Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
90s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26/07/2024, 14:18
Static task
static1
Behavioral task
behavioral1
Sample
1aca0a22e141cd74df39829beab1cec0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
1aca0a22e141cd74df39829beab1cec0N.exe
Resource
win10v2004-20240709-en
General
-
Target
1aca0a22e141cd74df39829beab1cec0N.exe
-
Size
135KB
-
MD5
1aca0a22e141cd74df39829beab1cec0
-
SHA1
1d19212f3131046a2bc5b8735a40010527000a23
-
SHA256
d206754e9acc8e3a8a1a4635c170849a79da0af76900dc5492136f6b4caf16c4
-
SHA512
dff1157cbe4f73f3900f4bd5ba5764a6d870d6442b4d192b203546966de91f3fe58adb2270afabb2aeb83973380b57911f76207710ae17c856a1e550345af83b
-
SSDEEP
3072:UVqoCl/YgjxEufVU0TbTyDDal4dzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzj:UsLqdufVUNDaAzzzzzzzzzzzzzzzzzzj
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 5048 explorer.exe 1640 spoolsv.exe 1232 svchost.exe 2032 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\Resources\tjud.exe explorer.exe File opened for modification \??\c:\windows\resources\themes\explorer.exe 1aca0a22e141cd74df39829beab1cec0N.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1aca0a22e141cd74df39829beab1cec0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4968 1aca0a22e141cd74df39829beab1cec0N.exe 4968 1aca0a22e141cd74df39829beab1cec0N.exe 4968 1aca0a22e141cd74df39829beab1cec0N.exe 4968 1aca0a22e141cd74df39829beab1cec0N.exe 4968 1aca0a22e141cd74df39829beab1cec0N.exe 4968 1aca0a22e141cd74df39829beab1cec0N.exe 4968 1aca0a22e141cd74df39829beab1cec0N.exe 4968 1aca0a22e141cd74df39829beab1cec0N.exe 4968 1aca0a22e141cd74df39829beab1cec0N.exe 4968 1aca0a22e141cd74df39829beab1cec0N.exe 4968 1aca0a22e141cd74df39829beab1cec0N.exe 4968 1aca0a22e141cd74df39829beab1cec0N.exe 4968 1aca0a22e141cd74df39829beab1cec0N.exe 4968 1aca0a22e141cd74df39829beab1cec0N.exe 4968 1aca0a22e141cd74df39829beab1cec0N.exe 4968 1aca0a22e141cd74df39829beab1cec0N.exe 4968 1aca0a22e141cd74df39829beab1cec0N.exe 4968 1aca0a22e141cd74df39829beab1cec0N.exe 4968 1aca0a22e141cd74df39829beab1cec0N.exe 4968 1aca0a22e141cd74df39829beab1cec0N.exe 4968 1aca0a22e141cd74df39829beab1cec0N.exe 4968 1aca0a22e141cd74df39829beab1cec0N.exe 4968 1aca0a22e141cd74df39829beab1cec0N.exe 4968 1aca0a22e141cd74df39829beab1cec0N.exe 4968 1aca0a22e141cd74df39829beab1cec0N.exe 4968 1aca0a22e141cd74df39829beab1cec0N.exe 4968 1aca0a22e141cd74df39829beab1cec0N.exe 4968 1aca0a22e141cd74df39829beab1cec0N.exe 4968 1aca0a22e141cd74df39829beab1cec0N.exe 4968 1aca0a22e141cd74df39829beab1cec0N.exe 4968 1aca0a22e141cd74df39829beab1cec0N.exe 4968 1aca0a22e141cd74df39829beab1cec0N.exe 4968 1aca0a22e141cd74df39829beab1cec0N.exe 4968 1aca0a22e141cd74df39829beab1cec0N.exe 5048 explorer.exe 5048 explorer.exe 5048 explorer.exe 5048 explorer.exe 5048 explorer.exe 5048 explorer.exe 5048 explorer.exe 5048 explorer.exe 5048 explorer.exe 5048 explorer.exe 5048 explorer.exe 5048 explorer.exe 5048 explorer.exe 5048 explorer.exe 5048 explorer.exe 5048 explorer.exe 5048 explorer.exe 5048 explorer.exe 5048 explorer.exe 5048 explorer.exe 5048 explorer.exe 5048 explorer.exe 5048 explorer.exe 5048 explorer.exe 5048 explorer.exe 5048 explorer.exe 5048 explorer.exe 5048 explorer.exe 5048 explorer.exe 5048 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 5048 explorer.exe 1232 svchost.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 4968 1aca0a22e141cd74df39829beab1cec0N.exe 4968 1aca0a22e141cd74df39829beab1cec0N.exe 5048 explorer.exe 5048 explorer.exe 1640 spoolsv.exe 1640 spoolsv.exe 1232 svchost.exe 1232 svchost.exe 2032 spoolsv.exe 2032 spoolsv.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4968 wrote to memory of 5048 4968 1aca0a22e141cd74df39829beab1cec0N.exe 84 PID 4968 wrote to memory of 5048 4968 1aca0a22e141cd74df39829beab1cec0N.exe 84 PID 4968 wrote to memory of 5048 4968 1aca0a22e141cd74df39829beab1cec0N.exe 84 PID 5048 wrote to memory of 1640 5048 explorer.exe 85 PID 5048 wrote to memory of 1640 5048 explorer.exe 85 PID 5048 wrote to memory of 1640 5048 explorer.exe 85 PID 1640 wrote to memory of 1232 1640 spoolsv.exe 86 PID 1640 wrote to memory of 1232 1640 spoolsv.exe 86 PID 1640 wrote to memory of 1232 1640 spoolsv.exe 86 PID 1232 wrote to memory of 2032 1232 svchost.exe 87 PID 1232 wrote to memory of 2032 1232 svchost.exe 87 PID 1232 wrote to memory of 2032 1232 svchost.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\1aca0a22e141cd74df39829beab1cec0N.exe"C:\Users\Admin\AppData\Local\Temp\1aca0a22e141cd74df39829beab1cec0N.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4968 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5048 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1640 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1232 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2032
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135KB
MD5bee7de505faa7bf764d11cfcc1001edd
SHA13768ae18c1eb5de31425edb610b5a17c43fa4337
SHA256f517f819f8787c7df090801a32481662db3f68c3c466326f9a2cbc2f6862d9ac
SHA51234b47a713f2292b37679fa3ad04b7b08e6b6a06bc6fae7e83bc444df6124c0289a868760cff2e767b379e2d6ea1507b9f4565f3e67d722ff79e53c626e846ff9
-
Filesize
135KB
MD5266e0d6940b0956b303f291f995cd5b7
SHA196e3587a5cf6cf2e12128b776a8becbf43d30df0
SHA2568760fc4b6a3dd1c7ef25db38d1797d35da75c150c8cbfc1c5cc68aa64e03c7a5
SHA512f5612d958c9b2abf630e5458e0af3e8fe79d3dbaffde6319839a60ca0c67d2631ca0828f5843c28ec98301c4dfe0585e25c7634831cd8cb6ccf32389bc68c445
-
Filesize
135KB
MD58ac624464d137caacfea485d62ccd96e
SHA137b9763fab6fe1fb634bf7b02c13ec007aaaf240
SHA256ed784d156ecd9fcd61cef262a04a1467700b4bce26f5b2414395ccb16967bb3d
SHA512ddc24134986b1afbfc73af4022f8c4ad7e17e103969675669152a44e1374ba9be50e578bc48864cb72b3feee20e76c50496d04dd7d3130ac342164184c162d95