Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/08/2024, 03:55
Static task
static1
Behavioral task
behavioral1
Sample
e652ad33622788809eb5414a5c6acc30N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
e652ad33622788809eb5414a5c6acc30N.exe
Resource
win10v2004-20240802-en
General
-
Target
e652ad33622788809eb5414a5c6acc30N.exe
-
Size
135KB
-
MD5
e652ad33622788809eb5414a5c6acc30
-
SHA1
cc35d6d806fdb0caeb7e69990a5f2478482b2265
-
SHA256
bd91f57efbfecc04f383a4e9db6cccdbeb349b42ff6314c65facd9a76ae19770
-
SHA512
e50109336c264dafb3c3f334c173855ae7fef88835dba6917b0207e53be4704dfa8e5e92be7980d279aa464c634bd0bfe734b1de888486a616b8eb876eb55d0e
-
SSDEEP
1536:UfsEqouTRcG/Mzvgf7xEuvnXNTRdUzwTekUOisZ1yDDajtXbVmP:UVqoCl/YgjxEufVU0TbTyDDalQP
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
Executes dropped EXE 4 IoCs
pid Process 4300 explorer.exe 2032 spoolsv.exe 4768 svchost.exe 636 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\themes\explorer.exe e652ad33622788809eb5414a5c6acc30N.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e652ad33622788809eb5414a5c6acc30N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4904 e652ad33622788809eb5414a5c6acc30N.exe 4904 e652ad33622788809eb5414a5c6acc30N.exe 4904 e652ad33622788809eb5414a5c6acc30N.exe 4904 e652ad33622788809eb5414a5c6acc30N.exe 4904 e652ad33622788809eb5414a5c6acc30N.exe 4904 e652ad33622788809eb5414a5c6acc30N.exe 4904 e652ad33622788809eb5414a5c6acc30N.exe 4904 e652ad33622788809eb5414a5c6acc30N.exe 4904 e652ad33622788809eb5414a5c6acc30N.exe 4904 e652ad33622788809eb5414a5c6acc30N.exe 4904 e652ad33622788809eb5414a5c6acc30N.exe 4904 e652ad33622788809eb5414a5c6acc30N.exe 4904 e652ad33622788809eb5414a5c6acc30N.exe 4904 e652ad33622788809eb5414a5c6acc30N.exe 4904 e652ad33622788809eb5414a5c6acc30N.exe 4904 e652ad33622788809eb5414a5c6acc30N.exe 4904 e652ad33622788809eb5414a5c6acc30N.exe 4904 e652ad33622788809eb5414a5c6acc30N.exe 4904 e652ad33622788809eb5414a5c6acc30N.exe 4904 e652ad33622788809eb5414a5c6acc30N.exe 4904 e652ad33622788809eb5414a5c6acc30N.exe 4904 e652ad33622788809eb5414a5c6acc30N.exe 4904 e652ad33622788809eb5414a5c6acc30N.exe 4904 e652ad33622788809eb5414a5c6acc30N.exe 4904 e652ad33622788809eb5414a5c6acc30N.exe 4904 e652ad33622788809eb5414a5c6acc30N.exe 4904 e652ad33622788809eb5414a5c6acc30N.exe 4904 e652ad33622788809eb5414a5c6acc30N.exe 4904 e652ad33622788809eb5414a5c6acc30N.exe 4904 e652ad33622788809eb5414a5c6acc30N.exe 4904 e652ad33622788809eb5414a5c6acc30N.exe 4904 e652ad33622788809eb5414a5c6acc30N.exe 4904 e652ad33622788809eb5414a5c6acc30N.exe 4904 e652ad33622788809eb5414a5c6acc30N.exe 4300 explorer.exe 4300 explorer.exe 4300 explorer.exe 4300 explorer.exe 4300 explorer.exe 4300 explorer.exe 4300 explorer.exe 4300 explorer.exe 4300 explorer.exe 4300 explorer.exe 4300 explorer.exe 4300 explorer.exe 4300 explorer.exe 4300 explorer.exe 4300 explorer.exe 4300 explorer.exe 4300 explorer.exe 4300 explorer.exe 4300 explorer.exe 4300 explorer.exe 4300 explorer.exe 4300 explorer.exe 4300 explorer.exe 4300 explorer.exe 4300 explorer.exe 4300 explorer.exe 4300 explorer.exe 4300 explorer.exe 4300 explorer.exe 4300 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 4300 explorer.exe 4768 svchost.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 4904 e652ad33622788809eb5414a5c6acc30N.exe 4904 e652ad33622788809eb5414a5c6acc30N.exe 4300 explorer.exe 4300 explorer.exe 2032 spoolsv.exe 2032 spoolsv.exe 4768 svchost.exe 4768 svchost.exe 636 spoolsv.exe 636 spoolsv.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4904 wrote to memory of 4300 4904 e652ad33622788809eb5414a5c6acc30N.exe 84 PID 4904 wrote to memory of 4300 4904 e652ad33622788809eb5414a5c6acc30N.exe 84 PID 4904 wrote to memory of 4300 4904 e652ad33622788809eb5414a5c6acc30N.exe 84 PID 4300 wrote to memory of 2032 4300 explorer.exe 86 PID 4300 wrote to memory of 2032 4300 explorer.exe 86 PID 4300 wrote to memory of 2032 4300 explorer.exe 86 PID 2032 wrote to memory of 4768 2032 spoolsv.exe 87 PID 2032 wrote to memory of 4768 2032 spoolsv.exe 87 PID 2032 wrote to memory of 4768 2032 spoolsv.exe 87 PID 4768 wrote to memory of 636 4768 svchost.exe 88 PID 4768 wrote to memory of 636 4768 svchost.exe 88 PID 4768 wrote to memory of 636 4768 svchost.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\e652ad33622788809eb5414a5c6acc30N.exe"C:\Users\Admin\AppData\Local\Temp\e652ad33622788809eb5414a5c6acc30N.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4904 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4300 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2032 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4768 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:636
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135KB
MD5d351902e6dd3f994cd5e209667d90c0a
SHA1a2a5119fc5020818066fe02dd508abd8e9c47502
SHA256ed6003bbf78bb90a2947f52605fbaf36222217e3d502c513a19b55a637c5757f
SHA51265ddcbf267a8a2a1e730ceaf912a7e533aa172bdcbe35bf56cf23b6d2b6cf28c9c10301fd6322952475e703202f926928e8c585b570a174379c6325eaeaff672
-
Filesize
135KB
MD55b0d84581d709c216e06e992c6bac558
SHA1a349f8fd5bfad25ceb4fa09056ec0a0c62e4fbf7
SHA256f9674c71faa4f9844ba4d2b6e5dd94a3426453b2ca7410db6d6ba00895ff8a04
SHA512b30d201b74616efc666201e0f6abc397b0890e0e46e598cee8387710f299228d6ed9ef8a5f01f921729a68136b0a04084212dd8c40aec57dff0acbd141196529
-
Filesize
135KB
MD538d3897e232f5b8c6befab9bf60e19cf
SHA1d489ece078f5b9cb2fb0e6d3090f1461b9938a61
SHA2560979e188dec103b4cbbe653f23c09ea11212367fa9daf63a2ede5af26dc19ca3
SHA5123538ea8fbbe38ed2e3583c620ac204f1127d4bc126f871b26f12405cd6bce34f9d2b0aed7f806414ecd36fcbd64d384df46538cca1317fd95c3c4bc9fd32a916