Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22/08/2024, 01:04
Static task
static1
Behavioral task
behavioral1
Sample
efa66175cf3367c181ac59a698149890N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
efa66175cf3367c181ac59a698149890N.exe
Resource
win10v2004-20240802-en
General
-
Target
efa66175cf3367c181ac59a698149890N.exe
-
Size
3.2MB
-
MD5
efa66175cf3367c181ac59a698149890
-
SHA1
a0a62773b39dc7ea26a19663b1f98e2f8df76969
-
SHA256
dbc410a3ed9c9392f81e2f4d2b68de11b7ac79841a2ebf559c34aa538b6db8c3
-
SHA512
13f7c6f47d49ea362c4b7689bb42014edf7f2068b0eca1f02a1637cd1aaa47a9af0d65e585994de364c31553f70ffc4b244727599aff584f0c766da3dbb9ba02
-
SSDEEP
49152:tWdx4HDQNJL0VR6SgMt+k4RiP+RmXMjiINiMq95FoHVHNTQTEjT333TYe:9HDYsqiPRhINnq95FoHVBT333T1
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 6 IoCs
pid Process 1040 efa66175cf3367c181ac59a698149890n.exe 2044 icsys.icn.exe 2504 explorer.exe 2640 spoolsv.exe 1216 svchost.exe 1900 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe File opened for modification C:\Windows\Resources\Themes\icsys.icn.exe efa66175cf3367c181ac59a698149890N.exe File opened for modification \??\c:\windows\resources\themes\explorer.exe icsys.icn.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language efa66175cf3367c181ac59a698149890N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language efa66175cf3367c181ac59a698149890n.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icsys.icn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4236 efa66175cf3367c181ac59a698149890N.exe 4236 efa66175cf3367c181ac59a698149890N.exe 4236 efa66175cf3367c181ac59a698149890N.exe 4236 efa66175cf3367c181ac59a698149890N.exe 4236 efa66175cf3367c181ac59a698149890N.exe 4236 efa66175cf3367c181ac59a698149890N.exe 4236 efa66175cf3367c181ac59a698149890N.exe 4236 efa66175cf3367c181ac59a698149890N.exe 4236 efa66175cf3367c181ac59a698149890N.exe 4236 efa66175cf3367c181ac59a698149890N.exe 4236 efa66175cf3367c181ac59a698149890N.exe 4236 efa66175cf3367c181ac59a698149890N.exe 4236 efa66175cf3367c181ac59a698149890N.exe 4236 efa66175cf3367c181ac59a698149890N.exe 4236 efa66175cf3367c181ac59a698149890N.exe 4236 efa66175cf3367c181ac59a698149890N.exe 4236 efa66175cf3367c181ac59a698149890N.exe 4236 efa66175cf3367c181ac59a698149890N.exe 4236 efa66175cf3367c181ac59a698149890N.exe 4236 efa66175cf3367c181ac59a698149890N.exe 4236 efa66175cf3367c181ac59a698149890N.exe 4236 efa66175cf3367c181ac59a698149890N.exe 4236 efa66175cf3367c181ac59a698149890N.exe 4236 efa66175cf3367c181ac59a698149890N.exe 4236 efa66175cf3367c181ac59a698149890N.exe 4236 efa66175cf3367c181ac59a698149890N.exe 4236 efa66175cf3367c181ac59a698149890N.exe 4236 efa66175cf3367c181ac59a698149890N.exe 4236 efa66175cf3367c181ac59a698149890N.exe 4236 efa66175cf3367c181ac59a698149890N.exe 4236 efa66175cf3367c181ac59a698149890N.exe 4236 efa66175cf3367c181ac59a698149890N.exe 2044 icsys.icn.exe 2044 icsys.icn.exe 2044 icsys.icn.exe 2044 icsys.icn.exe 2044 icsys.icn.exe 2044 icsys.icn.exe 2044 icsys.icn.exe 2044 icsys.icn.exe 2044 icsys.icn.exe 2044 icsys.icn.exe 2044 icsys.icn.exe 2044 icsys.icn.exe 2044 icsys.icn.exe 2044 icsys.icn.exe 2044 icsys.icn.exe 2044 icsys.icn.exe 2044 icsys.icn.exe 2044 icsys.icn.exe 2044 icsys.icn.exe 2044 icsys.icn.exe 2044 icsys.icn.exe 2044 icsys.icn.exe 2044 icsys.icn.exe 2044 icsys.icn.exe 2044 icsys.icn.exe 2044 icsys.icn.exe 2044 icsys.icn.exe 2044 icsys.icn.exe 2044 icsys.icn.exe 2044 icsys.icn.exe 2044 icsys.icn.exe 2044 icsys.icn.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2504 explorer.exe 1216 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 4236 efa66175cf3367c181ac59a698149890N.exe 4236 efa66175cf3367c181ac59a698149890N.exe 2044 icsys.icn.exe 2044 icsys.icn.exe 2504 explorer.exe 2504 explorer.exe 2640 spoolsv.exe 2640 spoolsv.exe 1216 svchost.exe 1216 svchost.exe 1900 spoolsv.exe 1900 spoolsv.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4236 wrote to memory of 1040 4236 efa66175cf3367c181ac59a698149890N.exe 85 PID 4236 wrote to memory of 1040 4236 efa66175cf3367c181ac59a698149890N.exe 85 PID 4236 wrote to memory of 1040 4236 efa66175cf3367c181ac59a698149890N.exe 85 PID 4236 wrote to memory of 2044 4236 efa66175cf3367c181ac59a698149890N.exe 88 PID 4236 wrote to memory of 2044 4236 efa66175cf3367c181ac59a698149890N.exe 88 PID 4236 wrote to memory of 2044 4236 efa66175cf3367c181ac59a698149890N.exe 88 PID 2044 wrote to memory of 2504 2044 icsys.icn.exe 89 PID 2044 wrote to memory of 2504 2044 icsys.icn.exe 89 PID 2044 wrote to memory of 2504 2044 icsys.icn.exe 89 PID 2504 wrote to memory of 2640 2504 explorer.exe 90 PID 2504 wrote to memory of 2640 2504 explorer.exe 90 PID 2504 wrote to memory of 2640 2504 explorer.exe 90 PID 2640 wrote to memory of 1216 2640 spoolsv.exe 91 PID 2640 wrote to memory of 1216 2640 spoolsv.exe 91 PID 2640 wrote to memory of 1216 2640 spoolsv.exe 91 PID 1216 wrote to memory of 1900 1216 svchost.exe 92 PID 1216 wrote to memory of 1900 1216 svchost.exe 92 PID 1216 wrote to memory of 1900 1216 svchost.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\efa66175cf3367c181ac59a698149890N.exe"C:\Users\Admin\AppData\Local\Temp\efa66175cf3367c181ac59a698149890N.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4236 -
\??\c:\users\admin\appdata\local\temp\efa66175cf3367c181ac59a698149890n.exec:\users\admin\appdata\local\temp\efa66175cf3367c181ac59a698149890n.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1040
-
-
C:\Windows\Resources\Themes\icsys.icn.exeC:\Windows\Resources\Themes\icsys.icn.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2044 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe3⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2504 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE4⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2640 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe5⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1216 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1900
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD539c41ec190c34c174c78d9f4db91ff98
SHA133da26a7b9325109d1438cef20836c6cf4029710
SHA2566027859fd47b7d875cb59fc26fa9bcf08b9e72cec9a00b49ebdd9dc2b7b889fe
SHA512e31284baafce81a67a6e989bb4d2c459b1ffa3312591d03fd8674ad954bf8c7d7e5963d557447af4ed11e10389aba148251f809ba9963fccfad6ac62bc9b3b87
-
Filesize
135KB
MD5116e23a6b9e06ea16d80b481ca6f5a2b
SHA1f9f01491d97fe3431a8e1d30dc4f5204c86bb602
SHA256e46170a85db61e32c6aadf8c66fb9add8c1863fa1e22b063256e4d079e40d25f
SHA51202b89317383c71e8697ef669c113fb76057d3ba0b1070a4956af34bfaf5a124d7e1167e81bfb32312d36cc27621e37e3341e976c7cfe0bc0d939438099acf2c2
-
Filesize
135KB
MD5b84ed00fa629ac9dbe86463809581b52
SHA188726da9890a73b0dfb72e81b4919e365191b94d
SHA256c52308aa1759d285db060c679b0bfc3b1e6096ba588319ea6707ea7b245672d3
SHA5128878fd85722bc4e65556915c1c06817571b86b41d1846e651c77904e992d6dfb41b22ea30f438189c2cec6c70d2a1ababe06379329f3d93a4ef29eac383d4b0c
-
Filesize
135KB
MD579a0ddb83524795bedc15854432ae5a5
SHA173a6e48bd9ba8ca1d706502c71f694a13c9772fe
SHA256d7e8da7f815a0f06967f5548bb455229cccc27e8b16b4b7b23378fbb542d30bc
SHA512330751055313699075ec27a06cc87c57401b2fde46eafd4abea2c0fc8a6fcd285589644edff5704f04e3ed8e0826592f6b620b35e959a82135ca683a9875138d
-
Filesize
135KB
MD51968dec6bbf58cdb5ba39ae508da596c
SHA19c7623a41a1e3074d792cb93323f2afb0019a61e
SHA2562d28e47e34a59ea0a2bad93425b1af479cc49411c83a8d377ad3f9a78903c87a
SHA512826c39632b53fcc051608181e2a88063d62e1996f34c3cb804f56852f382085f098abc9ba4e5071944ca04e5485e441adf6ad5d204f63f1e1997fb7e4f988ba9