Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
20/07/2024, 22:18
Static task
static1
Behavioral task
behavioral1
Sample
164cac39cc9a43af184984e8b25600b0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
164cac39cc9a43af184984e8b25600b0N.exe
Resource
win10v2004-20240709-en
General
-
Target
164cac39cc9a43af184984e8b25600b0N.exe
-
Size
7.0MB
-
MD5
164cac39cc9a43af184984e8b25600b0
-
SHA1
7e15a37fde68b784173099aaa2203caf6751e872
-
SHA256
1ea665d2a1997a41210c305830e938fd73989f444310248ff9b9ac5d36012043
-
SHA512
c970f9467fc20e2bba7ccfebf69f055aaa6b374bc6454cf206289ef678bbe418ca9f3fed96e9007381eae93f058c07cb949b696e0c1506ab14fe62405fb52836
-
SSDEEP
49152:twlipMZE8Q+fzT/QwadfqUAnggWrh3Co6BjkpqpkmyUD7LNq0I698hczq4wvILkC:IipMZE8Q+f44fpOkfylw9LJ9sY3p
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 6 IoCs
pid Process 628 164cac39cc9a43af184984e8b25600b0n.exe 1548 icsys.icn.exe 3784 explorer.exe 1636 spoolsv.exe 5028 svchost.exe 1124 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe File opened for modification C:\Windows\Resources\Themes\icsys.icn.exe 164cac39cc9a43af184984e8b25600b0N.exe File opened for modification \??\c:\windows\resources\themes\explorer.exe icsys.icn.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2972 164cac39cc9a43af184984e8b25600b0N.exe 2972 164cac39cc9a43af184984e8b25600b0N.exe 2972 164cac39cc9a43af184984e8b25600b0N.exe 2972 164cac39cc9a43af184984e8b25600b0N.exe 2972 164cac39cc9a43af184984e8b25600b0N.exe 2972 164cac39cc9a43af184984e8b25600b0N.exe 2972 164cac39cc9a43af184984e8b25600b0N.exe 2972 164cac39cc9a43af184984e8b25600b0N.exe 2972 164cac39cc9a43af184984e8b25600b0N.exe 2972 164cac39cc9a43af184984e8b25600b0N.exe 2972 164cac39cc9a43af184984e8b25600b0N.exe 2972 164cac39cc9a43af184984e8b25600b0N.exe 2972 164cac39cc9a43af184984e8b25600b0N.exe 2972 164cac39cc9a43af184984e8b25600b0N.exe 2972 164cac39cc9a43af184984e8b25600b0N.exe 2972 164cac39cc9a43af184984e8b25600b0N.exe 2972 164cac39cc9a43af184984e8b25600b0N.exe 2972 164cac39cc9a43af184984e8b25600b0N.exe 2972 164cac39cc9a43af184984e8b25600b0N.exe 2972 164cac39cc9a43af184984e8b25600b0N.exe 2972 164cac39cc9a43af184984e8b25600b0N.exe 2972 164cac39cc9a43af184984e8b25600b0N.exe 2972 164cac39cc9a43af184984e8b25600b0N.exe 2972 164cac39cc9a43af184984e8b25600b0N.exe 2972 164cac39cc9a43af184984e8b25600b0N.exe 2972 164cac39cc9a43af184984e8b25600b0N.exe 2972 164cac39cc9a43af184984e8b25600b0N.exe 2972 164cac39cc9a43af184984e8b25600b0N.exe 2972 164cac39cc9a43af184984e8b25600b0N.exe 2972 164cac39cc9a43af184984e8b25600b0N.exe 2972 164cac39cc9a43af184984e8b25600b0N.exe 2972 164cac39cc9a43af184984e8b25600b0N.exe 1548 icsys.icn.exe 1548 icsys.icn.exe 1548 icsys.icn.exe 1548 icsys.icn.exe 1548 icsys.icn.exe 1548 icsys.icn.exe 1548 icsys.icn.exe 1548 icsys.icn.exe 1548 icsys.icn.exe 1548 icsys.icn.exe 1548 icsys.icn.exe 1548 icsys.icn.exe 1548 icsys.icn.exe 1548 icsys.icn.exe 1548 icsys.icn.exe 1548 icsys.icn.exe 1548 icsys.icn.exe 1548 icsys.icn.exe 1548 icsys.icn.exe 1548 icsys.icn.exe 1548 icsys.icn.exe 1548 icsys.icn.exe 1548 icsys.icn.exe 1548 icsys.icn.exe 1548 icsys.icn.exe 1548 icsys.icn.exe 1548 icsys.icn.exe 1548 icsys.icn.exe 1548 icsys.icn.exe 1548 icsys.icn.exe 1548 icsys.icn.exe 1548 icsys.icn.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 3784 explorer.exe 5028 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2972 164cac39cc9a43af184984e8b25600b0N.exe 2972 164cac39cc9a43af184984e8b25600b0N.exe 1548 icsys.icn.exe 1548 icsys.icn.exe 3784 explorer.exe 3784 explorer.exe 1636 spoolsv.exe 1636 spoolsv.exe 5028 svchost.exe 5028 svchost.exe 1124 spoolsv.exe 1124 spoolsv.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2972 wrote to memory of 628 2972 164cac39cc9a43af184984e8b25600b0N.exe 85 PID 2972 wrote to memory of 628 2972 164cac39cc9a43af184984e8b25600b0N.exe 85 PID 2972 wrote to memory of 628 2972 164cac39cc9a43af184984e8b25600b0N.exe 85 PID 2972 wrote to memory of 1548 2972 164cac39cc9a43af184984e8b25600b0N.exe 87 PID 2972 wrote to memory of 1548 2972 164cac39cc9a43af184984e8b25600b0N.exe 87 PID 2972 wrote to memory of 1548 2972 164cac39cc9a43af184984e8b25600b0N.exe 87 PID 1548 wrote to memory of 3784 1548 icsys.icn.exe 89 PID 1548 wrote to memory of 3784 1548 icsys.icn.exe 89 PID 1548 wrote to memory of 3784 1548 icsys.icn.exe 89 PID 3784 wrote to memory of 1636 3784 explorer.exe 90 PID 3784 wrote to memory of 1636 3784 explorer.exe 90 PID 3784 wrote to memory of 1636 3784 explorer.exe 90 PID 1636 wrote to memory of 5028 1636 spoolsv.exe 91 PID 1636 wrote to memory of 5028 1636 spoolsv.exe 91 PID 1636 wrote to memory of 5028 1636 spoolsv.exe 91 PID 5028 wrote to memory of 1124 5028 svchost.exe 92 PID 5028 wrote to memory of 1124 5028 svchost.exe 92 PID 5028 wrote to memory of 1124 5028 svchost.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\164cac39cc9a43af184984e8b25600b0N.exe"C:\Users\Admin\AppData\Local\Temp\164cac39cc9a43af184984e8b25600b0N.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2972 -
\??\c:\users\admin\appdata\local\temp\164cac39cc9a43af184984e8b25600b0n.exec:\users\admin\appdata\local\temp\164cac39cc9a43af184984e8b25600b0n.exe2⤵
- Executes dropped EXE
PID:628
-
-
C:\Windows\Resources\Themes\icsys.icn.exeC:\Windows\Resources\Themes\icsys.icn.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1548 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe3⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3784 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE4⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1636 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe5⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5028 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1124
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.9MB
MD5b30dc44ed05c285d270654cf0ed80569
SHA17ee0c8496c8e9ac0a22c82370a25127dd62a51cd
SHA256deff17ed68a3a4b102b3c3f640968eb29e55c39c0f1fe672dee7cc744c109a8f
SHA51210ff37371216fb3f34da1dbbefe2ec3434010331847961a2965203bf30535bff711dca0b8114f529c0a53180e2767a8b517214479e0a2afcb8e1f382d4c321a8
-
Filesize
135KB
MD5dba4becbb5912b2735f5a82ffbe5d409
SHA1f0c9e38175bdbc84be46d105bcbb1e9022707d1c
SHA2561706b28db087d0a0400a02e34e80a11ed77c87bbba94e58ca5ba8d4f9404abae
SHA512fba72545737f7d65a21fc068546954e36f06d87dc11e54c6efdd3e465baf38e143df6b48129589d7053018013aa446a0b404cb9c24a9fed9330eb122112bf981
-
Filesize
135KB
MD52c2fc16feecdb0e31598a314ba614b25
SHA1cfa621dce7917db897f426e38b57efbeca60d0ea
SHA256cb65bf37b474da7eb505a071d1d244da061796f2533345c64b7d615cf0168f25
SHA5126c9e82a4064d2634dede62b2a7a3661c5a9a1fe080185db411ee0e1774b3fc490e3ac9b9153051bb0289a50908445605803a0113993e492761ec24bc7f46acfe
-
Filesize
135KB
MD52b1423eacd235afadd75a0d6de46e5da
SHA19a76e7a5b9d3136d62ed828a2fc4836d708acd1c
SHA256dd7747e719af69b38738e61d2d0c9820c324663c2deabbfe23faa5daf88dd5cc
SHA512b5ce24ac3ef3c77e79964cf4b0aa4a558b879b7704f8c93daffbad3193be8835a6d867687b564e9777a969ba6e9cabd37bfc28a7f2fd8d4aad7475130830d8c9
-
Filesize
135KB
MD57abf315dca2b922e1a5381c85008f6da
SHA1f6bb7a4d79aa4abfed7419a138d0e4a89457899a
SHA256e448d46ab4be30638ffde4e45e161b35231ae38425aba0f139b736d1595b1886
SHA5129e2e468c5dee1afb4e50ad79f44eb955a10fadafb1bc97dbd800014a90bd17850df3be258c3e6f59575ee540b76eb91eaa227aa2bbd005675d1bcb42e353a13d