Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
27/07/2024, 22:06
Static task
static1
Behavioral task
behavioral1
Sample
0a3166cfc6d771412517fd2ae96f29f0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0a3166cfc6d771412517fd2ae96f29f0N.exe
Resource
win10v2004-20240709-en
General
-
Target
0a3166cfc6d771412517fd2ae96f29f0N.exe
-
Size
4.7MB
-
MD5
0a3166cfc6d771412517fd2ae96f29f0
-
SHA1
63b37bb26ac2272966c1c9b82debf93ea8be0574
-
SHA256
b97a8f7f8d94ab544501f35597711b50cf3274a76f75fc27f9fe92edc07a510c
-
SHA512
1994634bef6761e7885433a9a1bb4191eb678404d8068a7129f8b64bf8426ecb65700ea08003bd53c029b8612bc0f9ee89b55a87b929b6afb01a9225260966c1
-
SSDEEP
49152:tYtAAX6FcShtPyqSLhSFULhMYYKqFWsMhUY71l8bX:q8yqEUFYhMYYKqFWsMhf16
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 6 IoCs
pid Process 696 0a3166cfc6d771412517fd2ae96f29f0n.exe 1644 icsys.icn.exe 388 explorer.exe 2864 spoolsv.exe 2020 svchost.exe 2832 spoolsv.exe -
Loads dropped DLL 11 IoCs
pid Process 2368 0a3166cfc6d771412517fd2ae96f29f0N.exe 2368 0a3166cfc6d771412517fd2ae96f29f0N.exe 1644 icsys.icn.exe 388 explorer.exe 2864 spoolsv.exe 2020 svchost.exe 2944 WerFault.exe 2944 WerFault.exe 2944 WerFault.exe 2944 WerFault.exe 2944 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\themes\explorer.exe icsys.icn.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe File opened for modification C:\Windows\Resources\Themes\icsys.icn.exe 0a3166cfc6d771412517fd2ae96f29f0N.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2944 696 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0a3166cfc6d771412517fd2ae96f29f0n.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icsys.icn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0a3166cfc6d771412517fd2ae96f29f0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\CID\{A3358E75-826A3-31A5-2C1E-14A484D53571} 0a3166cfc6d771412517fd2ae96f29f0n.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\CID\{A3358E75-826A3-31A5-2C1E-14A484D53571}\242DD93D\2 = "118105046078008009198080245028157129229105021171" 0a3166cfc6d771412517fd2ae96f29f0n.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\CID\{A3358E75-826A3-31A5-2C1E-14A484D53571}\242DD93D 0a3166cfc6d771412517fd2ae96f29f0n.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\CID 0a3166cfc6d771412517fd2ae96f29f0n.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2736 schtasks.exe 2276 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2368 0a3166cfc6d771412517fd2ae96f29f0N.exe 2368 0a3166cfc6d771412517fd2ae96f29f0N.exe 2368 0a3166cfc6d771412517fd2ae96f29f0N.exe 2368 0a3166cfc6d771412517fd2ae96f29f0N.exe 2368 0a3166cfc6d771412517fd2ae96f29f0N.exe 2368 0a3166cfc6d771412517fd2ae96f29f0N.exe 2368 0a3166cfc6d771412517fd2ae96f29f0N.exe 2368 0a3166cfc6d771412517fd2ae96f29f0N.exe 2368 0a3166cfc6d771412517fd2ae96f29f0N.exe 2368 0a3166cfc6d771412517fd2ae96f29f0N.exe 2368 0a3166cfc6d771412517fd2ae96f29f0N.exe 2368 0a3166cfc6d771412517fd2ae96f29f0N.exe 2368 0a3166cfc6d771412517fd2ae96f29f0N.exe 2368 0a3166cfc6d771412517fd2ae96f29f0N.exe 2368 0a3166cfc6d771412517fd2ae96f29f0N.exe 2368 0a3166cfc6d771412517fd2ae96f29f0N.exe 1644 icsys.icn.exe 1644 icsys.icn.exe 1644 icsys.icn.exe 1644 icsys.icn.exe 1644 icsys.icn.exe 1644 icsys.icn.exe 1644 icsys.icn.exe 1644 icsys.icn.exe 1644 icsys.icn.exe 1644 icsys.icn.exe 1644 icsys.icn.exe 1644 icsys.icn.exe 1644 icsys.icn.exe 1644 icsys.icn.exe 1644 icsys.icn.exe 1644 icsys.icn.exe 1644 icsys.icn.exe 388 explorer.exe 388 explorer.exe 388 explorer.exe 388 explorer.exe 388 explorer.exe 388 explorer.exe 388 explorer.exe 388 explorer.exe 388 explorer.exe 388 explorer.exe 388 explorer.exe 388 explorer.exe 388 explorer.exe 388 explorer.exe 388 explorer.exe 388 explorer.exe 2020 svchost.exe 2020 svchost.exe 2020 svchost.exe 2020 svchost.exe 2020 svchost.exe 2020 svchost.exe 2020 svchost.exe 2020 svchost.exe 2020 svchost.exe 2020 svchost.exe 2020 svchost.exe 2020 svchost.exe 2020 svchost.exe 2020 svchost.exe 2020 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 388 explorer.exe 2020 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2368 0a3166cfc6d771412517fd2ae96f29f0N.exe 2368 0a3166cfc6d771412517fd2ae96f29f0N.exe 1644 icsys.icn.exe 1644 icsys.icn.exe 388 explorer.exe 388 explorer.exe 2864 spoolsv.exe 2864 spoolsv.exe 2020 svchost.exe 2020 svchost.exe 2832 spoolsv.exe 2832 spoolsv.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 2368 wrote to memory of 696 2368 0a3166cfc6d771412517fd2ae96f29f0N.exe 30 PID 2368 wrote to memory of 696 2368 0a3166cfc6d771412517fd2ae96f29f0N.exe 30 PID 2368 wrote to memory of 696 2368 0a3166cfc6d771412517fd2ae96f29f0N.exe 30 PID 2368 wrote to memory of 696 2368 0a3166cfc6d771412517fd2ae96f29f0N.exe 30 PID 2368 wrote to memory of 1644 2368 0a3166cfc6d771412517fd2ae96f29f0N.exe 31 PID 2368 wrote to memory of 1644 2368 0a3166cfc6d771412517fd2ae96f29f0N.exe 31 PID 2368 wrote to memory of 1644 2368 0a3166cfc6d771412517fd2ae96f29f0N.exe 31 PID 2368 wrote to memory of 1644 2368 0a3166cfc6d771412517fd2ae96f29f0N.exe 31 PID 1644 wrote to memory of 388 1644 icsys.icn.exe 32 PID 1644 wrote to memory of 388 1644 icsys.icn.exe 32 PID 1644 wrote to memory of 388 1644 icsys.icn.exe 32 PID 1644 wrote to memory of 388 1644 icsys.icn.exe 32 PID 388 wrote to memory of 2864 388 explorer.exe 33 PID 388 wrote to memory of 2864 388 explorer.exe 33 PID 388 wrote to memory of 2864 388 explorer.exe 33 PID 388 wrote to memory of 2864 388 explorer.exe 33 PID 2864 wrote to memory of 2020 2864 spoolsv.exe 34 PID 2864 wrote to memory of 2020 2864 spoolsv.exe 34 PID 2864 wrote to memory of 2020 2864 spoolsv.exe 34 PID 2864 wrote to memory of 2020 2864 spoolsv.exe 34 PID 2020 wrote to memory of 2832 2020 svchost.exe 35 PID 2020 wrote to memory of 2832 2020 svchost.exe 35 PID 2020 wrote to memory of 2832 2020 svchost.exe 35 PID 2020 wrote to memory of 2832 2020 svchost.exe 35 PID 388 wrote to memory of 1656 388 explorer.exe 36 PID 388 wrote to memory of 1656 388 explorer.exe 36 PID 388 wrote to memory of 1656 388 explorer.exe 36 PID 388 wrote to memory of 1656 388 explorer.exe 36 PID 2020 wrote to memory of 2736 2020 svchost.exe 37 PID 2020 wrote to memory of 2736 2020 svchost.exe 37 PID 2020 wrote to memory of 2736 2020 svchost.exe 37 PID 2020 wrote to memory of 2736 2020 svchost.exe 37 PID 696 wrote to memory of 2944 696 0a3166cfc6d771412517fd2ae96f29f0n.exe 42 PID 696 wrote to memory of 2944 696 0a3166cfc6d771412517fd2ae96f29f0n.exe 42 PID 696 wrote to memory of 2944 696 0a3166cfc6d771412517fd2ae96f29f0n.exe 42 PID 696 wrote to memory of 2944 696 0a3166cfc6d771412517fd2ae96f29f0n.exe 42 PID 2020 wrote to memory of 2276 2020 svchost.exe 43 PID 2020 wrote to memory of 2276 2020 svchost.exe 43 PID 2020 wrote to memory of 2276 2020 svchost.exe 43 PID 2020 wrote to memory of 2276 2020 svchost.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\0a3166cfc6d771412517fd2ae96f29f0N.exe"C:\Users\Admin\AppData\Local\Temp\0a3166cfc6d771412517fd2ae96f29f0N.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2368 -
\??\c:\users\admin\appdata\local\temp\0a3166cfc6d771412517fd2ae96f29f0n.exec:\users\admin\appdata\local\temp\0a3166cfc6d771412517fd2ae96f29f0n.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:696 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 696 -s 9883⤵
- Loads dropped DLL
- Program crash
PID:2944
-
-
-
C:\Windows\Resources\Themes\icsys.icn.exeC:\Windows\Resources\Themes\icsys.icn.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1644 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe3⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:388 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2864 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe5⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2020 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2832
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 00:32 /f6⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2736
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 00:33 /f6⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2276
-
-
-
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe4⤵PID:1656
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.6MB
MD5e4d6bc579bb1784abe102df50b454415
SHA1fdebff4c0fd98b33c44e0b2c8cd372fedbd8ede1
SHA256f7edb4846e02a8ae90e6020ab69431825d27d9924835a70066f8449635baab50
SHA512d8a2775a17eb8b4bfa4f92bba2f5a7b187a8b7d8b1dab53bded056c4d071a2d5e47a45acb4c3c12b5bcdde34876f95b0ae04e3db554093d79f7ab740fe7907ce
-
Filesize
135KB
MD52a884a7590720160d49798aa3c16126a
SHA1ab164f7dbe91ce8c8b2d9747f2ba1510337f99a7
SHA256d857f3c568ae4bd53f3ac4ad9c563f6540abd183fa6d4af4f640c9bbf08bb992
SHA51255aede0eb0a76c40ccce621eace52ec1310de683919d5918b45009e8cc356415586dd3499a0a12bfbf6858ee8c7449f10acb0bdf826b88035c194cf39ceeb67b
-
Filesize
135KB
MD5b7b44d1c1561f42030e32f2c38664a0f
SHA138592dcd976e46d26dae56419f239bd5fbf487b5
SHA256ebe48be77ba73d1f901dd793f4607dfbcad3e4618b83610edc512eabc2ea4761
SHA512f85ad941df34f17a6fc4de49aaa3598b70cf78236783a495aa58bba15337cc6d5ff557ede82619bce4eb3fd6de728773ba36a0e4742de3b70f6226206d5e19fb
-
Filesize
135KB
MD55c10c82e64773abcff060a889f0e619b
SHA1b80f64ae330fbef16c8abb8fdd7c15e63c8db033
SHA2564494153520a42750ad9f0f3a8880a220f5e32e48966aa5e1e1c49f89a92ff933
SHA512b552a42c63a864109f719b37aabe93195da9fa54ec913f6925e76f411a873df9c3e1280fbbe045cd356415c89e9e52bb4d56ef35b2445711f9d255d39e6760b9
-
Filesize
135KB
MD5ff667df09e17da65ed9af3522c85e6be
SHA181e258ad2210d853e63e192a0cb8881c8fc0a8a7
SHA25677a43e8fe05e68b72121486f948cb6e0e6170b1923c8ddee8c3a57bb33d582de
SHA5127f3f5c6888bb9fd5d343c5f846317e89acbe49daff8a4cbc44fe93aaf65f184683d63d4462fcd9f46a7535fbbd61b9c33764b0101e181f56c022a95c5d76df90