Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 10:23
Static task
static1
Behavioral task
behavioral1
Sample
bef7cb55b42d2eefbc137b0e1cc8cf70N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bef7cb55b42d2eefbc137b0e1cc8cf70N.exe
Resource
win10v2004-20240802-en
General
-
Target
bef7cb55b42d2eefbc137b0e1cc8cf70N.exe
-
Size
211KB
-
MD5
bef7cb55b42d2eefbc137b0e1cc8cf70
-
SHA1
298e292afb2ccc5103e846bb05bd1bbcc75d78bb
-
SHA256
62bcfc7301c5e4fa40e052c20696efcf7adbdafc685e4141747ca6971f7dfb90
-
SHA512
7d766f90e7f36f256268965dca4edbb4d7f3fd04e029fd1f2e57d0f0fee0f26a9e7e497d0946951a1c115cb74425ae55afda887a1ae7a26d29221b5608765bb8
-
SSDEEP
3072:bDpM9Nvih5c9DE1pvAPXIHLfMgw7ySBL8PEAjAfIbAYGPJz6sPJBINFZ1FqnF:b1iNKQxENHLfMgw7y9ZrK
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\userinit.exe" userinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\userinit.exe" swchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" swchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" userinit.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 8 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} swchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} swchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Local\\mrsys.exe MR" swchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} swchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} userinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Local\\mrsys.exe MR" userinit.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} swchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Local\\mrsys.exe MR" swchost.exe -
Executes dropped EXE 4 IoCs
pid Process 2760 userinit.exe 2844 spoolsw.exe 2896 swchost.exe 2732 spoolsw.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Swchost = "c:\\windows\\swchost.exe RO" userinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\userinit = "c:\\windows\\userinit.exe RO" swchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Swchost = "c:\\windows\\swchost.exe RO" swchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\userinit = "c:\\windows\\userinit.exe RO" userinit.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\udsys.exe userinit.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification \??\c:\windows\swchost.exe swchost.exe File opened for modification \??\c:\windows\userinit.exe bef7cb55b42d2eefbc137b0e1cc8cf70N.exe File opened for modification \??\c:\windows\spoolsw.exe userinit.exe File opened for modification \??\c:\windows\swchost.exe spoolsw.exe File opened for modification \??\c:\windows\userinit.exe userinit.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bef7cb55b42d2eefbc137b0e1cc8cf70N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language userinit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language swchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2084 bef7cb55b42d2eefbc137b0e1cc8cf70N.exe 2760 userinit.exe 2760 userinit.exe 2760 userinit.exe 2896 swchost.exe 2896 swchost.exe 2760 userinit.exe 2896 swchost.exe 2760 userinit.exe 2896 swchost.exe 2760 userinit.exe 2896 swchost.exe 2760 userinit.exe 2896 swchost.exe 2760 userinit.exe 2896 swchost.exe 2760 userinit.exe 2896 swchost.exe 2760 userinit.exe 2896 swchost.exe 2760 userinit.exe 2896 swchost.exe 2760 userinit.exe 2896 swchost.exe 2760 userinit.exe 2896 swchost.exe 2760 userinit.exe 2896 swchost.exe 2760 userinit.exe 2896 swchost.exe 2760 userinit.exe 2896 swchost.exe 2760 userinit.exe 2896 swchost.exe 2760 userinit.exe 2896 swchost.exe 2760 userinit.exe 2896 swchost.exe 2760 userinit.exe 2896 swchost.exe 2760 userinit.exe 2896 swchost.exe 2760 userinit.exe 2896 swchost.exe 2760 userinit.exe 2896 swchost.exe 2760 userinit.exe 2896 swchost.exe 2760 userinit.exe 2896 swchost.exe 2760 userinit.exe 2896 swchost.exe 2760 userinit.exe 2896 swchost.exe 2760 userinit.exe 2896 swchost.exe 2760 userinit.exe 2896 swchost.exe 2760 userinit.exe 2896 swchost.exe 2760 userinit.exe 2896 swchost.exe 2760 userinit.exe 2896 swchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2760 userinit.exe 2896 swchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2084 bef7cb55b42d2eefbc137b0e1cc8cf70N.exe 2084 bef7cb55b42d2eefbc137b0e1cc8cf70N.exe 2760 userinit.exe 2760 userinit.exe 2844 spoolsw.exe 2844 spoolsw.exe 2896 swchost.exe 2896 swchost.exe 2732 spoolsw.exe 2732 spoolsw.exe 2760 userinit.exe 2760 userinit.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2084 wrote to memory of 2760 2084 bef7cb55b42d2eefbc137b0e1cc8cf70N.exe 31 PID 2084 wrote to memory of 2760 2084 bef7cb55b42d2eefbc137b0e1cc8cf70N.exe 31 PID 2084 wrote to memory of 2760 2084 bef7cb55b42d2eefbc137b0e1cc8cf70N.exe 31 PID 2084 wrote to memory of 2760 2084 bef7cb55b42d2eefbc137b0e1cc8cf70N.exe 31 PID 2760 wrote to memory of 2844 2760 userinit.exe 32 PID 2760 wrote to memory of 2844 2760 userinit.exe 32 PID 2760 wrote to memory of 2844 2760 userinit.exe 32 PID 2760 wrote to memory of 2844 2760 userinit.exe 32 PID 2844 wrote to memory of 2896 2844 spoolsw.exe 33 PID 2844 wrote to memory of 2896 2844 spoolsw.exe 33 PID 2844 wrote to memory of 2896 2844 spoolsw.exe 33 PID 2844 wrote to memory of 2896 2844 spoolsw.exe 33 PID 2896 wrote to memory of 2732 2896 swchost.exe 34 PID 2896 wrote to memory of 2732 2896 swchost.exe 34 PID 2896 wrote to memory of 2732 2896 swchost.exe 34 PID 2896 wrote to memory of 2732 2896 swchost.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\bef7cb55b42d2eefbc137b0e1cc8cf70N.exe"C:\Users\Admin\AppData\Local\Temp\bef7cb55b42d2eefbc137b0e1cc8cf70N.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2084 -
\??\c:\windows\userinit.exec:\windows\userinit.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2760 -
\??\c:\windows\spoolsw.exec:\windows\spoolsw.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2844 -
\??\c:\windows\swchost.exec:\windows\swchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2896 -
\??\c:\windows\spoolsw.exec:\windows\spoolsw.exe PR5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2732
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
211KB
MD5fd1fcf2e2e6f5de561e570b6fa6094bd
SHA1ab59f224463ae8a238a988999e6ef8176744169b
SHA2565068052f6f4a54eaa194f35c16f9fe8d05d20ed5661374ccb101b8a69614fe59
SHA51217cff0377aaca77e66ca5ae0a649981c51b3559e7e852117594025091fbe3134cba0ed8f244b6e96cb4922151b8db2d7ecfde9dd7c104b75a69ac78534f3f0fb
-
Filesize
211KB
MD5c765b4a493d253bed7665778a82815f0
SHA1934b2c49b9faf3782a853201bd6735984fa87056
SHA2561404d4b9e49c84f40956e0ae1fe9368ffa0801dc0f57e2c3d2eb042bc30c3342
SHA5126a3c3b66ebdef83f781393eb69331f7c92354286c01ddf1bb7641e2df242217b34518a938e9e752f8e806d5c11e0060818c22bcb35be9aeffc27fa91ad4e7845
-
Filesize
211KB
MD5a983f4939a913ff87a9149f55abe6d99
SHA17a6b20d7fe9304b07033bb49312fd12fb96a016d
SHA2563f30f38d03f8d7407a38c5e650ef8afead9464df7de8367b258dc248c6bac0a7
SHA512ea5f26a2489424887321afea12c81ce7c3a5e9b11039323dcb8951638dcdc94a6d77e3d01fc3ba3a622ba2fcf3b8b060884199b1596a2808ec32f05ebf9b33a9
-
Filesize
211KB
MD5440ee49977b1db76d0933b7de0ed9b91
SHA16c786c15de1456432cc8baf0edaeddc39dd92391
SHA256d428e84d31908470ade08fd7e917aa433bfee6ff91273eefe87954111db3e2f8
SHA5125b5c898cfedb08ae90e21fe8af018a7e168a26df0ee254f4e093843a514a665c5f46bee247d4a24eec8321a68fb997da6f16c485f2b8995bdd9971282684e1db