Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
19/08/2024, 08:06
Static task
static1
Behavioral task
behavioral1
Sample
9bd6b24429fae827534170054d802790N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
9bd6b24429fae827534170054d802790N.exe
Resource
win10v2004-20240802-en
General
-
Target
9bd6b24429fae827534170054d802790N.exe
-
Size
206KB
-
MD5
9bd6b24429fae827534170054d802790
-
SHA1
8d46af9c989ec26e75a406609106f9b5716c34ae
-
SHA256
6511321e2c89f197c6f039051d5abb69d306550fb41216c13958de126d66f48a
-
SHA512
60a617716ab4971ae2081f87c1e746f4d04c41c126c5ead69e659b3eece1991bba97ab8ca12292d9ba2b0966cf836e6461c89eb314ed856820730e13cfb3edfb
-
SSDEEP
1536:/fsEqouTRcG/Mzvgf7xEuvnXNTRdUzwTekUOisZ1yDDajtXbJd3:/VqoCl/YgjxEufVU0TbTyDDalb3
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
Executes dropped EXE 4 IoCs
pid Process 1512 explorer.exe 2560 spoolsv.exe 2752 svchost.exe 2756 spoolsv.exe -
Loads dropped DLL 8 IoCs
pid Process 2968 9bd6b24429fae827534170054d802790N.exe 2968 9bd6b24429fae827534170054d802790N.exe 1512 explorer.exe 1512 explorer.exe 2560 spoolsv.exe 2560 spoolsv.exe 2752 svchost.exe 2752 svchost.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\themes\explorer.exe 9bd6b24429fae827534170054d802790N.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9bd6b24429fae827534170054d802790N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1860 schtasks.exe 2764 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2968 9bd6b24429fae827534170054d802790N.exe 2968 9bd6b24429fae827534170054d802790N.exe 2968 9bd6b24429fae827534170054d802790N.exe 2968 9bd6b24429fae827534170054d802790N.exe 2968 9bd6b24429fae827534170054d802790N.exe 2968 9bd6b24429fae827534170054d802790N.exe 2968 9bd6b24429fae827534170054d802790N.exe 2968 9bd6b24429fae827534170054d802790N.exe 2968 9bd6b24429fae827534170054d802790N.exe 2968 9bd6b24429fae827534170054d802790N.exe 2968 9bd6b24429fae827534170054d802790N.exe 2968 9bd6b24429fae827534170054d802790N.exe 2968 9bd6b24429fae827534170054d802790N.exe 2968 9bd6b24429fae827534170054d802790N.exe 2968 9bd6b24429fae827534170054d802790N.exe 2968 9bd6b24429fae827534170054d802790N.exe 2968 9bd6b24429fae827534170054d802790N.exe 1512 explorer.exe 1512 explorer.exe 1512 explorer.exe 1512 explorer.exe 1512 explorer.exe 1512 explorer.exe 1512 explorer.exe 1512 explorer.exe 1512 explorer.exe 1512 explorer.exe 1512 explorer.exe 1512 explorer.exe 1512 explorer.exe 1512 explorer.exe 1512 explorer.exe 1512 explorer.exe 2752 svchost.exe 2752 svchost.exe 2752 svchost.exe 2752 svchost.exe 2752 svchost.exe 2752 svchost.exe 2752 svchost.exe 2752 svchost.exe 2752 svchost.exe 2752 svchost.exe 2752 svchost.exe 2752 svchost.exe 2752 svchost.exe 2752 svchost.exe 2752 svchost.exe 2752 svchost.exe 1512 explorer.exe 2752 svchost.exe 2752 svchost.exe 1512 explorer.exe 1512 explorer.exe 1512 explorer.exe 2752 svchost.exe 2752 svchost.exe 1512 explorer.exe 1512 explorer.exe 2752 svchost.exe 1512 explorer.exe 2752 svchost.exe 1512 explorer.exe 2752 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2752 svchost.exe 1512 explorer.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 2968 9bd6b24429fae827534170054d802790N.exe 2968 9bd6b24429fae827534170054d802790N.exe 1512 explorer.exe 1512 explorer.exe 2560 spoolsv.exe 2560 spoolsv.exe 2752 svchost.exe 2752 svchost.exe 2756 spoolsv.exe 2756 spoolsv.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2968 wrote to memory of 1512 2968 9bd6b24429fae827534170054d802790N.exe 30 PID 2968 wrote to memory of 1512 2968 9bd6b24429fae827534170054d802790N.exe 30 PID 2968 wrote to memory of 1512 2968 9bd6b24429fae827534170054d802790N.exe 30 PID 2968 wrote to memory of 1512 2968 9bd6b24429fae827534170054d802790N.exe 30 PID 1512 wrote to memory of 2560 1512 explorer.exe 31 PID 1512 wrote to memory of 2560 1512 explorer.exe 31 PID 1512 wrote to memory of 2560 1512 explorer.exe 31 PID 1512 wrote to memory of 2560 1512 explorer.exe 31 PID 2560 wrote to memory of 2752 2560 spoolsv.exe 32 PID 2560 wrote to memory of 2752 2560 spoolsv.exe 32 PID 2560 wrote to memory of 2752 2560 spoolsv.exe 32 PID 2560 wrote to memory of 2752 2560 spoolsv.exe 32 PID 2752 wrote to memory of 2756 2752 svchost.exe 33 PID 2752 wrote to memory of 2756 2752 svchost.exe 33 PID 2752 wrote to memory of 2756 2752 svchost.exe 33 PID 2752 wrote to memory of 2756 2752 svchost.exe 33 PID 1512 wrote to memory of 2160 1512 explorer.exe 34 PID 1512 wrote to memory of 2160 1512 explorer.exe 34 PID 1512 wrote to memory of 2160 1512 explorer.exe 34 PID 1512 wrote to memory of 2160 1512 explorer.exe 34 PID 2752 wrote to memory of 2764 2752 svchost.exe 35 PID 2752 wrote to memory of 2764 2752 svchost.exe 35 PID 2752 wrote to memory of 2764 2752 svchost.exe 35 PID 2752 wrote to memory of 2764 2752 svchost.exe 35 PID 2752 wrote to memory of 1860 2752 svchost.exe 39 PID 2752 wrote to memory of 1860 2752 svchost.exe 39 PID 2752 wrote to memory of 1860 2752 svchost.exe 39 PID 2752 wrote to memory of 1860 2752 svchost.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\9bd6b24429fae827534170054d802790N.exe"C:\Users\Admin\AppData\Local\Temp\9bd6b24429fae827534170054d802790N.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2968 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1512 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2560 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2752 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2756
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 08:08 /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2764
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 08:09 /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1860
-
-
-
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe3⤵PID:2160
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD54a1ee06fcacfe5d4d1d6a026a3be69e8
SHA143f8d80d4b2734a328249190a1625d2f4bc502da
SHA2566f472701f4bdf4791c345158dd62c5ef23226dfac5ce7323b205661b3ef3005c
SHA512d230f7f38001fecd3e6e11d22bed5c802370e2a2aa6a8ebb29c767669ede9c7079aca9bc292348be0fca03fb1664e78099202bcb9f9ac611cfa6181ea173b5d3
-
Filesize
206KB
MD502bbf9f10613c6c42a6e62c1934400a5
SHA1852c1c979a2e0eb30391a181b75c9c2fa23bbbae
SHA2567d8e452d4a037728f7f15aca0814fd0ba1d83d1093d8018d0989d6555a7df43e
SHA51248bf713ac31e60568a4c4401a4a20685548405f36975dcc190e62a482f6d7df2be012afc2c9f3fb1a249dfcc6b1cccdd8e939a375b8e52e0a1600edb5be9a564
-
Filesize
206KB
MD5e7bd6eb40ff02890405e76dcd738abe3
SHA17416409adad33968adeeeb295766c53e8a6866e5
SHA256c752cc6292198be0b4540d06c2969525d90f65185897ed67e98bb70b175575d1
SHA51241d6169b3d50430aae1669d4bce03d0609f16f84ea26eb086586c4f35d105fe0aebdec0356c673604a533f0b0818c8f44aa62f90f2d1d3f7403b4603ae043688