Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    110s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/08/2024, 09:02

General

  • Target

    d0ba0362861766daa30cf3d7424c52a0N.exe

  • Size

    3.6MB

  • MD5

    d0ba0362861766daa30cf3d7424c52a0

  • SHA1

    29b6adec19da3929577715875683ed388b0c3f19

  • SHA256

    c83490a5e3eaccd318f250575b2358f8fe9f8a0ed59c20966c93dafef8cf4b9d

  • SHA512

    6e41cba4e8f42f851a2ad0ab8071371960f4c43d8dd4528e323d5103de264bd57d945e08ae7d3ecb7fe19484caf9ef14b6a2d8a304c160f4e648c120eb0b2ee0

  • SSDEEP

    98304:BzBOBfKMpHGqcfsLyQecNEqCNCjRqGy5XYBHOhN2qlxz:Bz/MpmJ0LdDLCAyiHOvP

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 6 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 5 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d0ba0362861766daa30cf3d7424c52a0N.exe
    "C:\Users\Admin\AppData\Local\Temp\d0ba0362861766daa30cf3d7424c52a0N.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4900
    • \??\c:\users\admin\appdata\local\temp\d0ba0362861766daa30cf3d7424c52a0n.exe 
      c:\users\admin\appdata\local\temp\d0ba0362861766daa30cf3d7424c52a0n.exe 
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:3640
    • C:\Windows\Resources\Themes\icsys.icn.exe
      C:\Windows\Resources\Themes\icsys.icn.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4088
      • \??\c:\windows\resources\themes\explorer.exe
        c:\windows\resources\themes\explorer.exe
        3⤵
        • Modifies visiblity of hidden/system files in Explorer
        • Executes dropped EXE
        • Adds Run key to start application
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4408
        • \??\c:\windows\resources\spoolsv.exe
          c:\windows\resources\spoolsv.exe SE
          4⤵
          • Executes dropped EXE
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:3080
          • \??\c:\windows\resources\svchost.exe
            c:\windows\resources\svchost.exe
            5⤵
            • Modifies visiblity of hidden/system files in Explorer
            • Executes dropped EXE
            • Adds Run key to start application
            • Drops file in System32 directory
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:4368
            • \??\c:\windows\resources\spoolsv.exe
              c:\windows\resources\spoolsv.exe PR
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of SetWindowsHookEx
              PID:3916

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\d0ba0362861766daa30cf3d7424c52a0n.exe 

    Filesize

    3.4MB

    MD5

    7a647af3c112ad805296a22b2a276e7c

    SHA1

    9cdf137e3f2493c9e141d5ec05f890e32b9b4e87

    SHA256

    20739e8fc050187af013e2499718895e4c980699ccaf046b2f96b12497e61959

    SHA512

    71d86d8dc598aafa91da8e0d971d1bbb87135832b848547c5c611bc828d165625c7a19af2cd300373190cf3eb782c714ac73d84ada53b37b6d8c1ee8508bcd86

  • C:\Windows\Resources\Themes\explorer.exe

    Filesize

    135KB

    MD5

    e2a504fc4f13e48012458dadef53d607

    SHA1

    8686670b2d0c8da85f47a467786cccf45016586b

    SHA256

    00f48224efed9d41d691cbb72d9433148037aa08058af041d6efeffda8c17597

    SHA512

    3338fc468b45b32108f17aefd3b9fc41334db6cca4700d85bce1982a2262ec4d495316d95a23a700cddb85eca95099d6133435ab8b50b448bcaea9ebd5e62fa2

  • C:\Windows\Resources\Themes\icsys.icn.exe

    Filesize

    135KB

    MD5

    c291f732becbbfecbbcb81a568928c6a

    SHA1

    99970fe669b1084fae6c7d779579fc3dc50d1419

    SHA256

    0c89ab2c561c0743eaf5130b62cad92f5ba7e2ceac65ff8e3fca2404521a49e2

    SHA512

    dcf6a023081f6ac60a442d4d8bd6766194d7b92fb5058f72ce7ff5461debe304eeeccafb26cdde77cf5798ee289fb9e50b01b64d0a8203b2f67a68e15c9411c1

  • C:\Windows\Resources\spoolsv.exe

    Filesize

    135KB

    MD5

    b76c3daacbceda2e1b4d5e9938035012

    SHA1

    97a982afc7045e738e3bbe88ce9d2c249be9d86e

    SHA256

    7fd9116f6d44b53c45b2eec136054a17270d2de2a57e90c886f490dcf93d5bd5

    SHA512

    da337eb28b9a22b2fadb8adff4c5f1eb441a26d57ca8262f8b9a40b3bbd564ef4170747e5d9eff40d50d4b278e051f32003233012920222568a580c3a48dde2a

  • C:\Windows\Resources\svchost.exe

    Filesize

    135KB

    MD5

    fe2d3c798c3021547b84d5959742a8e2

    SHA1

    19c319b04f15496b360543c313deb5370f865b7b

    SHA256

    c5deeb61acac431597dd7f4677974075b8a455d1603fa37e985813979b7de786

    SHA512

    8cca270e6d8a87e5ef5228a9756bee361b6dbc319d90e459bd19dcfb0ffef805a613bb99a94d3802249ef16e8b73f6cef5d51c8f33a3f93469c1c123615e6a94

  • memory/3080-45-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/3916-44-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/4088-46-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/4368-49-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/4408-48-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/4900-0-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/4900-47-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB