Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
110s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/08/2024, 09:02
Static task
static1
Behavioral task
behavioral1
Sample
d0ba0362861766daa30cf3d7424c52a0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d0ba0362861766daa30cf3d7424c52a0N.exe
Resource
win10v2004-20240802-en
General
-
Target
d0ba0362861766daa30cf3d7424c52a0N.exe
-
Size
3.6MB
-
MD5
d0ba0362861766daa30cf3d7424c52a0
-
SHA1
29b6adec19da3929577715875683ed388b0c3f19
-
SHA256
c83490a5e3eaccd318f250575b2358f8fe9f8a0ed59c20966c93dafef8cf4b9d
-
SHA512
6e41cba4e8f42f851a2ad0ab8071371960f4c43d8dd4528e323d5103de264bd57d945e08ae7d3ecb7fe19484caf9ef14b6a2d8a304c160f4e648c120eb0b2ee0
-
SSDEEP
98304:BzBOBfKMpHGqcfsLyQecNEqCNCjRqGy5XYBHOhN2qlxz:Bz/MpmJ0LdDLCAyiHOvP
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 6 IoCs
pid Process 3640 d0ba0362861766daa30cf3d7424c52a0n.exe 4088 icsys.icn.exe 4408 explorer.exe 3080 spoolsv.exe 4368 svchost.exe 3916 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\Resources\Themes\icsys.icn.exe d0ba0362861766daa30cf3d7424c52a0N.exe File opened for modification \??\c:\windows\resources\themes\explorer.exe icsys.icn.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d0ba0362861766daa30cf3d7424c52a0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icsys.icn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4900 d0ba0362861766daa30cf3d7424c52a0N.exe 4900 d0ba0362861766daa30cf3d7424c52a0N.exe 4900 d0ba0362861766daa30cf3d7424c52a0N.exe 4900 d0ba0362861766daa30cf3d7424c52a0N.exe 4900 d0ba0362861766daa30cf3d7424c52a0N.exe 4900 d0ba0362861766daa30cf3d7424c52a0N.exe 4900 d0ba0362861766daa30cf3d7424c52a0N.exe 4900 d0ba0362861766daa30cf3d7424c52a0N.exe 4900 d0ba0362861766daa30cf3d7424c52a0N.exe 4900 d0ba0362861766daa30cf3d7424c52a0N.exe 4900 d0ba0362861766daa30cf3d7424c52a0N.exe 4900 d0ba0362861766daa30cf3d7424c52a0N.exe 4900 d0ba0362861766daa30cf3d7424c52a0N.exe 4900 d0ba0362861766daa30cf3d7424c52a0N.exe 4900 d0ba0362861766daa30cf3d7424c52a0N.exe 4900 d0ba0362861766daa30cf3d7424c52a0N.exe 4900 d0ba0362861766daa30cf3d7424c52a0N.exe 4900 d0ba0362861766daa30cf3d7424c52a0N.exe 4900 d0ba0362861766daa30cf3d7424c52a0N.exe 4900 d0ba0362861766daa30cf3d7424c52a0N.exe 4900 d0ba0362861766daa30cf3d7424c52a0N.exe 4900 d0ba0362861766daa30cf3d7424c52a0N.exe 4900 d0ba0362861766daa30cf3d7424c52a0N.exe 4900 d0ba0362861766daa30cf3d7424c52a0N.exe 4900 d0ba0362861766daa30cf3d7424c52a0N.exe 4900 d0ba0362861766daa30cf3d7424c52a0N.exe 4900 d0ba0362861766daa30cf3d7424c52a0N.exe 4900 d0ba0362861766daa30cf3d7424c52a0N.exe 4900 d0ba0362861766daa30cf3d7424c52a0N.exe 4900 d0ba0362861766daa30cf3d7424c52a0N.exe 4900 d0ba0362861766daa30cf3d7424c52a0N.exe 4900 d0ba0362861766daa30cf3d7424c52a0N.exe 4088 icsys.icn.exe 4088 icsys.icn.exe 4088 icsys.icn.exe 4088 icsys.icn.exe 4088 icsys.icn.exe 4088 icsys.icn.exe 4088 icsys.icn.exe 4088 icsys.icn.exe 4088 icsys.icn.exe 4088 icsys.icn.exe 4088 icsys.icn.exe 4088 icsys.icn.exe 4088 icsys.icn.exe 4088 icsys.icn.exe 4088 icsys.icn.exe 4088 icsys.icn.exe 4088 icsys.icn.exe 4088 icsys.icn.exe 4088 icsys.icn.exe 4088 icsys.icn.exe 4088 icsys.icn.exe 4088 icsys.icn.exe 4088 icsys.icn.exe 4088 icsys.icn.exe 4088 icsys.icn.exe 4088 icsys.icn.exe 4088 icsys.icn.exe 4088 icsys.icn.exe 4088 icsys.icn.exe 4088 icsys.icn.exe 4088 icsys.icn.exe 4088 icsys.icn.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 4408 explorer.exe 4368 svchost.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 4900 d0ba0362861766daa30cf3d7424c52a0N.exe 4900 d0ba0362861766daa30cf3d7424c52a0N.exe 4088 icsys.icn.exe 4088 icsys.icn.exe 3640 d0ba0362861766daa30cf3d7424c52a0n.exe 3640 d0ba0362861766daa30cf3d7424c52a0n.exe 4408 explorer.exe 4408 explorer.exe 3080 spoolsv.exe 3080 spoolsv.exe 4368 svchost.exe 4368 svchost.exe 3916 spoolsv.exe 3916 spoolsv.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4900 wrote to memory of 3640 4900 d0ba0362861766daa30cf3d7424c52a0N.exe 85 PID 4900 wrote to memory of 3640 4900 d0ba0362861766daa30cf3d7424c52a0N.exe 85 PID 4900 wrote to memory of 4088 4900 d0ba0362861766daa30cf3d7424c52a0N.exe 87 PID 4900 wrote to memory of 4088 4900 d0ba0362861766daa30cf3d7424c52a0N.exe 87 PID 4900 wrote to memory of 4088 4900 d0ba0362861766daa30cf3d7424c52a0N.exe 87 PID 4088 wrote to memory of 4408 4088 icsys.icn.exe 88 PID 4088 wrote to memory of 4408 4088 icsys.icn.exe 88 PID 4088 wrote to memory of 4408 4088 icsys.icn.exe 88 PID 4408 wrote to memory of 3080 4408 explorer.exe 90 PID 4408 wrote to memory of 3080 4408 explorer.exe 90 PID 4408 wrote to memory of 3080 4408 explorer.exe 90 PID 3080 wrote to memory of 4368 3080 spoolsv.exe 91 PID 3080 wrote to memory of 4368 3080 spoolsv.exe 91 PID 3080 wrote to memory of 4368 3080 spoolsv.exe 91 PID 4368 wrote to memory of 3916 4368 svchost.exe 92 PID 4368 wrote to memory of 3916 4368 svchost.exe 92 PID 4368 wrote to memory of 3916 4368 svchost.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\d0ba0362861766daa30cf3d7424c52a0N.exe"C:\Users\Admin\AppData\Local\Temp\d0ba0362861766daa30cf3d7424c52a0N.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4900 -
\??\c:\users\admin\appdata\local\temp\d0ba0362861766daa30cf3d7424c52a0n.exec:\users\admin\appdata\local\temp\d0ba0362861766daa30cf3d7424c52a0n.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3640
-
-
C:\Windows\Resources\Themes\icsys.icn.exeC:\Windows\Resources\Themes\icsys.icn.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4088 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe3⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4408 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE4⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3080 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe5⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4368 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3916
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.4MB
MD57a647af3c112ad805296a22b2a276e7c
SHA19cdf137e3f2493c9e141d5ec05f890e32b9b4e87
SHA25620739e8fc050187af013e2499718895e4c980699ccaf046b2f96b12497e61959
SHA51271d86d8dc598aafa91da8e0d971d1bbb87135832b848547c5c611bc828d165625c7a19af2cd300373190cf3eb782c714ac73d84ada53b37b6d8c1ee8508bcd86
-
Filesize
135KB
MD5e2a504fc4f13e48012458dadef53d607
SHA18686670b2d0c8da85f47a467786cccf45016586b
SHA25600f48224efed9d41d691cbb72d9433148037aa08058af041d6efeffda8c17597
SHA5123338fc468b45b32108f17aefd3b9fc41334db6cca4700d85bce1982a2262ec4d495316d95a23a700cddb85eca95099d6133435ab8b50b448bcaea9ebd5e62fa2
-
Filesize
135KB
MD5c291f732becbbfecbbcb81a568928c6a
SHA199970fe669b1084fae6c7d779579fc3dc50d1419
SHA2560c89ab2c561c0743eaf5130b62cad92f5ba7e2ceac65ff8e3fca2404521a49e2
SHA512dcf6a023081f6ac60a442d4d8bd6766194d7b92fb5058f72ce7ff5461debe304eeeccafb26cdde77cf5798ee289fb9e50b01b64d0a8203b2f67a68e15c9411c1
-
Filesize
135KB
MD5b76c3daacbceda2e1b4d5e9938035012
SHA197a982afc7045e738e3bbe88ce9d2c249be9d86e
SHA2567fd9116f6d44b53c45b2eec136054a17270d2de2a57e90c886f490dcf93d5bd5
SHA512da337eb28b9a22b2fadb8adff4c5f1eb441a26d57ca8262f8b9a40b3bbd564ef4170747e5d9eff40d50d4b278e051f32003233012920222568a580c3a48dde2a
-
Filesize
135KB
MD5fe2d3c798c3021547b84d5959742a8e2
SHA119c319b04f15496b360543c313deb5370f865b7b
SHA256c5deeb61acac431597dd7f4677974075b8a455d1603fa37e985813979b7de786
SHA5128cca270e6d8a87e5ef5228a9756bee361b6dbc319d90e459bd19dcfb0ffef805a613bb99a94d3802249ef16e8b73f6cef5d51c8f33a3f93469c1c123615e6a94