks.exe 1184 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2552 c367c25212dcad569631aded689e2c6fb67f1a853a73ac13eb33aa9e36ef5e4c.exe 2552 c367c25212dcad569631aded689e2c6fb67f1a853a73ac13eb33aa9e36ef5e4c.exe 2552 c367c25212dcad569631aded689e2c6fb67f1a853a73ac13eb33aa9e36ef5e4c.exe 2552 c367c25212dcad569631aded689e2c6fb67f1a853a73ac13eb33aa9e36ef5e4c.exe 2552 c367c25212dcad569631aded689e2c6fb67f1a853a73ac13eb33aa9e36ef5e4c.exe 2552 c367c25212dcad569631aded689e2c6fb67f1a853a73ac13eb33aa9e36ef5e4c.exe 2552 c367c25212dcad569631aded689e2c6fb67f1a853a73ac13eb33aa9e36ef5e4c.exe 2552 c367c25212dcad569631aded689e2c6fb67f1a853a73ac13eb33aa9e36ef5e4c.exe 2552 c367c25212dcad569631aded689e2c6fb67f1a853a73ac13eb33aa9e36ef5e4c.exe 2552 c367c25212dcad569631aded689e2c6fb67f1a853a73ac13eb33aa9e36ef5e4c.exe 2552 c367c25212dcad569631aded689e2c6fb67f1a853a73ac13eb33aa9e36ef5e4c.exe 2552 c367c25212dcad569631aded689e2c6fb67f1a853a73ac13eb33aa9e36ef5e4c.exe 2552 c367c25212dcad569631aded689e2c6fb67f1a853a73ac13eb33aa9e36ef5e4c.exe 2552 c367c25212dcad569631aded689e2c6fb67f1a853a73ac13eb33aa9e36ef5e4c.exe 2552 c367c25212dcad569631aded689e2c6fb67f1a853a73ac13eb33aa9e36ef5e4c.exe 2552 c367c25212dcad569631aded689e2c6fb67f1a853a73ac13eb33aa9e36ef5e4c.exe 2552 c367c25212dcad569631aded689e2c6fb67f1a853a73ac13eb33aa9e36ef5e4c.exe 2552 c367c25212dcad569631aded689e2c6fb67f1a853a73ac13eb33aa9e36ef5e4c.exe 2552 c367c25212dcad569631aded689e2c6fb67f1a853a73ac13eb33aa9e36ef5e4c.exe 2552 c367c25212dcad569631aded689e2c6fb67f1a853a73ac13eb33aa9e36ef5e4c.exe 2552 c367c25212dcad569631aded689e2c6fb67f1a853a73ac13eb33aa9e36ef5e4c.exe 2552 c367c25212dcad569631aded689e2c6fb67f1a853a73ac13eb33aa9e36ef5e4c.exe 2552 c367c25212dcad569631aded689e2c6fb67f1a853a73ac13eb33aa9e36ef5e4c.exe 2280 explorer.exe 2280 explorer.exe 2280 explorer.exe 2280 explorer.exe 2280 explorer.exe 2280 explorer.exe 2280 explorer.exe 2280 explorer.exe 2280 explorer.exe 2280 explorer.exe 2280 explorer.exe 2280 explorer.exe 2280 explorer.exe 2280 explorer.exe 2280 explorer.exe 2280 explorer.exe 2280 explorer.exe 2280 explorer.exe 2280 explorer.exe 2280 explorer.exe 2280 explorer.exe 2280 explorer.exe 2908 spoolsv.exe 2908 spoolsv.exe 2908 spoolsv.exe 2908 spoolsv.exe 2908 spoolsv.exe 2908 spoolsv.exe 2328 svchost.exe 2328 svchost.exe 2328 svchost.exe 2328 svchost.exe 2328 svchost.exe 2328 svchost.exe 2328 svchost.exe 2328 svchost.exe 2328 svchost.exe 2328 svchost.exe 2328 svchost.exe 2328 svchost.exe 2328 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2280 explorer.exe 2328 svchost.exe -
Suspicious use of SetWindowsHookEx 15 IoCs
pid Process 2552 c367c25212dcad569631aded689e2c6fb67f1a853a73ac13eb33aa9e36ef5e4c.exe 2552 c367c25212dcad569631aded689e2c6fb67f1a853a73ac13eb33aa9e36ef5e4c.exe 2552 c367c25212dcad569631aded689e2c6fb67f1a853a73ac13eb33aa9e36ef5e4c.exe 2280 explorer.exe 2280 explorer.exe 2280 explorer.exe 2908 spoolsv.exe 2908 spoolsv.exe 2908 spoolsv.exe 2328 svchost.exe 2328 svchost.exe 2328 svchost.exe 2844 spoolsv.exe 2844 spoolsv.exe 2844 spoolsv.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2552 wrote to memory of 2280 2552 c367c25212dcad569631aded689e2c6fb67f1a853a73ac13eb33aa9e36ef5e4c.exe 30 PID 2552 wrote to memory of 2280 2552 c367c25212dcad569631aded689e2c6fb67f1a853a73ac13eb33aa9e36ef5e4c.exe 30 PID 2552 wrote to memory of 2280 2552 c367c25212dcad569631aded689e2c6fb67f1a853a73ac13eb33aa9e36ef5e4c.exe 30 PID 2552 wrote to memory of 2280 2552 c367c25212dcad569631aded689e2c6fb67f1a853a73ac13eb33aa9e36ef5e4c.exe 30 PID 2280 wrote to memory of 2908 2280 explorer.exe 31 PID 2280 wrote to memory of 2908 2280 explorer.exe 31 PID 2280 wrote to memory of 2908 2280 explorer.exe 31 PID 2280 wrote to memory of 2908 2280 explorer.exe 31 PID 2908 wrote to memory of 2328 2908 spoolsv.exe 32 PID 2908 wrote to memory of 2328 2908 spoolsv.exe 32 PID 2908 wrote to memory of 2328 2908 spoolsv.exe 32 PID 2908 wrote to memory of 2328 2908 spoolsv.exe 32 PID 2328 wrote to memory of 2844 2328 svchost.exe 33 PID 2328 wrote to memory of 2844 2328 svchost.exe 33 PID 2328 wrote to memory of 2844 2328 svchost.exe 33 PID 2328 wrote to memory of 2844 2328 svchost.exe 33 PID 2280 wrote to memory of 2920 2280 explorer.exe 34 PID 2280 wrote to memory of 2920 2280 explorer.exe 34 PID 2280 wrote to memory of 2920 2280 explorer.exe 34 PID 2280 wrote to memory of 2920 2280 explorer.exe 34 PID 2328 wrote to memory of 2624 2328 svchost.exe 35 PID 2328 wrote to memory of 2624 2328 svchost.exe 35 PID 2328 wrote to memory of 2624 2328 svchost.exe 35 PID 2328 wrote to memory of 2624 2328 svchost.exe 35 PID 2328 wrote to memory of 304 2328 svchost.exe 39 PID 2328 wrote to memory of 304 2328 svchost.exe 39 PID 2328 wrote to memory of 304 2328 svchost.exe 39 PID 2328 wrote to memory of 304 2328 svchost.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\c367c25212dcad569631aded689e2c6fb67f1a853a73ac13eb33aa9e36ef5e4c.exe"C:\Users\Admin\AppData\Local\Temp\c367c25212dcad569631aded689e2c6fb67f1a853a73ac13eb33aa9e36ef5e4c.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2552 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2280 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2908 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2328 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:2844
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 03:35 /f5⤵
- Scheduled Task/Job: Scheduled Task
PID:2624
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 03:36 /f5⤵
- Scheduled Task/Job: Scheduled Task
PID:304
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 03:37 /f5⤵
- Scheduled Task/Job: Scheduled Task
PID:1184
-
-
-
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe3⤵PID:2920
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
741KB
MD5925b1049a2bb5925b8a885a807f55a9a
SHA1b37faa1094c2656f43f34e13d18623b563eb749d
SHA25646e987c135aeeb1140bbd58acd05c3033ccceb5cd79ff38f7e474fb955cfbb14
SHA512c5e642aa767cbb50ebc40b53bd7d613e88be1b01b7ada3c6a6ab46dca5e55b79f08d4de6685e6187264a414c6a3a358e993b15be0081d47dfc440ff903c02fb0
-
Filesize
741KB
MD594a6ed3a8749ecafd95d06cf1336b7d4
SHA1e9fd7e234833e7270be66bd5ff16b15b5c58e6a9
SHA25673f0e64a7a2f2ed70f21a4b4c498ba533ce23640708c05606a88c9fe8d31b5e7
SHA5122a7ece4e0c1555f5c354084717c95dbf9f9037281ac533b36f1b5c249b60f1c58ebeeef0a032455810f67cfa3f60ae6839bfe490c513b060ab45bdb755ae7621
-
Filesize
742KB
MD588e4e2b34bd0678e5ebb49e69eb920b8
SHA191d85c1c7b3702a1ff5e9422dfa11a9e98b4ad98
SHA2565a44e04452032b5c5ee0a00aa66a9d6106fabc7aac0c8fcd2051f9421870cb6d
SHA51283e4b9403c25b7cca6fa77de18b8d024ec169d9bd44e22d35458a773ac3aae9c8c46790e842fdba22f261455778e8ac2d249638381e197dc1b56341e94454fbe