Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
22/07/2024, 23:29
Static task
static1
Behavioral task
behavioral1
Sample
2b5a6fe14376cbb5dc3ccc73aec34110N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2b5a6fe14376cbb5dc3ccc73aec34110N.exe
Resource
win10v2004-20240709-en
General
-
Target
2b5a6fe14376cbb5dc3ccc73aec34110N.exe
-
Size
135KB
-
MD5
2b5a6fe14376cbb5dc3ccc73aec34110
-
SHA1
e6df196f3a11432091fd329d8a0f7b2cc9abf9c4
-
SHA256
e5dfed3f665d93160eb7ed7c3abaa39ca23c6768e44a23d6cf60804530c4742a
-
SHA512
14eb250c9a7df54f531fd6fc1dd88f6de40795aa227af67bb5f5e23db20b450a3cced267af0ce17279920ea9601cacf8102712739338c1723f5d06a6181e46b0
-
SSDEEP
1536:4fsEqouTRcG/Mzvgf7xEuvnXNTRdUzwTekUOisZ1yDDajtXbVgEhu:4VqoCl/YgjxEufVU0TbTyDDalquu
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 2488 explorer.exe 4116 spoolsv.exe 2196 svchost.exe 1088 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe File opened for modification \??\c:\windows\resources\themes\explorer.exe 2b5a6fe14376cbb5dc3ccc73aec34110N.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4912 2b5a6fe14376cbb5dc3ccc73aec34110N.exe 4912 2b5a6fe14376cbb5dc3ccc73aec34110N.exe 4912 2b5a6fe14376cbb5dc3ccc73aec34110N.exe 4912 2b5a6fe14376cbb5dc3ccc73aec34110N.exe 4912 2b5a6fe14376cbb5dc3ccc73aec34110N.exe 4912 2b5a6fe14376cbb5dc3ccc73aec34110N.exe 4912 2b5a6fe14376cbb5dc3ccc73aec34110N.exe 4912 2b5a6fe14376cbb5dc3ccc73aec34110N.exe 4912 2b5a6fe14376cbb5dc3ccc73aec34110N.exe 4912 2b5a6fe14376cbb5dc3ccc73aec34110N.exe 4912 2b5a6fe14376cbb5dc3ccc73aec34110N.exe 4912 2b5a6fe14376cbb5dc3ccc73aec34110N.exe 4912 2b5a6fe14376cbb5dc3ccc73aec34110N.exe 4912 2b5a6fe14376cbb5dc3ccc73aec34110N.exe 4912 2b5a6fe14376cbb5dc3ccc73aec34110N.exe 4912 2b5a6fe14376cbb5dc3ccc73aec34110N.exe 4912 2b5a6fe14376cbb5dc3ccc73aec34110N.exe 4912 2b5a6fe14376cbb5dc3ccc73aec34110N.exe 4912 2b5a6fe14376cbb5dc3ccc73aec34110N.exe 4912 2b5a6fe14376cbb5dc3ccc73aec34110N.exe 4912 2b5a6fe14376cbb5dc3ccc73aec34110N.exe 4912 2b5a6fe14376cbb5dc3ccc73aec34110N.exe 4912 2b5a6fe14376cbb5dc3ccc73aec34110N.exe 4912 2b5a6fe14376cbb5dc3ccc73aec34110N.exe 4912 2b5a6fe14376cbb5dc3ccc73aec34110N.exe 4912 2b5a6fe14376cbb5dc3ccc73aec34110N.exe 4912 2b5a6fe14376cbb5dc3ccc73aec34110N.exe 4912 2b5a6fe14376cbb5dc3ccc73aec34110N.exe 4912 2b5a6fe14376cbb5dc3ccc73aec34110N.exe 4912 2b5a6fe14376cbb5dc3ccc73aec34110N.exe 4912 2b5a6fe14376cbb5dc3ccc73aec34110N.exe 4912 2b5a6fe14376cbb5dc3ccc73aec34110N.exe 4912 2b5a6fe14376cbb5dc3ccc73aec34110N.exe 4912 2b5a6fe14376cbb5dc3ccc73aec34110N.exe 2488 explorer.exe 2488 explorer.exe 2488 explorer.exe 2488 explorer.exe 2488 explorer.exe 2488 explorer.exe 2488 explorer.exe 2488 explorer.exe 2488 explorer.exe 2488 explorer.exe 2488 explorer.exe 2488 explorer.exe 2488 explorer.exe 2488 explorer.exe 2488 explorer.exe 2488 explorer.exe 2488 explorer.exe 2488 explorer.exe 2488 explorer.exe 2488 explorer.exe 2488 explorer.exe 2488 explorer.exe 2488 explorer.exe 2488 explorer.exe 2488 explorer.exe 2488 explorer.exe 2488 explorer.exe 2488 explorer.exe 2488 explorer.exe 2488 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2488 explorer.exe 2196 svchost.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 4912 2b5a6fe14376cbb5dc3ccc73aec34110N.exe 4912 2b5a6fe14376cbb5dc3ccc73aec34110N.exe 2488 explorer.exe 2488 explorer.exe 4116 spoolsv.exe 4116 spoolsv.exe 2196 svchost.exe 2196 svchost.exe 1088 spoolsv.exe 1088 spoolsv.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4912 wrote to memory of 2488 4912 2b5a6fe14376cbb5dc3ccc73aec34110N.exe 86 PID 4912 wrote to memory of 2488 4912 2b5a6fe14376cbb5dc3ccc73aec34110N.exe 86 PID 4912 wrote to memory of 2488 4912 2b5a6fe14376cbb5dc3ccc73aec34110N.exe 86 PID 2488 wrote to memory of 4116 2488 explorer.exe 88 PID 2488 wrote to memory of 4116 2488 explorer.exe 88 PID 2488 wrote to memory of 4116 2488 explorer.exe 88 PID 4116 wrote to memory of 2196 4116 spoolsv.exe 89 PID 4116 wrote to memory of 2196 4116 spoolsv.exe 89 PID 4116 wrote to memory of 2196 4116 spoolsv.exe 89 PID 2196 wrote to memory of 1088 2196 svchost.exe 90 PID 2196 wrote to memory of 1088 2196 svchost.exe 90 PID 2196 wrote to memory of 1088 2196 svchost.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\2b5a6fe14376cbb5dc3ccc73aec34110N.exe"C:\Users\Admin\AppData\Local\Temp\2b5a6fe14376cbb5dc3ccc73aec34110N.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4912 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2488 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4116 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2196 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1088
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135KB
MD556218f558f7a11fc3abe0cb6943268b6
SHA19c22e29f366834729f99a4a09d22814d01c820c0
SHA256b9eff5172a0d945fab59928a5a643ade4eaa843a20ca0e80c7e17a91d5682bd8
SHA512c45f997189081bd27ef3287d3000a5b7b18610d4dacb4b5cca71c4d259c0036344a78de7259d95814ba26fa42f7310cffeb1906e3bbd19c2669d784a246b7d5c
-
Filesize
135KB
MD501cdd3c4c09311b238146b51ff0b379d
SHA16a7ca28dbe70cdf9acc1d24545ee5dc0d15c2bcc
SHA2567c4fb5686ea59a1f775e1237f34d68d1d9a41d85eee217c4f79748acbebf4cfb
SHA51210e0037e30938f4c274018f33918b711cc163e145d454c941f3cb4c2cc53d0a421f2c973231b7b1bcaf520f12be8ba13b44c509c2079df6f6f89596c53e789db
-
Filesize
135KB
MD5939e8d7a5c62e48e93bcbf2c8b21ee53
SHA107b91e6baa48c071376e05b80843a3f490b20ba8
SHA256230dfacf19cc8d5440b4d88b600bd5cb758ef9128d90f1a0898a3cbb058da092
SHA512624f56dc608e42f0fee2271df2bd63dbe6f3262926bff7879e77f4358ecdb58bc5ecb1e96773f9efab1119b6ece8d3846531c1b1192c2008beb4129215f9330d