Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
16/08/2024, 23:25
Static task
static1
Behavioral task
behavioral1
Sample
5db5387e4c24ae87ea0fd4a905d8eecde1a898f6aadd4cdb6b52cbb756088627.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5db5387e4c24ae87ea0fd4a905d8eecde1a898f6aadd4cdb6b52cbb756088627.exe
Resource
win10v2004-20240802-en
General
-
Target
5db5387e4c24ae87ea0fd4a905d8eecde1a898f6aadd4cdb6b52cbb756088627.exe
-
Size
206KB
-
MD5
a305277341951bd694f90b7663fcc150
-
SHA1
fdda95f6b8ac829d49b25042ea884ed527388af4
-
SHA256
5db5387e4c24ae87ea0fd4a905d8eecde1a898f6aadd4cdb6b52cbb756088627
-
SHA512
379131604af217f4ca58dc763c0a501ffa68bfcd8d9465734a73d28a1f5ac086d71cc57000594107f56c5969dbdc108875ba51c7ebf56b6f581fe021f43fc61b
-
SSDEEP
3072:zvEfVUzSLhIVbV6i5LirrlZrHyrUHUckoMQ2RN6unN:zvEN2U+T6i5LirrllHy4HUcMQY6A
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 8 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe -
Executes dropped EXE 4 IoCs
pid Process 2432 explorer.exe 4864 spoolsv.exe 4348 svchost.exe 64 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification \??\c:\windows\system\explorer.exe 5db5387e4c24ae87ea0fd4a905d8eecde1a898f6aadd4cdb6b52cbb756088627.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5db5387e4c24ae87ea0fd4a905d8eecde1a898f6aadd4cdb6b52cbb756088627.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2260 5db5387e4c24ae87ea0fd4a905d8eecde1a898f6aadd4cdb6b52cbb756088627.exe 2260 5db5387e4c24ae87ea0fd4a905d8eecde1a898f6aadd4cdb6b52cbb756088627.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 4348 svchost.exe 4348 svchost.exe 4348 svchost.exe 4348 svchost.exe 2432 explorer.exe 2432 explorer.exe 4348 svchost.exe 4348 svchost.exe 2432 explorer.exe 2432 explorer.exe 4348 svchost.exe 4348 svchost.exe 2432 explorer.exe 2432 explorer.exe 4348 svchost.exe 4348 svchost.exe 2432 explorer.exe 2432 explorer.exe 4348 svchost.exe 4348 svchost.exe 2432 explorer.exe 2432 explorer.exe 4348 svchost.exe 4348 svchost.exe 2432 explorer.exe 2432 explorer.exe 4348 svchost.exe 4348 svchost.exe 2432 explorer.exe 2432 explorer.exe 4348 svchost.exe 4348 svchost.exe 2432 explorer.exe 2432 explorer.exe 4348 svchost.exe 4348 svchost.exe 2432 explorer.exe 2432 explorer.exe 4348 svchost.exe 4348 svchost.exe 2432 explorer.exe 2432 explorer.exe 4348 svchost.exe 4348 svchost.exe 2432 explorer.exe 2432 explorer.exe 4348 svchost.exe 4348 svchost.exe 2432 explorer.exe 2432 explorer.exe 4348 svchost.exe 4348 svchost.exe 2432 explorer.exe 2432 explorer.exe 4348 svchost.exe 4348 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2432 explorer.exe 4348 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2260 5db5387e4c24ae87ea0fd4a905d8eecde1a898f6aadd4cdb6b52cbb756088627.exe 2260 5db5387e4c24ae87ea0fd4a905d8eecde1a898f6aadd4cdb6b52cbb756088627.exe 2432 explorer.exe 2432 explorer.exe 4864 spoolsv.exe 4864 spoolsv.exe 4348 svchost.exe 4348 svchost.exe 64 spoolsv.exe 64 spoolsv.exe 2432 explorer.exe 2432 explorer.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2260 wrote to memory of 2432 2260 5db5387e4c24ae87ea0fd4a905d8eecde1a898f6aadd4cdb6b52cbb756088627.exe 85 PID 2260 wrote to memory of 2432 2260 5db5387e4c24ae87ea0fd4a905d8eecde1a898f6aadd4cdb6b52cbb756088627.exe 85 PID 2260 wrote to memory of 2432 2260 5db5387e4c24ae87ea0fd4a905d8eecde1a898f6aadd4cdb6b52cbb756088627.exe 85 PID 2432 wrote to memory of 4864 2432 explorer.exe 86 PID 2432 wrote to memory of 4864 2432 explorer.exe 86 PID 2432 wrote to memory of 4864 2432 explorer.exe 86 PID 4864 wrote to memory of 4348 4864 spoolsv.exe 87 PID 4864 wrote to memory of 4348 4864 spoolsv.exe 87 PID 4864 wrote to memory of 4348 4864 spoolsv.exe 87 PID 4348 wrote to memory of 64 4348 svchost.exe 88 PID 4348 wrote to memory of 64 4348 svchost.exe 88 PID 4348 wrote to memory of 64 4348 svchost.exe 88 PID 4348 wrote to memory of 3752 4348 svchost.exe 90 PID 4348 wrote to memory of 3752 4348 svchost.exe 90 PID 4348 wrote to memory of 3752 4348 svchost.exe 90 PID 4348 wrote to memory of 4472 4348 svchost.exe 108 PID 4348 wrote to memory of 4472 4348 svchost.exe 108 PID 4348 wrote to memory of 4472 4348 svchost.exe 108 PID 4348 wrote to memory of 1592 4348 svchost.exe 115 PID 4348 wrote to memory of 1592 4348 svchost.exe 115 PID 4348 wrote to memory of 1592 4348 svchost.exe 115
Processes
-
C:\Users\Admin\AppData\Local\Temp\5db5387e4c24ae87ea0fd4a905d8eecde1a898f6aadd4cdb6b52cbb756088627.exe"C:\Users\Admin\AppData\Local\Temp\5db5387e4c24ae87ea0fd4a905d8eecde1a898f6aadd4cdb6b52cbb756088627.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2260 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2432 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4864 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4348 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:64
-
-
C:\Windows\SysWOW64\at.exeat 23:27 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:3752
-
-
C:\Windows\SysWOW64\at.exeat 23:28 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:4472
-
-
C:\Windows\SysWOW64\at.exeat 23:29 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:1592
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD5a7fff6f7dd3d91fe076160f11919b47f
SHA1bb14bd304cdfd477c1370267af1f90b8bbf0a0fc
SHA25623a018191d1f84d5d1ce11a1018849e8be3ca73a1b2063580174907e3c81ecc8
SHA51222d3c3dc572f34f9c9fbe8c3c63b10dc8b7fd38e0c036da43f5bc11dba38f770270e80bc3fca229feb7993d6189f20bbd62666c8fb059b491b483829064fe917
-
Filesize
206KB
MD5ccd20b929730ed4489bb3b309a85ff0f
SHA17c3999a5db89c307e85b557abed928476566eccb
SHA256f03d8b50ed46069080330ba6e7f43ebc90d4f4c9ac2fe57d0b0901b7f9e3d3e9
SHA512cbd54dacaa098bf2c944b3e48dee4094d3f3e178ea98f8c2cccd82795d54ba7ebc8232f1f41cdd220df9d47551a25c55dd51eb46faecb56d2973c4004aeafc9e
-
Filesize
207KB
MD5c591da5ec2529f7e53bc19bc07ed8b1b
SHA14c4eb5bf767a976d2d9ee3dc2227590e65ff60e5
SHA256520db39ff14c2b404f34440f30336d707f81fc93d6e0599d8437cf268e31b258
SHA5127ea5c2df4d8d2bad0d7115d74b298081e0ccb2bd100f97a496a6df952ed216b8122e5bab3edf85ec0fe3141d1c2b9f0d384735d10b68372f394e79de4ef97fde
-
Filesize
206KB
MD5679e492f599ac64d8229ea7112feaf8c
SHA14750d89dcbd8012c7c6d7ed5ec0d3bc24ee7f112
SHA2561b13403d6407634cc62edb5b005e85c7a0e9000a4a50ac2f12e0db5b9e50924f
SHA512fce21725b539bef8280f5108df27dc5186b55fb9d06139300db7e392395a9cf341b876afbd60e864e92bcfd3ff59a6f14d537aaaf66e2ad454ede39248275208