Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 10:39
Static task
static1
Behavioral task
behavioral1
Sample
27ead79e625289762f6dfae5111ebaa0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
27ead79e625289762f6dfae5111ebaa0N.exe
Resource
win10v2004-20240802-en
General
-
Target
27ead79e625289762f6dfae5111ebaa0N.exe
-
Size
5.4MB
-
MD5
27ead79e625289762f6dfae5111ebaa0
-
SHA1
15c2bc0152cf9c07eaa774d0269ed1d3bf884dd6
-
SHA256
6edfb343ed43ddd5bd2d1131acc658ad72d3128b3c7d63ea933e51aae67a0cff
-
SHA512
245f40383ac2af916063a94d230af4f318c59d9cf894d0061bc6743aeeda250c237ec743f123adf3834aee882ab7c3f135068187f808415008919950170222fa
-
SSDEEP
98304:+TCx1ykMv3Aiju03ej9Qfqy/mfr1e2E2IojD4jpLik:m8yBAi6zvmY5e2cogJ
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
Executes dropped EXE 7 IoCs
pid Process 2756 27ead79e625289762f6dfae5111ebaa0n.exe 2664 svchost.exe 2940 icsys.icn.exe 1528 explorer.exe 2532 spoolsv.exe 3020 svchost.exe 860 spoolsv.exe -
Loads dropped DLL 6 IoCs
pid Process 2668 27ead79e625289762f6dfae5111ebaa0N.exe 2668 27ead79e625289762f6dfae5111ebaa0N.exe 2940 icsys.icn.exe 1528 explorer.exe 2532 spoolsv.exe 3020 svchost.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 7 IoCs
description ioc Process File opened for modification C:\Windows\Resources\tjud.exe explorer.exe File opened for modification C:\Windows\Resources\Themes\icsys.icn.exe 27ead79e625289762f6dfae5111ebaa0N.exe File created C:\Windows\svchost.exe 27ead79e625289762f6dfae5111ebaa0n.exe File opened for modification \??\c:\windows\resources\themes\explorer.exe icsys.icn.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\svchost.exe explorer.exe -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 27ead79e625289762f6dfae5111ebaa0n.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icsys.icn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 27ead79e625289762f6dfae5111ebaa0N.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2176 schtasks.exe 2576 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2668 27ead79e625289762f6dfae5111ebaa0N.exe 2668 27ead79e625289762f6dfae5111ebaa0N.exe 2668 27ead79e625289762f6dfae5111ebaa0N.exe 2668 27ead79e625289762f6dfae5111ebaa0N.exe 2668 27ead79e625289762f6dfae5111ebaa0N.exe 2668 27ead79e625289762f6dfae5111ebaa0N.exe 2668 27ead79e625289762f6dfae5111ebaa0N.exe 2668 27ead79e625289762f6dfae5111ebaa0N.exe 2668 27ead79e625289762f6dfae5111ebaa0N.exe 2668 27ead79e625289762f6dfae5111ebaa0N.exe 2668 27ead79e625289762f6dfae5111ebaa0N.exe 2668 27ead79e625289762f6dfae5111ebaa0N.exe 2668 27ead79e625289762f6dfae5111ebaa0N.exe 2668 27ead79e625289762f6dfae5111ebaa0N.exe 2668 27ead79e625289762f6dfae5111ebaa0N.exe 2668 27ead79e625289762f6dfae5111ebaa0N.exe 2940 icsys.icn.exe 2940 icsys.icn.exe 2940 icsys.icn.exe 2940 icsys.icn.exe 2940 icsys.icn.exe 2940 icsys.icn.exe 2940 icsys.icn.exe 2940 icsys.icn.exe 2940 icsys.icn.exe 2940 icsys.icn.exe 2940 icsys.icn.exe 2940 icsys.icn.exe 2940 icsys.icn.exe 2940 icsys.icn.exe 2940 icsys.icn.exe 2940 icsys.icn.exe 2940 icsys.icn.exe 1528 explorer.exe 1528 explorer.exe 1528 explorer.exe 1528 explorer.exe 1528 explorer.exe 1528 explorer.exe 1528 explorer.exe 1528 explorer.exe 1528 explorer.exe 1528 explorer.exe 1528 explorer.exe 1528 explorer.exe 1528 explorer.exe 1528 explorer.exe 1528 explorer.exe 1528 explorer.exe 3020 svchost.exe 3020 svchost.exe 3020 svchost.exe 3020 svchost.exe 3020 svchost.exe 3020 svchost.exe 3020 svchost.exe 3020 svchost.exe 3020 svchost.exe 3020 svchost.exe 3020 svchost.exe 3020 svchost.exe 3020 svchost.exe 3020 svchost.exe 3020 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 1528 explorer.exe 3020 svchost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2940 icsys.icn.exe Token: SeDebugPrivilege 2940 icsys.icn.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2668 27ead79e625289762f6dfae5111ebaa0N.exe 2668 27ead79e625289762f6dfae5111ebaa0N.exe 2940 icsys.icn.exe 2940 icsys.icn.exe 1528 explorer.exe 1528 explorer.exe 2532 spoolsv.exe 2532 spoolsv.exe 3020 svchost.exe 3020 svchost.exe 860 spoolsv.exe 860 spoolsv.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 2668 wrote to memory of 2756 2668 27ead79e625289762f6dfae5111ebaa0N.exe 30 PID 2668 wrote to memory of 2756 2668 27ead79e625289762f6dfae5111ebaa0N.exe 30 PID 2668 wrote to memory of 2756 2668 27ead79e625289762f6dfae5111ebaa0N.exe 30 PID 2668 wrote to memory of 2756 2668 27ead79e625289762f6dfae5111ebaa0N.exe 30 PID 2756 wrote to memory of 2664 2756 27ead79e625289762f6dfae5111ebaa0n.exe 31 PID 2756 wrote to memory of 2664 2756 27ead79e625289762f6dfae5111ebaa0n.exe 31 PID 2756 wrote to memory of 2664 2756 27ead79e625289762f6dfae5111ebaa0n.exe 31 PID 2756 wrote to memory of 2664 2756 27ead79e625289762f6dfae5111ebaa0n.exe 31 PID 2668 wrote to memory of 2940 2668 27ead79e625289762f6dfae5111ebaa0N.exe 32 PID 2668 wrote to memory of 2940 2668 27ead79e625289762f6dfae5111ebaa0N.exe 32 PID 2668 wrote to memory of 2940 2668 27ead79e625289762f6dfae5111ebaa0N.exe 32 PID 2668 wrote to memory of 2940 2668 27ead79e625289762f6dfae5111ebaa0N.exe 32 PID 2940 wrote to memory of 1528 2940 icsys.icn.exe 33 PID 2940 wrote to memory of 1528 2940 icsys.icn.exe 33 PID 2940 wrote to memory of 1528 2940 icsys.icn.exe 33 PID 2940 wrote to memory of 1528 2940 icsys.icn.exe 33 PID 1528 wrote to memory of 2532 1528 explorer.exe 34 PID 1528 wrote to memory of 2532 1528 explorer.exe 34 PID 1528 wrote to memory of 2532 1528 explorer.exe 34 PID 1528 wrote to memory of 2532 1528 explorer.exe 34 PID 2532 wrote to memory of 3020 2532 spoolsv.exe 35 PID 2532 wrote to memory of 3020 2532 spoolsv.exe 35 PID 2532 wrote to memory of 3020 2532 spoolsv.exe 35 PID 2532 wrote to memory of 3020 2532 spoolsv.exe 35 PID 3020 wrote to memory of 860 3020 svchost.exe 36 PID 3020 wrote to memory of 860 3020 svchost.exe 36 PID 3020 wrote to memory of 860 3020 svchost.exe 36 PID 3020 wrote to memory of 860 3020 svchost.exe 36 PID 1528 wrote to memory of 2716 1528 explorer.exe 37 PID 1528 wrote to memory of 2716 1528 explorer.exe 37 PID 1528 wrote to memory of 2716 1528 explorer.exe 37 PID 1528 wrote to memory of 2716 1528 explorer.exe 37 PID 3020 wrote to memory of 2576 3020 svchost.exe 38 PID 3020 wrote to memory of 2576 3020 svchost.exe 38 PID 3020 wrote to memory of 2576 3020 svchost.exe 38 PID 3020 wrote to memory of 2576 3020 svchost.exe 38 PID 3020 wrote to memory of 2176 3020 svchost.exe 41 PID 3020 wrote to memory of 2176 3020 svchost.exe 41 PID 3020 wrote to memory of 2176 3020 svchost.exe 41 PID 3020 wrote to memory of 2176 3020 svchost.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\27ead79e625289762f6dfae5111ebaa0N.exe"C:\Users\Admin\AppData\Local\Temp\27ead79e625289762f6dfae5111ebaa0N.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2668 -
\??\c:\users\admin\appdata\local\temp\27ead79e625289762f6dfae5111ebaa0n.exec:\users\admin\appdata\local\temp\27ead79e625289762f6dfae5111ebaa0n.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe" "c:\users\admin\appdata\local\temp\27ead79e625289762f6dfae5111ebaa0n.exe "3⤵
- Executes dropped EXE
PID:2664
-
-
-
C:\Windows\Resources\Themes\icsys.icn.exeC:\Windows\Resources\Themes\icsys.icn.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2940 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe3⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1528 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2532 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe5⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3020 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:860
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 10:41 /f6⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2576
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 10:42 /f6⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2176
-
-
-
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe4⤵PID:2716
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135KB
MD5a424f1c1d48e8e87bf6149721c8bdf4f
SHA16b1669203b163745c274ead77664861d1b4cdf83
SHA256a87c20cb305c37802fa66c77d31997b9bc0befe28761f88308f116d9cd44d3f7
SHA512bcfec8dbe885905303164e2bb891a8024a6c45d128f8fdb7efeb1eea7140ff498b9312243b94c09f38ad91c88d4a9c59c097bfc6f13288f88847957a62612a81
-
Filesize
35KB
MD59e3c13b6556d5636b745d3e466d47467
SHA12ac1c19e268c49bc508f83fe3d20f495deb3e538
SHA25620af03add533a6870d524a7c4753b42bfceb56cddd46016c051e23581ba743f8
SHA5125a07ba8a7fcb15f64b129fada2621252b8bc37eb34d4f614c075c064f8ac0d367301eba0c32c5e28b8aa633f6ab604f0dfcc363b34734ce0207ef0d4e8817c4b
-
Filesize
5.2MB
MD5d24dd522c60656df91356571ff05e616
SHA1e5e0d1fbc85c5424accbf7a9bd1fe0e1f6c92b18
SHA256a1c2b70bf3ad91f7b79ac3231f7cbad34cf80f40f950de0596de736036806f9d
SHA51262d03b699923e87027d0429f59b38f5cf5636fc21b9a41ff1be2d7549e66c4cfd8a5ca377cbef1d390b75477e5ba697843e6e9ae121054dda5496ed21f93efd1
-
Filesize
135KB
MD581431e8c7a9cf24c1e41751bfba32ad9
SHA196d029ad4731cbbf137e3ecaf1000ff176e3589e
SHA256896f497d5a1f5fcbfa0a4677704c8084f5882072391220bd1bda04abcd37310e
SHA512d7c41cd7284fb4c311a6bb7876788e8c6bccd964355eb3c9309c1c83029ab013e73c7ad089eecdbe3c4a1e0eaef90b950fce4dc19c6811ed8d444f453a29b2f5
-
Filesize
135KB
MD567d2a55ae085b1958abd318b70a9bb62
SHA1d8d24b0938e692a444ffbf1652bc79d0fdb402de
SHA2565554149495666e522a4c0c68368284ba3a9ad832692383ee42a5625b73fa0d0e
SHA5122b7b53bce6d28d5eb759a199d8e15b81d5f6646a8f4352821572d0f48a15f81c3a80e7db8a8521fe057c4d970083e57b59ab0e521b2e3f11e7483f488d64d9a9
-
Filesize
135KB
MD547d8ed085c6e383abede0b55b55816eb
SHA18868df990efb4066553560f54e08f5d48e51f8ec
SHA256e2c6dc804bc875524c57889d6aaad4cfdda066971f63bc70a77b660a7d79bce8
SHA512a49535291461c3474bb1e62b89f50a7ae41488884cd3a05d70b154b4171511b6cacc7501297f886b41f9b282a361f0aa8bf722f6a47508a2a234b91964871365