Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
25/07/2024, 21:36
Static task
static1
Behavioral task
behavioral1
Sample
109015d4b83faedd67d948a633094240N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
109015d4b83faedd67d948a633094240N.exe
Resource
win10v2004-20240709-en
General
-
Target
109015d4b83faedd67d948a633094240N.exe
-
Size
2.3MB
-
MD5
109015d4b83faedd67d948a633094240
-
SHA1
08756d3aee790ebd76a716722274b7e73a8e4434
-
SHA256
4df4e0d574fffdc2a01c8586ecd229f57fb6473180c19f41b40f5dccc42e61a2
-
SHA512
c7212e87f16ad3c6c365da72c866cd240a137e212201df9dc7e260a6b138128f344609f61af9be5eb3a37157eea65ff9973c362ac5c2436a2d7adab723d9f7ee
-
SSDEEP
24576:PFOa7wf1O8JPPdc9o5KIc8x88eJfeJB4SbE9HppkDw9Bmpwy855sM40YtQ2qlBP0:tAU8ARQ6SCppkDw9BmpZ3aTPIsY9
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 6 IoCs
pid Process 2540 109015d4b83faedd67d948a633094240n.exe 1764 icsys.icn.exe 2216 explorer.exe 2100 spoolsv.exe 2756 svchost.exe 2864 spoolsv.exe -
Loads dropped DLL 6 IoCs
pid Process 2548 109015d4b83faedd67d948a633094240N.exe 2548 109015d4b83faedd67d948a633094240N.exe 1764 icsys.icn.exe 2216 explorer.exe 2100 spoolsv.exe 2756 svchost.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\Resources\tjud.exe explorer.exe File opened for modification C:\Windows\Resources\Themes\icsys.icn.exe 109015d4b83faedd67d948a633094240N.exe File opened for modification \??\c:\windows\resources\themes\explorer.exe icsys.icn.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 109015d4b83faedd67d948a633094240N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 109015d4b83faedd67d948a633094240n.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icsys.icn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2184 schtasks.exe 2944 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2548 109015d4b83faedd67d948a633094240N.exe 2548 109015d4b83faedd67d948a633094240N.exe 2548 109015d4b83faedd67d948a633094240N.exe 2548 109015d4b83faedd67d948a633094240N.exe 2548 109015d4b83faedd67d948a633094240N.exe 2548 109015d4b83faedd67d948a633094240N.exe 2548 109015d4b83faedd67d948a633094240N.exe 2548 109015d4b83faedd67d948a633094240N.exe 2548 109015d4b83faedd67d948a633094240N.exe 2548 109015d4b83faedd67d948a633094240N.exe 2548 109015d4b83faedd67d948a633094240N.exe 2548 109015d4b83faedd67d948a633094240N.exe 2548 109015d4b83faedd67d948a633094240N.exe 2548 109015d4b83faedd67d948a633094240N.exe 2548 109015d4b83faedd67d948a633094240N.exe 2548 109015d4b83faedd67d948a633094240N.exe 1764 icsys.icn.exe 1764 icsys.icn.exe 1764 icsys.icn.exe 1764 icsys.icn.exe 1764 icsys.icn.exe 1764 icsys.icn.exe 1764 icsys.icn.exe 1764 icsys.icn.exe 1764 icsys.icn.exe 1764 icsys.icn.exe 1764 icsys.icn.exe 1764 icsys.icn.exe 1764 icsys.icn.exe 1764 icsys.icn.exe 1764 icsys.icn.exe 1764 icsys.icn.exe 1764 icsys.icn.exe 2216 explorer.exe 2216 explorer.exe 2216 explorer.exe 2216 explorer.exe 2216 explorer.exe 2216 explorer.exe 2216 explorer.exe 2216 explorer.exe 2216 explorer.exe 2216 explorer.exe 2216 explorer.exe 2216 explorer.exe 2216 explorer.exe 2216 explorer.exe 2216 explorer.exe 2216 explorer.exe 2756 svchost.exe 2756 svchost.exe 2756 svchost.exe 2756 svchost.exe 2756 svchost.exe 2756 svchost.exe 2756 svchost.exe 2756 svchost.exe 2756 svchost.exe 2756 svchost.exe 2756 svchost.exe 2756 svchost.exe 2756 svchost.exe 2756 svchost.exe 2756 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 3 IoCs
pid Process 2756 svchost.exe 2216 explorer.exe 2540 109015d4b83faedd67d948a633094240n.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2548 109015d4b83faedd67d948a633094240N.exe 2548 109015d4b83faedd67d948a633094240N.exe 1764 icsys.icn.exe 1764 icsys.icn.exe 2216 explorer.exe 2216 explorer.exe 2100 spoolsv.exe 2100 spoolsv.exe 2756 svchost.exe 2756 svchost.exe 2864 spoolsv.exe 2864 spoolsv.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2548 wrote to memory of 2540 2548 109015d4b83faedd67d948a633094240N.exe 30 PID 2548 wrote to memory of 2540 2548 109015d4b83faedd67d948a633094240N.exe 30 PID 2548 wrote to memory of 2540 2548 109015d4b83faedd67d948a633094240N.exe 30 PID 2548 wrote to memory of 2540 2548 109015d4b83faedd67d948a633094240N.exe 30 PID 2548 wrote to memory of 1764 2548 109015d4b83faedd67d948a633094240N.exe 31 PID 2548 wrote to memory of 1764 2548 109015d4b83faedd67d948a633094240N.exe 31 PID 2548 wrote to memory of 1764 2548 109015d4b83faedd67d948a633094240N.exe 31 PID 2548 wrote to memory of 1764 2548 109015d4b83faedd67d948a633094240N.exe 31 PID 1764 wrote to memory of 2216 1764 icsys.icn.exe 32 PID 1764 wrote to memory of 2216 1764 icsys.icn.exe 32 PID 1764 wrote to memory of 2216 1764 icsys.icn.exe 32 PID 1764 wrote to memory of 2216 1764 icsys.icn.exe 32 PID 2216 wrote to memory of 2100 2216 explorer.exe 33 PID 2216 wrote to memory of 2100 2216 explorer.exe 33 PID 2216 wrote to memory of 2100 2216 explorer.exe 33 PID 2216 wrote to memory of 2100 2216 explorer.exe 33 PID 2100 wrote to memory of 2756 2100 spoolsv.exe 34 PID 2100 wrote to memory of 2756 2100 spoolsv.exe 34 PID 2100 wrote to memory of 2756 2100 spoolsv.exe 34 PID 2100 wrote to memory of 2756 2100 spoolsv.exe 34 PID 2756 wrote to memory of 2864 2756 svchost.exe 35 PID 2756 wrote to memory of 2864 2756 svchost.exe 35 PID 2756 wrote to memory of 2864 2756 svchost.exe 35 PID 2756 wrote to memory of 2864 2756 svchost.exe 35 PID 2216 wrote to memory of 2908 2216 explorer.exe 36 PID 2216 wrote to memory of 2908 2216 explorer.exe 36 PID 2216 wrote to memory of 2908 2216 explorer.exe 36 PID 2216 wrote to memory of 2908 2216 explorer.exe 36 PID 2756 wrote to memory of 2184 2756 svchost.exe 37 PID 2756 wrote to memory of 2184 2756 svchost.exe 37 PID 2756 wrote to memory of 2184 2756 svchost.exe 37 PID 2756 wrote to memory of 2184 2756 svchost.exe 37 PID 2756 wrote to memory of 2944 2756 svchost.exe 41 PID 2756 wrote to memory of 2944 2756 svchost.exe 41 PID 2756 wrote to memory of 2944 2756 svchost.exe 41 PID 2756 wrote to memory of 2944 2756 svchost.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\109015d4b83faedd67d948a633094240N.exe"C:\Users\Admin\AppData\Local\Temp\109015d4b83faedd67d948a633094240N.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2548 -
\??\c:\users\admin\appdata\local\temp\109015d4b83faedd67d948a633094240n.exec:\users\admin\appdata\local\temp\109015d4b83faedd67d948a633094240n.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:2540
-
-
C:\Windows\Resources\Themes\icsys.icn.exeC:\Windows\Resources\Themes\icsys.icn.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1764 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe3⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2216 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2100 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe5⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2756 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2864
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 21:38 /f6⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2184
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 21:39 /f6⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2944
-
-
-
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe4⤵PID:2908
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.2MB
MD565b954468b068ebdf457c67c452c18e6
SHA1644391b8f2741603a6942bd456f23c46c8b9df7a
SHA256485006f4264d3835374c99820acbad6e9e409fda3aa78bcff98adfc9f62e8598
SHA5120327461d01b7bce4a6275ca4a5d0eca2fbcfcedf8b1620856f707def22ea89136e98a7bc3f7d74190ace47949a46617221777b1a5f8a6501adbb25d0fc8df373
-
Filesize
135KB
MD5a9e1b19a3a2030e903b453a9f815208f
SHA1337485fd0987704691c43734b9fd684c329dbdcb
SHA2564636bbe9a3c297dbf4768b98b9e17c6c9a1284ea6104db1de5877db645301a8d
SHA5126642c1311abbb9c6ac253e7ec47d7b268adbc240714db429279dbb6d905ed0e011c8ba34a94cd14130a91dad65117d0cb1e0b82bcdcb29453773f5ceb58f46f7
-
Filesize
135KB
MD56708ad26c1e3b978054f905b140c6f1c
SHA1104b00286aab9f93390af03d344da4fee5064ecc
SHA2560f90b1ceed4aa000d4049696c2673f6c98685e5b6184b894bf5c4ddd9948a415
SHA512408fbae7f92eea3d38045ce89da02b6c1cba3feb0e0700cdfd87e0b4ea7a63470dca6a03d6dd04152c02b90d98dcb8813742bf883b1dd7f31fbd2883755183ed
-
Filesize
135KB
MD5c81892ae7918e26130312efae38f9a58
SHA1517a5b347366b89aa84eb574477ab946cda62358
SHA25608cd00dfb13a7c5c3eee8fcbdeb34b63418a06a9dec5a9a92d067659eb629659
SHA51254fb49f35f8b548634796eac6b611ed71cf10fe8fcc45e14f2c076ee4be2a3204d50d76da6f761292437b79bf706ad6af675c83829c160a65e53ed6184aa61e6
-
Filesize
135KB
MD52a452828a16058d2086d4fd8d6aaebbf
SHA1e81413a48a76390efb3666bebb7a001a6df822ce
SHA256251d9a339a048c2e0fd2eabe91f31681436458c28488487415d7b24a39f0559b
SHA512a05cadd3df06c952f88ef7b6951afa75fe5b0c6f607166b241e57d6bc9f3a57a24bce9cde54f873366c51200007d21ff4f0e56e41422991b07f944a716f27fda