Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    06/09/2024, 23:04

General

  • Target

    5b4764332be4aef7cb426e6852702670N.exe

  • Size

    207KB

  • MD5

    5b4764332be4aef7cb426e6852702670

  • SHA1

    c22b91bce47529767b2d4dfb7e1d14bc62438469

  • SHA256

    336b7daa3ecfcb6db2f1cc975d7543ce5beffc731027a1645ffd9abd4d029742

  • SHA512

    417de9c11475bdf584987e76ba4b3f2506922fba3a972bc4bc0ecab72402ebd0b3bcf724c59c11c57f7eb58c5bce0764d7ea67339424cd08732ca2f9cd4f2b09

  • SSDEEP

    1536:/fsEqouTRcG/Mzvgf7xEuvnXNTRdUzwTekUOisZ1yDDajtXbJdo:/VqoCl/YgjxEufVU0TbTyDDalbo

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 8 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5b4764332be4aef7cb426e6852702670N.exe
    "C:\Users\Admin\AppData\Local\Temp\5b4764332be4aef7cb426e6852702670N.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2856
    • \??\c:\windows\resources\themes\explorer.exe
      c:\windows\resources\themes\explorer.exe
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2164
      • \??\c:\windows\resources\spoolsv.exe
        c:\windows\resources\spoolsv.exe SE
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2680
        • \??\c:\windows\resources\svchost.exe
          c:\windows\resources\svchost.exe
          4⤵
          • Modifies visiblity of hidden/system files in Explorer
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2688
          • \??\c:\windows\resources\spoolsv.exe
            c:\windows\resources\spoolsv.exe PR
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            PID:2028
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 23:06 /f
            5⤵
            • System Location Discovery: System Language Discovery
            • Scheduled Task/Job: Scheduled Task
            PID:3056
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 23:07 /f
            5⤵
            • System Location Discovery: System Language Discovery
            • Scheduled Task/Job: Scheduled Task
            PID:2912
      • C:\Windows\Explorer.exe
        C:\Windows\Explorer.exe
        3⤵
          PID:2548

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\Resources\svchost.exe

      Filesize

      206KB

      MD5

      7ee90106341a8b8e696629f735836c11

      SHA1

      79febe00c75bfcd7c2386a5d2ebb411b62c41df0

      SHA256

      3b1036479a3e3429fda71cfc06b7eb9366752897667bf5201e18a268b9b12ad5

      SHA512

      b4eb85ba66638cf9bde6b01d064627fd7522e3191f383ec2e71386485b40356118c797ab067128795d193e38c4ea959ce7fbac386b5c2fcfaae1dafa7ba7b669

    • \Windows\Resources\Themes\explorer.exe

      Filesize

      206KB

      MD5

      bc16f2cb35c0ba94e85f42ff76d27658

      SHA1

      180e88e82e3a2ec097ec0aca43dc2cdbc275a8a5

      SHA256

      bb85416b86b0b8d1bc3128f07d90a7b479d5466326ed512d7d9caca047c87cd5

      SHA512

      fe3cbf1e453c46af35e2954a504af39b2a0e6e7c073ab3c7080b3ade3afe4902f61e1dc7f6a7cee3b82c4690568110a67298129f756b8d39d844a20932d64f01

    • \Windows\Resources\spoolsv.exe

      Filesize

      206KB

      MD5

      1d2265162f376155667c7372d660a7a3

      SHA1

      f16513f028def150bc5dd7519e3fe2845fe88a08

      SHA256

      c0ffadac0925f9e17fddd36c96c66cb99c9deed160e9a7c8fcc8f86266a76f5b

      SHA512

      eee24e459f35a29f05ec277ddb300ca4d06430471824a414bab9a887047f582be93ad18dc8a38a3cbe57a6f647cae724f6548bbd18fbdd98cb9cf1f8d0e15ddd

    • memory/2028-52-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/2164-55-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/2680-40-0x0000000001D10000-0x0000000001D3F000-memory.dmp

      Filesize

      188KB

    • memory/2680-53-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/2688-48-0x0000000000240000-0x000000000026F000-memory.dmp

      Filesize

      188KB

    • memory/2688-56-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/2688-57-0x0000000000240000-0x000000000026F000-memory.dmp

      Filesize

      188KB

    • memory/2856-0-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/2856-54-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/2856-12-0x0000000002610000-0x000000000263F000-memory.dmp

      Filesize

      188KB