Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
25/08/2024, 19:30
Static task
static1
Behavioral task
behavioral1
Sample
6e12b57fa31dde6e68c697b13e3f2c20N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
6e12b57fa31dde6e68c697b13e3f2c20N.exe
Resource
win10v2004-20240802-en
General
-
Target
6e12b57fa31dde6e68c697b13e3f2c20N.exe
-
Size
135KB
-
MD5
6e12b57fa31dde6e68c697b13e3f2c20
-
SHA1
42b6652a12afb53cd8357b03e1573b933acd8e15
-
SHA256
3157844376f1f67efa460820531e495d78f3371d7b10bbd666c6c84909ffc1cb
-
SHA512
0ef1278c3ead46a832978af8aefdc85bc77b3073dca2ff84be703cd5fd6a45acf1a7d3b656d100308062fc01692073363daa9f6fc86bb202cfcbcf6a0f5d3389
-
SSDEEP
1536:UfsEqouTRcG/Mzvgf7xEuvnXNTRdUzwTekUOisZ1yDDajtXbV8cybW:UVqoCl/YgjxEufVU0TbTyDDalicybW
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 2756 explorer.exe 2676 spoolsv.exe 2668 svchost.exe 2576 spoolsv.exe -
Loads dropped DLL 4 IoCs
pid Process 1884 6e12b57fa31dde6e68c697b13e3f2c20N.exe 2756 explorer.exe 2676 spoolsv.exe 2668 svchost.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe File opened for modification \??\c:\windows\resources\themes\explorer.exe 6e12b57fa31dde6e68c697b13e3f2c20N.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6e12b57fa31dde6e68c697b13e3f2c20N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2672 schtasks.exe 2840 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1884 6e12b57fa31dde6e68c697b13e3f2c20N.exe 1884 6e12b57fa31dde6e68c697b13e3f2c20N.exe 1884 6e12b57fa31dde6e68c697b13e3f2c20N.exe 1884 6e12b57fa31dde6e68c697b13e3f2c20N.exe 1884 6e12b57fa31dde6e68c697b13e3f2c20N.exe 1884 6e12b57fa31dde6e68c697b13e3f2c20N.exe 1884 6e12b57fa31dde6e68c697b13e3f2c20N.exe 1884 6e12b57fa31dde6e68c697b13e3f2c20N.exe 1884 6e12b57fa31dde6e68c697b13e3f2c20N.exe 1884 6e12b57fa31dde6e68c697b13e3f2c20N.exe 1884 6e12b57fa31dde6e68c697b13e3f2c20N.exe 1884 6e12b57fa31dde6e68c697b13e3f2c20N.exe 1884 6e12b57fa31dde6e68c697b13e3f2c20N.exe 1884 6e12b57fa31dde6e68c697b13e3f2c20N.exe 1884 6e12b57fa31dde6e68c697b13e3f2c20N.exe 1884 6e12b57fa31dde6e68c697b13e3f2c20N.exe 1884 6e12b57fa31dde6e68c697b13e3f2c20N.exe 2756 explorer.exe 2756 explorer.exe 2756 explorer.exe 2756 explorer.exe 2756 explorer.exe 2756 explorer.exe 2756 explorer.exe 2756 explorer.exe 2756 explorer.exe 2756 explorer.exe 2756 explorer.exe 2756 explorer.exe 2756 explorer.exe 2756 explorer.exe 2756 explorer.exe 2756 explorer.exe 2668 svchost.exe 2668 svchost.exe 2668 svchost.exe 2668 svchost.exe 2668 svchost.exe 2668 svchost.exe 2668 svchost.exe 2668 svchost.exe 2668 svchost.exe 2668 svchost.exe 2668 svchost.exe 2668 svchost.exe 2668 svchost.exe 2668 svchost.exe 2668 svchost.exe 2668 svchost.exe 2756 explorer.exe 2756 explorer.exe 2756 explorer.exe 2668 svchost.exe 2668 svchost.exe 2756 explorer.exe 2756 explorer.exe 2668 svchost.exe 2756 explorer.exe 2668 svchost.exe 2756 explorer.exe 2668 svchost.exe 2756 explorer.exe 2668 svchost.exe 2756 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2756 explorer.exe 2668 svchost.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 1884 6e12b57fa31dde6e68c697b13e3f2c20N.exe 1884 6e12b57fa31dde6e68c697b13e3f2c20N.exe 2756 explorer.exe 2756 explorer.exe 2676 spoolsv.exe 2676 spoolsv.exe 2668 svchost.exe 2668 svchost.exe 2576 spoolsv.exe 2576 spoolsv.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1884 wrote to memory of 2756 1884 6e12b57fa31dde6e68c697b13e3f2c20N.exe 30 PID 1884 wrote to memory of 2756 1884 6e12b57fa31dde6e68c697b13e3f2c20N.exe 30 PID 1884 wrote to memory of 2756 1884 6e12b57fa31dde6e68c697b13e3f2c20N.exe 30 PID 1884 wrote to memory of 2756 1884 6e12b57fa31dde6e68c697b13e3f2c20N.exe 30 PID 2756 wrote to memory of 2676 2756 explorer.exe 31 PID 2756 wrote to memory of 2676 2756 explorer.exe 31 PID 2756 wrote to memory of 2676 2756 explorer.exe 31 PID 2756 wrote to memory of 2676 2756 explorer.exe 31 PID 2676 wrote to memory of 2668 2676 spoolsv.exe 32 PID 2676 wrote to memory of 2668 2676 spoolsv.exe 32 PID 2676 wrote to memory of 2668 2676 spoolsv.exe 32 PID 2676 wrote to memory of 2668 2676 spoolsv.exe 32 PID 2668 wrote to memory of 2576 2668 svchost.exe 33 PID 2668 wrote to memory of 2576 2668 svchost.exe 33 PID 2668 wrote to memory of 2576 2668 svchost.exe 33 PID 2668 wrote to memory of 2576 2668 svchost.exe 33 PID 2756 wrote to memory of 2552 2756 explorer.exe 34 PID 2756 wrote to memory of 2552 2756 explorer.exe 34 PID 2756 wrote to memory of 2552 2756 explorer.exe 34 PID 2756 wrote to memory of 2552 2756 explorer.exe 34 PID 2668 wrote to memory of 2672 2668 svchost.exe 35 PID 2668 wrote to memory of 2672 2668 svchost.exe 35 PID 2668 wrote to memory of 2672 2668 svchost.exe 35 PID 2668 wrote to memory of 2672 2668 svchost.exe 35 PID 2668 wrote to memory of 2840 2668 svchost.exe 38 PID 2668 wrote to memory of 2840 2668 svchost.exe 38 PID 2668 wrote to memory of 2840 2668 svchost.exe 38 PID 2668 wrote to memory of 2840 2668 svchost.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\6e12b57fa31dde6e68c697b13e3f2c20N.exe"C:\Users\Admin\AppData\Local\Temp\6e12b57fa31dde6e68c697b13e3f2c20N.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1884 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2756 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2676 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2668 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2576
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 19:33 /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2672
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 19:34 /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2840
-
-
-
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe3⤵PID:2552
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135KB
MD5fe1b9b03c2741a5e8f7a24147b35dd56
SHA10f76f060ba3eeded381f1e535161e03840f1b75b
SHA25699019acd74165d61fe5bac92e5ae399000c768fbe2af98e50b2ece2233d59530
SHA5121892985dd11b11e2ef0629c0f4a8843ca119fe5a6158476dec3e414628dacc381beec9ad444c6939f0ab094bda8e3189cab8fc70f7069b435b52ef4a9bdc85e4
-
Filesize
135KB
MD51b673fac8cdd2c4ad9f7297c3d792abe
SHA1d93b9e94869f4f787a83f01c8573cd26a4d71298
SHA256dfc5458d4e1eb9bb8ab5d339887b22cb0011e0accc1282661ab12c9c24752f1e
SHA512988290e011b54f1bad671ae728e8dba414dde00c786e94154b065f458b82d1d4e54bc5617ad41ad7a6dcb5972aec400c31bd0a58a262ef36a2a184df0d6523c0
-
Filesize
135KB
MD559e383583de63b012e92fc8d7232f512
SHA185bd5da01521fdbe5cfdc32cc343a75242e31004
SHA256b294dfdf23b0bf2d1dc6d799a4ae22080e2c01b9592c49e6417c65b4452658eb
SHA51286bca213f22cc1174f17f3a73fdaac77c6b51738e683222fd33b312cd92fe595bafc293cff067c1cb8a54347ba3595335bda01c202a8eafcf19222811627c28b