Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/08/2024, 09:52
Static task
static1
Behavioral task
behavioral1
Sample
109746509cb3d0c491acb84b34970a00N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
109746509cb3d0c491acb84b34970a00N.exe
Resource
win10v2004-20240802-en
General
-
Target
109746509cb3d0c491acb84b34970a00N.exe
-
Size
206KB
-
MD5
109746509cb3d0c491acb84b34970a00
-
SHA1
64b419fe500c62c7861b61139bdd682d4c47d5a9
-
SHA256
7f5ee35316a658826b4a96bc92a0367c7730d43a77f1bbe3270f0c5b25a093b3
-
SHA512
cbbf6505150d7b71e8560eea162b30b59128ea9189ee05da31d2b418b53f291db233acd9775a4223ab13eee8e1534336e9d87ba5bdc3c3e9e352d6d824997935
-
SSDEEP
1536:/fsEqouTRcG/Mzvgf7xEuvnXNTRdUzwTekUOisZ1yDDajtXbJd5:/VqoCl/YgjxEufVU0TbTyDDalb5
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 2216 explorer.exe 368 spoolsv.exe 4272 svchost.exe 3040 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\themes\explorer.exe 109746509cb3d0c491acb84b34970a00N.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 109746509cb3d0c491acb84b34970a00N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3476 109746509cb3d0c491acb84b34970a00N.exe 3476 109746509cb3d0c491acb84b34970a00N.exe 3476 109746509cb3d0c491acb84b34970a00N.exe 3476 109746509cb3d0c491acb84b34970a00N.exe 3476 109746509cb3d0c491acb84b34970a00N.exe 3476 109746509cb3d0c491acb84b34970a00N.exe 3476 109746509cb3d0c491acb84b34970a00N.exe 3476 109746509cb3d0c491acb84b34970a00N.exe 3476 109746509cb3d0c491acb84b34970a00N.exe 3476 109746509cb3d0c491acb84b34970a00N.exe 3476 109746509cb3d0c491acb84b34970a00N.exe 3476 109746509cb3d0c491acb84b34970a00N.exe 3476 109746509cb3d0c491acb84b34970a00N.exe 3476 109746509cb3d0c491acb84b34970a00N.exe 3476 109746509cb3d0c491acb84b34970a00N.exe 3476 109746509cb3d0c491acb84b34970a00N.exe 3476 109746509cb3d0c491acb84b34970a00N.exe 3476 109746509cb3d0c491acb84b34970a00N.exe 3476 109746509cb3d0c491acb84b34970a00N.exe 3476 109746509cb3d0c491acb84b34970a00N.exe 3476 109746509cb3d0c491acb84b34970a00N.exe 3476 109746509cb3d0c491acb84b34970a00N.exe 3476 109746509cb3d0c491acb84b34970a00N.exe 3476 109746509cb3d0c491acb84b34970a00N.exe 3476 109746509cb3d0c491acb84b34970a00N.exe 3476 109746509cb3d0c491acb84b34970a00N.exe 3476 109746509cb3d0c491acb84b34970a00N.exe 3476 109746509cb3d0c491acb84b34970a00N.exe 3476 109746509cb3d0c491acb84b34970a00N.exe 3476 109746509cb3d0c491acb84b34970a00N.exe 3476 109746509cb3d0c491acb84b34970a00N.exe 3476 109746509cb3d0c491acb84b34970a00N.exe 3476 109746509cb3d0c491acb84b34970a00N.exe 3476 109746509cb3d0c491acb84b34970a00N.exe 2216 explorer.exe 2216 explorer.exe 2216 explorer.exe 2216 explorer.exe 2216 explorer.exe 2216 explorer.exe 2216 explorer.exe 2216 explorer.exe 2216 explorer.exe 2216 explorer.exe 2216 explorer.exe 2216 explorer.exe 2216 explorer.exe 2216 explorer.exe 2216 explorer.exe 2216 explorer.exe 2216 explorer.exe 2216 explorer.exe 2216 explorer.exe 2216 explorer.exe 2216 explorer.exe 2216 explorer.exe 2216 explorer.exe 2216 explorer.exe 2216 explorer.exe 2216 explorer.exe 2216 explorer.exe 2216 explorer.exe 2216 explorer.exe 2216 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2216 explorer.exe 4272 svchost.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 3476 109746509cb3d0c491acb84b34970a00N.exe 3476 109746509cb3d0c491acb84b34970a00N.exe 2216 explorer.exe 2216 explorer.exe 368 spoolsv.exe 368 spoolsv.exe 4272 svchost.exe 4272 svchost.exe 3040 spoolsv.exe 3040 spoolsv.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3476 wrote to memory of 2216 3476 109746509cb3d0c491acb84b34970a00N.exe 84 PID 3476 wrote to memory of 2216 3476 109746509cb3d0c491acb84b34970a00N.exe 84 PID 3476 wrote to memory of 2216 3476 109746509cb3d0c491acb84b34970a00N.exe 84 PID 2216 wrote to memory of 368 2216 explorer.exe 86 PID 2216 wrote to memory of 368 2216 explorer.exe 86 PID 2216 wrote to memory of 368 2216 explorer.exe 86 PID 368 wrote to memory of 4272 368 spoolsv.exe 87 PID 368 wrote to memory of 4272 368 spoolsv.exe 87 PID 368 wrote to memory of 4272 368 spoolsv.exe 87 PID 4272 wrote to memory of 3040 4272 svchost.exe 88 PID 4272 wrote to memory of 3040 4272 svchost.exe 88 PID 4272 wrote to memory of 3040 4272 svchost.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\109746509cb3d0c491acb84b34970a00N.exe"C:\Users\Admin\AppData\Local\Temp\109746509cb3d0c491acb84b34970a00N.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3476 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2216 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:368 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4272 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3040
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD55bd759d47f2be79fcad4f036d44e7e65
SHA1fc216dc7cf6878ee60074fb8d0f89b7862043772
SHA256ca125f72a263da2a9b24c677acfdabbf053a27e1ceeb8f3467d8c977b1c8a0ac
SHA512a74ca4da4f1d71fc7d53b9ae7a97383e454919ab97d9b13eee7d33f182a94a8108d0a8633e0bea9e53128c3a146b5282e418dbd24ec5c310530c116660474283
-
Filesize
207KB
MD5ee399a8c65076160a0a4e606c9b925e4
SHA1ebc56713d88698a95599d6aa6fd704ac859c7e99
SHA2561027750911f4e282980350f3af231abc4b0d808f3dd82e0f11d6fc165be3a076
SHA512b43c96e9468bff2b6f8f5894a6baf3c6484d3f6efee61e85542aac57ec6d8f820886d22267d48cb6baa8d12d663e94daa24aee9b42d0593b952a16a750271468
-
Filesize
206KB
MD5be4d3ee77ffa5f00cd5c4d65d55bad85
SHA1cbbeb1ff7c25e48d6e4035ebdbba3b63beac0aa7
SHA25658036666472516392a092f5b235cd918d9582c0e01c321f9c3d5c4bc59ba08b0
SHA5120e943b4440cf240d86bc9166f2b1a9794d435a7391efeff22c4696e2440fee066358cb48794f3f2cdb4f88877b92babc5555c62c6dd2b1c741a5cc39b1a66eb9