Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 22:45
Behavioral task
behavioral1
Sample
a04537c8928883ec8cf9f3ed9890b120N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a04537c8928883ec8cf9f3ed9890b120N.exe
Resource
win10v2004-20240802-en
General
-
Target
a04537c8928883ec8cf9f3ed9890b120N.exe
-
Size
2.6MB
-
MD5
a04537c8928883ec8cf9f3ed9890b120
-
SHA1
8081424a63548f6c4e489b0bdd6f62010363b4e8
-
SHA256
12d27fc722e34327a41d5da56a159fb2998e7cc679efe3143a4cae04162bb02b
-
SHA512
f04b128681fa279cc3334c8203f52c953c995265876d0652d42d1e452611b43f8109bb66b3d3ef703f6a7e7b87461bd11e1f6b708e3f432c1694c9ed7ae568fa
-
SSDEEP
49152:WXzhpDtKSK1cb8PGK+Tfuqmpc3elWo8GnQAsYZEVA:WXzhW148Pd+Tf1mpcOldJQ3/VA
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorer.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ spoolsv.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ spoolsv.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a04537c8928883ec8cf9f3ed9890b120N.exe -
Checks BIOS information in registry 2 TTPs 10 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion spoolsv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion spoolsv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a04537c8928883ec8cf9f3ed9890b120N.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a04537c8928883ec8cf9f3ed9890b120N.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion spoolsv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion spoolsv.exe -
Executes dropped EXE 4 IoCs
pid Process 2072 explorer.exe 2192 spoolsv.exe 2432 svchost.exe 2756 spoolsv.exe -
Loads dropped DLL 4 IoCs
pid Process 2236 a04537c8928883ec8cf9f3ed9890b120N.exe 2072 explorer.exe 2192 spoolsv.exe 2432 svchost.exe -
resource yara_rule behavioral1/memory/2236-0-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral1/files/0x0009000000015d19-7.dat themida behavioral1/memory/2072-12-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral1/files/0x0008000000015d48-19.dat themida behavioral1/memory/2072-21-0x00000000038C0000-0x0000000003ED6000-memory.dmp themida behavioral1/memory/2192-24-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral1/files/0x0008000000015d68-31.dat themida behavioral1/memory/2432-36-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral1/memory/2236-42-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral1/memory/2756-45-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral1/memory/2756-50-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral1/memory/2192-52-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral1/memory/2236-54-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral1/memory/2072-55-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral1/memory/2072-56-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral1/memory/2432-57-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral1/memory/2072-65-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral1/memory/2432-68-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral1/memory/2072-69-0x0000000000400000-0x0000000000A16000-memory.dmp themida -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA svchost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA spoolsv.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA a04537c8928883ec8cf9f3ed9890b120N.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA explorer.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA spoolsv.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 2236 a04537c8928883ec8cf9f3ed9890b120N.exe 2072 explorer.exe 2192 spoolsv.exe 2432 svchost.exe 2756 spoolsv.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe File opened for modification \??\c:\windows\resources\themes\explorer.exe a04537c8928883ec8cf9f3ed9890b120N.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a04537c8928883ec8cf9f3ed9890b120N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2768 schtasks.exe 2516 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2236 a04537c8928883ec8cf9f3ed9890b120N.exe 2236 a04537c8928883ec8cf9f3ed9890b120N.exe 2236 a04537c8928883ec8cf9f3ed9890b120N.exe 2236 a04537c8928883ec8cf9f3ed9890b120N.exe 2236 a04537c8928883ec8cf9f3ed9890b120N.exe 2236 a04537c8928883ec8cf9f3ed9890b120N.exe 2236 a04537c8928883ec8cf9f3ed9890b120N.exe 2236 a04537c8928883ec8cf9f3ed9890b120N.exe 2236 a04537c8928883ec8cf9f3ed9890b120N.exe 2236 a04537c8928883ec8cf9f3ed9890b120N.exe 2236 a04537c8928883ec8cf9f3ed9890b120N.exe 2236 a04537c8928883ec8cf9f3ed9890b120N.exe 2236 a04537c8928883ec8cf9f3ed9890b120N.exe 2236 a04537c8928883ec8cf9f3ed9890b120N.exe 2236 a04537c8928883ec8cf9f3ed9890b120N.exe 2236 a04537c8928883ec8cf9f3ed9890b120N.exe 2236 a04537c8928883ec8cf9f3ed9890b120N.exe 2072 explorer.exe 2072 explorer.exe 2072 explorer.exe 2072 explorer.exe 2072 explorer.exe 2072 explorer.exe 2072 explorer.exe 2072 explorer.exe 2072 explorer.exe 2072 explorer.exe 2072 explorer.exe 2072 explorer.exe 2072 explorer.exe 2072 explorer.exe 2072 explorer.exe 2072 explorer.exe 2432 svchost.exe 2432 svchost.exe 2432 svchost.exe 2432 svchost.exe 2432 svchost.exe 2432 svchost.exe 2432 svchost.exe 2432 svchost.exe 2432 svchost.exe 2432 svchost.exe 2432 svchost.exe 2432 svchost.exe 2432 svchost.exe 2432 svchost.exe 2432 svchost.exe 2432 svchost.exe 2072 explorer.exe 2072 explorer.exe 2072 explorer.exe 2432 svchost.exe 2432 svchost.exe 2072 explorer.exe 2432 svchost.exe 2072 explorer.exe 2432 svchost.exe 2072 explorer.exe 2432 svchost.exe 2432 svchost.exe 2072 explorer.exe 2432 svchost.exe 2072 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2432 svchost.exe 2072 explorer.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 2236 a04537c8928883ec8cf9f3ed9890b120N.exe 2236 a04537c8928883ec8cf9f3ed9890b120N.exe 2072 explorer.exe 2072 explorer.exe 2192 spoolsv.exe 2192 spoolsv.exe 2432 svchost.exe 2432 svchost.exe 2756 spoolsv.exe 2756 spoolsv.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2236 wrote to memory of 2072 2236 a04537c8928883ec8cf9f3ed9890b120N.exe 30 PID 2236 wrote to memory of 2072 2236 a04537c8928883ec8cf9f3ed9890b120N.exe 30 PID 2236 wrote to memory of 2072 2236 a04537c8928883ec8cf9f3ed9890b120N.exe 30 PID 2236 wrote to memory of 2072 2236 a04537c8928883ec8cf9f3ed9890b120N.exe 30 PID 2072 wrote to memory of 2192 2072 explorer.exe 31 PID 2072 wrote to memory of 2192 2072 explorer.exe 31 PID 2072 wrote to memory of 2192 2072 explorer.exe 31 PID 2072 wrote to memory of 2192 2072 explorer.exe 31 PID 2192 wrote to memory of 2432 2192 spoolsv.exe 32 PID 2192 wrote to memory of 2432 2192 spoolsv.exe 32 PID 2192 wrote to memory of 2432 2192 spoolsv.exe 32 PID 2192 wrote to memory of 2432 2192 spoolsv.exe 32 PID 2432 wrote to memory of 2756 2432 svchost.exe 33 PID 2432 wrote to memory of 2756 2432 svchost.exe 33 PID 2432 wrote to memory of 2756 2432 svchost.exe 33 PID 2432 wrote to memory of 2756 2432 svchost.exe 33 PID 2072 wrote to memory of 2936 2072 explorer.exe 34 PID 2072 wrote to memory of 2936 2072 explorer.exe 34 PID 2072 wrote to memory of 2936 2072 explorer.exe 34 PID 2072 wrote to memory of 2936 2072 explorer.exe 34 PID 2432 wrote to memory of 2768 2432 svchost.exe 35 PID 2432 wrote to memory of 2768 2432 svchost.exe 35 PID 2432 wrote to memory of 2768 2432 svchost.exe 35 PID 2432 wrote to memory of 2768 2432 svchost.exe 35 PID 2432 wrote to memory of 2516 2432 svchost.exe 39 PID 2432 wrote to memory of 2516 2432 svchost.exe 39 PID 2432 wrote to memory of 2516 2432 svchost.exe 39 PID 2432 wrote to memory of 2516 2432 svchost.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\a04537c8928883ec8cf9f3ed9890b120N.exe"C:\Users\Admin\AppData\Local\Temp\a04537c8928883ec8cf9f3ed9890b120N.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2236 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2072 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2192 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2432 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2756
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 22:47 /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2768
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 22:48 /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2516
-
-
-
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe3⤵PID:2936
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Virtualization/Sandbox Evasion
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD53afbd12a6637abc40b83c7e841d362de
SHA1c4f40aced90bf7d6c69811de8ec7626862b6dd1e
SHA2568b83d10c5f25b59ed83fe30e926d750b3134aebf03f1c6d71c6ffc92c7397a2a
SHA512281c4e5b4e21123d5efb5d202c205c43f96271de99bdd8d09113a08f0f72cb6716a58dcacacc8de86dbea51e39a6a01c8b2276dba44be0f093ea5fcc716e8e10
-
Filesize
2.6MB
MD5027bf8e6e3782bca82d8377d0dc0c620
SHA108288826c51a13a2b5c2c239f4bc0efe9f9003ce
SHA256d7dd092e59cf4d98882cda6dd5974fa889fae8cfbb4d537d72f6ca5564bd40dd
SHA51256860cf2abe5b0621b1658a4081235e0c5ed863c944d92b66379c6bd4793c6b086f17e4ad6ab281d0df4079db5461759f85600e26c46f3a2a32d7fe1118f3a7f
-
Filesize
2.6MB
MD5457c78bf6c72f8e35491b97a964436b2
SHA1c84b76ac402f90171658013443e3f92b589b512d
SHA256aa589c1269327e6d824d8757694b2128a3d0d9b8142929954f91345d8b451728
SHA512eb90fdbba1d5d8cd3b5a97e2ce50afc1d8143cd1f028770bec8e2f0589fec0ac818eec16576f40a27674dab682f7af6ad70e150949f938ba9e7c1d537887c392