Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24/08/2024, 20:22
Static task
static1
Behavioral task
behavioral1
Sample
234affae1e0c38c977b55959972e627e6df25af817d65b35eb2a0304a26f690f.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
234affae1e0c38c977b55959972e627e6df25af817d65b35eb2a0304a26f690f.exe
Resource
win10v2004-20240802-en
General
-
Target
234affae1e0c38c977b55959972e627e6df25af817d65b35eb2a0304a26f690f.exe
-
Size
206KB
-
MD5
9876b3c6c6fcf53bdf065d81ec051072
-
SHA1
a6c41ea3dc0420870363aa2cb4f96006f831e54e
-
SHA256
234affae1e0c38c977b55959972e627e6df25af817d65b35eb2a0304a26f690f
-
SHA512
abcf53fa1bb3e5866230517516876100bbf7ca38f72e0de1f48922aa64c153f7cc22e533af9a8ecda22b8d087f854dabd22e4de8b705ebf98b5485bd385becff
-
SSDEEP
1536:/fsEqouTRcG/Mzvgf7xEuvnXNTRdUzwTekUOisZ1yDDajtXbJdV:/VqoCl/YgjxEufVU0TbTyDDalbV
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 3900 explorer.exe 2932 spoolsv.exe 3352 svchost.exe 388 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\themes\explorer.exe 234affae1e0c38c977b55959972e627e6df25af817d65b35eb2a0304a26f690f.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 234affae1e0c38c977b55959972e627e6df25af817d65b35eb2a0304a26f690f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3068 234affae1e0c38c977b55959972e627e6df25af817d65b35eb2a0304a26f690f.exe 3068 234affae1e0c38c977b55959972e627e6df25af817d65b35eb2a0304a26f690f.exe 3068 234affae1e0c38c977b55959972e627e6df25af817d65b35eb2a0304a26f690f.exe 3068 234affae1e0c38c977b55959972e627e6df25af817d65b35eb2a0304a26f690f.exe 3068 234affae1e0c38c977b55959972e627e6df25af817d65b35eb2a0304a26f690f.exe 3068 234affae1e0c38c977b55959972e627e6df25af817d65b35eb2a0304a26f690f.exe 3068 234affae1e0c38c977b55959972e627e6df25af817d65b35eb2a0304a26f690f.exe 3068 234affae1e0c38c977b55959972e627e6df25af817d65b35eb2a0304a26f690f.exe 3068 234affae1e0c38c977b55959972e627e6df25af817d65b35eb2a0304a26f690f.exe 3068 234affae1e0c38c977b55959972e627e6df25af817d65b35eb2a0304a26f690f.exe 3068 234affae1e0c38c977b55959972e627e6df25af817d65b35eb2a0304a26f690f.exe 3068 234affae1e0c38c977b55959972e627e6df25af817d65b35eb2a0304a26f690f.exe 3068 234affae1e0c38c977b55959972e627e6df25af817d65b35eb2a0304a26f690f.exe 3068 234affae1e0c38c977b55959972e627e6df25af817d65b35eb2a0304a26f690f.exe 3068 234affae1e0c38c977b55959972e627e6df25af817d65b35eb2a0304a26f690f.exe 3068 234affae1e0c38c977b55959972e627e6df25af817d65b35eb2a0304a26f690f.exe 3068 234affae1e0c38c977b55959972e627e6df25af817d65b35eb2a0304a26f690f.exe 3068 234affae1e0c38c977b55959972e627e6df25af817d65b35eb2a0304a26f690f.exe 3068 234affae1e0c38c977b55959972e627e6df25af817d65b35eb2a0304a26f690f.exe 3068 234affae1e0c38c977b55959972e627e6df25af817d65b35eb2a0304a26f690f.exe 3068 234affae1e0c38c977b55959972e627e6df25af817d65b35eb2a0304a26f690f.exe 3068 234affae1e0c38c977b55959972e627e6df25af817d65b35eb2a0304a26f690f.exe 3068 234affae1e0c38c977b55959972e627e6df25af817d65b35eb2a0304a26f690f.exe 3068 234affae1e0c38c977b55959972e627e6df25af817d65b35eb2a0304a26f690f.exe 3068 234affae1e0c38c977b55959972e627e6df25af817d65b35eb2a0304a26f690f.exe 3068 234affae1e0c38c977b55959972e627e6df25af817d65b35eb2a0304a26f690f.exe 3068 234affae1e0c38c977b55959972e627e6df25af817d65b35eb2a0304a26f690f.exe 3068 234affae1e0c38c977b55959972e627e6df25af817d65b35eb2a0304a26f690f.exe 3068 234affae1e0c38c977b55959972e627e6df25af817d65b35eb2a0304a26f690f.exe 3068 234affae1e0c38c977b55959972e627e6df25af817d65b35eb2a0304a26f690f.exe 3068 234affae1e0c38c977b55959972e627e6df25af817d65b35eb2a0304a26f690f.exe 3068 234affae1e0c38c977b55959972e627e6df25af817d65b35eb2a0304a26f690f.exe 3068 234affae1e0c38c977b55959972e627e6df25af817d65b35eb2a0304a26f690f.exe 3068 234affae1e0c38c977b55959972e627e6df25af817d65b35eb2a0304a26f690f.exe 3900 explorer.exe 3900 explorer.exe 3900 explorer.exe 3900 explorer.exe 3900 explorer.exe 3900 explorer.exe 3900 explorer.exe 3900 explorer.exe 3900 explorer.exe 3900 explorer.exe 3900 explorer.exe 3900 explorer.exe 3900 explorer.exe 3900 explorer.exe 3900 explorer.exe 3900 explorer.exe 3900 explorer.exe 3900 explorer.exe 3900 explorer.exe 3900 explorer.exe 3900 explorer.exe 3900 explorer.exe 3900 explorer.exe 3900 explorer.exe 3900 explorer.exe 3900 explorer.exe 3900 explorer.exe 3900 explorer.exe 3900 explorer.exe 3900 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 3900 explorer.exe 3352 svchost.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 3068 234affae1e0c38c977b55959972e627e6df25af817d65b35eb2a0304a26f690f.exe 3068 234affae1e0c38c977b55959972e627e6df25af817d65b35eb2a0304a26f690f.exe 3900 explorer.exe 3900 explorer.exe 2932 spoolsv.exe 2932 spoolsv.exe 3352 svchost.exe 3352 svchost.exe 388 spoolsv.exe 388 spoolsv.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3068 wrote to memory of 3900 3068 234affae1e0c38c977b55959972e627e6df25af817d65b35eb2a0304a26f690f.exe 84 PID 3068 wrote to memory of 3900 3068 234affae1e0c38c977b55959972e627e6df25af817d65b35eb2a0304a26f690f.exe 84 PID 3068 wrote to memory of 3900 3068 234affae1e0c38c977b55959972e627e6df25af817d65b35eb2a0304a26f690f.exe 84 PID 3900 wrote to memory of 2932 3900 explorer.exe 86 PID 3900 wrote to memory of 2932 3900 explorer.exe 86 PID 3900 wrote to memory of 2932 3900 explorer.exe 86 PID 2932 wrote to memory of 3352 2932 spoolsv.exe 87 PID 2932 wrote to memory of 3352 2932 spoolsv.exe 87 PID 2932 wrote to memory of 3352 2932 spoolsv.exe 87 PID 3352 wrote to memory of 388 3352 svchost.exe 88 PID 3352 wrote to memory of 388 3352 svchost.exe 88 PID 3352 wrote to memory of 388 3352 svchost.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\234affae1e0c38c977b55959972e627e6df25af817d65b35eb2a0304a26f690f.exe"C:\Users\Admin\AppData\Local\Temp\234affae1e0c38c977b55959972e627e6df25af817d65b35eb2a0304a26f690f.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3068 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3900 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2932 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3352 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:388
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD58255f40feec017695a9262a3c9775a15
SHA12e027f62b6290e136846623f6518cf94d679deb6
SHA256034d0044fdd872ba8097798c702473232e8fee28a5878ad600301c120257cdd9
SHA5129348c60de58192e8f1753048900215904f3b061721eeb2bb31961d0b3ae05e0b6c11659a619313a1ac7f156fefe9641f3c5e542a1c63d4142420781008c0ca2a
-
Filesize
206KB
MD5c2ff4c79c5214fd8053314578db97197
SHA140cd2b33cccc452256daadcae2db0449c990e42c
SHA256a1d4992d085d74329efd73dd18e61275ae7f8fa17bb56049ba4e33b157d39a24
SHA512f00ebc7b1e3f9f42d70a294feef9bc3f47f0d348bb1994043b08fa05e95febbe8392653d1b06ae8c04e506404cdb8cb261b681983361a34bddb4ff3b6d1aa808
-
Filesize
206KB
MD5e83fd6b9687b9ab1e4fe5c6fd26a02d0
SHA186a6c02987f75499b4374aa494fbc7df58a472c3
SHA256a50776873928256a6c2a1a3637bfcc002eb86c2033b2ad7d044d8edaa6ce9929
SHA5123962b0ce772affa148eebaaece0fc0fd090a06039a4559e5ffe17b52147ed0a334c2686c899c6140b27f3f83cdcca9b51dc036a3200f159b2257cbd04c03bede