Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    98s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/07/2024, 22:18

General

  • Target

    164cac39cc9a43af184984e8b25600b0N.exe

  • Size

    7.0MB

  • MD5

    164cac39cc9a43af184984e8b25600b0

  • SHA1

    7e15a37fde68b784173099aaa2203caf6751e872

  • SHA256

    1ea665d2a1997a41210c305830e938fd73989f444310248ff9b9ac5d36012043

  • SHA512

    c970f9467fc20e2bba7ccfebf69f055aaa6b374bc6454cf206289ef678bbe418ca9f3fed96e9007381eae93f058c07cb949b696e0c1506ab14fe62405fb52836

  • SSDEEP

    49152:twlipMZE8Q+fzT/QwadfqUAnggWrh3Co6BjkpqpkmyUD7LNq0I698hczq4wvILkC:IipMZE8Q+f44fpOkfylw9LJ9sY3p

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 6 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\164cac39cc9a43af184984e8b25600b0N.exe
    "C:\Users\Admin\AppData\Local\Temp\164cac39cc9a43af184984e8b25600b0N.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2972
    • \??\c:\users\admin\appdata\local\temp\164cac39cc9a43af184984e8b25600b0n.exe 
      c:\users\admin\appdata\local\temp\164cac39cc9a43af184984e8b25600b0n.exe 
      2⤵
      • Executes dropped EXE
      PID:628
    • C:\Windows\Resources\Themes\icsys.icn.exe
      C:\Windows\Resources\Themes\icsys.icn.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1548
      • \??\c:\windows\resources\themes\explorer.exe
        c:\windows\resources\themes\explorer.exe
        3⤵
        • Modifies visiblity of hidden/system files in Explorer
        • Executes dropped EXE
        • Adds Run key to start application
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3784
        • \??\c:\windows\resources\spoolsv.exe
          c:\windows\resources\spoolsv.exe SE
          4⤵
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1636
          • \??\c:\windows\resources\svchost.exe
            c:\windows\resources\svchost.exe
            5⤵
            • Modifies visiblity of hidden/system files in Explorer
            • Executes dropped EXE
            • Adds Run key to start application
            • Drops file in System32 directory
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:5028
            • \??\c:\windows\resources\spoolsv.exe
              c:\windows\resources\spoolsv.exe PR
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              PID:1124

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\164cac39cc9a43af184984e8b25600b0n.exe 

    Filesize

    6.9MB

    MD5

    b30dc44ed05c285d270654cf0ed80569

    SHA1

    7ee0c8496c8e9ac0a22c82370a25127dd62a51cd

    SHA256

    deff17ed68a3a4b102b3c3f640968eb29e55c39c0f1fe672dee7cc744c109a8f

    SHA512

    10ff37371216fb3f34da1dbbefe2ec3434010331847961a2965203bf30535bff711dca0b8114f529c0a53180e2767a8b517214479e0a2afcb8e1f382d4c321a8

  • C:\Windows\Resources\Themes\explorer.exe

    Filesize

    135KB

    MD5

    dba4becbb5912b2735f5a82ffbe5d409

    SHA1

    f0c9e38175bdbc84be46d105bcbb1e9022707d1c

    SHA256

    1706b28db087d0a0400a02e34e80a11ed77c87bbba94e58ca5ba8d4f9404abae

    SHA512

    fba72545737f7d65a21fc068546954e36f06d87dc11e54c6efdd3e465baf38e143df6b48129589d7053018013aa446a0b404cb9c24a9fed9330eb122112bf981

  • C:\Windows\Resources\Themes\icsys.icn.exe

    Filesize

    135KB

    MD5

    2c2fc16feecdb0e31598a314ba614b25

    SHA1

    cfa621dce7917db897f426e38b57efbeca60d0ea

    SHA256

    cb65bf37b474da7eb505a071d1d244da061796f2533345c64b7d615cf0168f25

    SHA512

    6c9e82a4064d2634dede62b2a7a3661c5a9a1fe080185db411ee0e1774b3fc490e3ac9b9153051bb0289a50908445605803a0113993e492761ec24bc7f46acfe

  • C:\Windows\Resources\spoolsv.exe

    Filesize

    135KB

    MD5

    2b1423eacd235afadd75a0d6de46e5da

    SHA1

    9a76e7a5b9d3136d62ed828a2fc4836d708acd1c

    SHA256

    dd7747e719af69b38738e61d2d0c9820c324663c2deabbfe23faa5daf88dd5cc

    SHA512

    b5ce24ac3ef3c77e79964cf4b0aa4a558b879b7704f8c93daffbad3193be8835a6d867687b564e9777a969ba6e9cabd37bfc28a7f2fd8d4aad7475130830d8c9

  • C:\Windows\Resources\svchost.exe

    Filesize

    135KB

    MD5

    7abf315dca2b922e1a5381c85008f6da

    SHA1

    f6bb7a4d79aa4abfed7419a138d0e4a89457899a

    SHA256

    e448d46ab4be30638ffde4e45e161b35231ae38425aba0f139b736d1595b1886

    SHA512

    9e2e468c5dee1afb4e50ad79f44eb955a10fadafb1bc97dbd800014a90bd17850df3be258c3e6f59575ee540b76eb91eaa227aa2bbd005675d1bcb42e353a13d

  • memory/1124-44-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/1548-46-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/1636-45-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2972-0-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2972-47-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/3784-20-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB