Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
20/08/2024, 12:54
Static task
static1
Behavioral task
behavioral1
Sample
f126c86b845490ab731aa3d721795330N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
f126c86b845490ab731aa3d721795330N.exe
Resource
win10v2004-20240802-en
General
-
Target
f126c86b845490ab731aa3d721795330N.exe
-
Size
135KB
-
MD5
f126c86b845490ab731aa3d721795330
-
SHA1
40c154bca40f91d537668ac1c8355cea95789fb2
-
SHA256
41474856991d239067ede8e26eaf36e60196a3ebe891aea1166aeeb36610e136
-
SHA512
8bd0505f4020b216a556ed593193ab555ed4ec001b20c38784bae7623eaf3930869e74f44966f0704ce127faa30ae2dc33497898d30a5373677b200c8fe6a0b9
-
SSDEEP
1536:UfsEqouTRcG/Mzvgf7xEuvnXNTRdUzwTekUOisZ1yDDajtXbVvUH:UVqoCl/YgjxEufVU0TbTyDDal1UH
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 2168 explorer.exe 2840 spoolsv.exe 2656 svchost.exe 2348 spoolsv.exe -
Loads dropped DLL 4 IoCs
pid Process 3016 f126c86b845490ab731aa3d721795330N.exe 2168 explorer.exe 2840 spoolsv.exe 2656 svchost.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\themes\explorer.exe f126c86b845490ab731aa3d721795330N.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f126c86b845490ab731aa3d721795330N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2192 schtasks.exe 2592 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3016 f126c86b845490ab731aa3d721795330N.exe 3016 f126c86b845490ab731aa3d721795330N.exe 3016 f126c86b845490ab731aa3d721795330N.exe 3016 f126c86b845490ab731aa3d721795330N.exe 3016 f126c86b845490ab731aa3d721795330N.exe 3016 f126c86b845490ab731aa3d721795330N.exe 3016 f126c86b845490ab731aa3d721795330N.exe 3016 f126c86b845490ab731aa3d721795330N.exe 3016 f126c86b845490ab731aa3d721795330N.exe 3016 f126c86b845490ab731aa3d721795330N.exe 3016 f126c86b845490ab731aa3d721795330N.exe 3016 f126c86b845490ab731aa3d721795330N.exe 3016 f126c86b845490ab731aa3d721795330N.exe 3016 f126c86b845490ab731aa3d721795330N.exe 3016 f126c86b845490ab731aa3d721795330N.exe 3016 f126c86b845490ab731aa3d721795330N.exe 3016 f126c86b845490ab731aa3d721795330N.exe 2168 explorer.exe 2168 explorer.exe 2168 explorer.exe 2168 explorer.exe 2168 explorer.exe 2168 explorer.exe 2168 explorer.exe 2168 explorer.exe 2168 explorer.exe 2168 explorer.exe 2168 explorer.exe 2168 explorer.exe 2168 explorer.exe 2168 explorer.exe 2168 explorer.exe 2168 explorer.exe 2656 svchost.exe 2656 svchost.exe 2656 svchost.exe 2656 svchost.exe 2656 svchost.exe 2656 svchost.exe 2656 svchost.exe 2656 svchost.exe 2656 svchost.exe 2656 svchost.exe 2656 svchost.exe 2656 svchost.exe 2656 svchost.exe 2656 svchost.exe 2656 svchost.exe 2656 svchost.exe 2168 explorer.exe 2168 explorer.exe 2168 explorer.exe 2656 svchost.exe 2656 svchost.exe 2168 explorer.exe 2168 explorer.exe 2656 svchost.exe 2168 explorer.exe 2656 svchost.exe 2168 explorer.exe 2656 svchost.exe 2168 explorer.exe 2656 svchost.exe 2168 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2168 explorer.exe 2656 svchost.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 3016 f126c86b845490ab731aa3d721795330N.exe 3016 f126c86b845490ab731aa3d721795330N.exe 2168 explorer.exe 2168 explorer.exe 2840 spoolsv.exe 2840 spoolsv.exe 2656 svchost.exe 2656 svchost.exe 2348 spoolsv.exe 2348 spoolsv.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 3016 wrote to memory of 2168 3016 f126c86b845490ab731aa3d721795330N.exe 30 PID 3016 wrote to memory of 2168 3016 f126c86b845490ab731aa3d721795330N.exe 30 PID 3016 wrote to memory of 2168 3016 f126c86b845490ab731aa3d721795330N.exe 30 PID 3016 wrote to memory of 2168 3016 f126c86b845490ab731aa3d721795330N.exe 30 PID 2168 wrote to memory of 2840 2168 explorer.exe 31 PID 2168 wrote to memory of 2840 2168 explorer.exe 31 PID 2168 wrote to memory of 2840 2168 explorer.exe 31 PID 2168 wrote to memory of 2840 2168 explorer.exe 31 PID 2840 wrote to memory of 2656 2840 spoolsv.exe 32 PID 2840 wrote to memory of 2656 2840 spoolsv.exe 32 PID 2840 wrote to memory of 2656 2840 spoolsv.exe 32 PID 2840 wrote to memory of 2656 2840 spoolsv.exe 32 PID 2656 wrote to memory of 2348 2656 svchost.exe 33 PID 2656 wrote to memory of 2348 2656 svchost.exe 33 PID 2656 wrote to memory of 2348 2656 svchost.exe 33 PID 2656 wrote to memory of 2348 2656 svchost.exe 33 PID 2168 wrote to memory of 1904 2168 explorer.exe 34 PID 2168 wrote to memory of 1904 2168 explorer.exe 34 PID 2168 wrote to memory of 1904 2168 explorer.exe 34 PID 2168 wrote to memory of 1904 2168 explorer.exe 34 PID 2656 wrote to memory of 2192 2656 svchost.exe 35 PID 2656 wrote to memory of 2192 2656 svchost.exe 35 PID 2656 wrote to memory of 2192 2656 svchost.exe 35 PID 2656 wrote to memory of 2192 2656 svchost.exe 35 PID 2656 wrote to memory of 2592 2656 svchost.exe 38 PID 2656 wrote to memory of 2592 2656 svchost.exe 38 PID 2656 wrote to memory of 2592 2656 svchost.exe 38 PID 2656 wrote to memory of 2592 2656 svchost.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\f126c86b845490ab731aa3d721795330N.exe"C:\Users\Admin\AppData\Local\Temp\f126c86b845490ab731aa3d721795330N.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3016 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2168 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2840 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2656 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2348
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 12:56 /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2192
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 12:57 /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2592
-
-
-
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe3⤵PID:1904
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135KB
MD53b159e2fc77e9fcb0632b4b5f128b4ee
SHA1639654c56a9a9c3b53c87a13eea726a41fd93919
SHA25690c95bb11e3d08fab368bb23261171ba50e47334484813109682255454b8bd4f
SHA51247bce0fddda5a84da93d24e0e9e2891ce8d350a15ef529db4c1953713226502b3e9bf44b2cd584e8cf0741c380c93fd7adcabaee93d302bc022837d0109789c9
-
Filesize
135KB
MD573677da6917117e7d351f5e716f196df
SHA181138f087c9d6e4bed7a7082c373e1ee3e6ec22a
SHA256bf8407dc4cc49d31129ea86b84e9f1f2b0d688c6ba4054b8e82ecb5e7094f7a8
SHA512266e37e3f045a66db30fe1bcaa768b8e99e2fb1ff01cc1c0e17c9d84738727ad3c4b7ec387e94d95f2155b060ebb69cfd75f2e3e7c82071bce60ab72195b7d94
-
Filesize
135KB
MD5ba266ef88ca5d9e78f6c7f45ac872e51
SHA1ccb635d5b5a9ecb6eba2097763d5c1a3f6c9e6a8
SHA256af77171c0c0167401bb1f2602fc78ffdb40cddf717e9fde253b3b818a6a03d75
SHA5124b5337127c9d02e1b04977067055973e5efcf4fb3600256b2cc8a7cfe52408fad6436d41aa4d0cc24c6ab0c3ac125e0d6a642c933c4bc82bac1487df56c493e0