Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12/09/2024, 22:45
Behavioral task
behavioral1
Sample
a04537c8928883ec8cf9f3ed9890b120N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a04537c8928883ec8cf9f3ed9890b120N.exe
Resource
win10v2004-20240802-en
General
-
Target
a04537c8928883ec8cf9f3ed9890b120N.exe
-
Size
2.6MB
-
MD5
a04537c8928883ec8cf9f3ed9890b120
-
SHA1
8081424a63548f6c4e489b0bdd6f62010363b4e8
-
SHA256
12d27fc722e34327a41d5da56a159fb2998e7cc679efe3143a4cae04162bb02b
-
SHA512
f04b128681fa279cc3334c8203f52c953c995265876d0652d42d1e452611b43f8109bb66b3d3ef703f6a7e7b87461bd11e1f6b708e3f432c1694c9ed7ae568fa
-
SSDEEP
49152:WXzhpDtKSK1cb8PGK+Tfuqmpc3elWo8GnQAsYZEVA:WXzhW148Pd+Tf1mpcOldJQ3/VA
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorer.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ spoolsv.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ spoolsv.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a04537c8928883ec8cf9f3ed9890b120N.exe -
Checks BIOS information in registry 2 TTPs 10 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion spoolsv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion spoolsv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion spoolsv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a04537c8928883ec8cf9f3ed9890b120N.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a04537c8928883ec8cf9f3ed9890b120N.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion spoolsv.exe -
Executes dropped EXE 4 IoCs
pid Process 1520 explorer.exe 4928 spoolsv.exe 216 svchost.exe 4624 spoolsv.exe -
resource yara_rule behavioral2/memory/3532-0-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral2/files/0x0009000000023470-8.dat themida behavioral2/memory/1520-10-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral2/files/0x0008000000023475-15.dat themida behavioral2/memory/4928-19-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral2/files/0x0008000000023477-26.dat themida behavioral2/memory/216-28-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral2/memory/4624-33-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral2/memory/4624-38-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral2/memory/4928-40-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral2/memory/3532-42-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral2/memory/1520-43-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral2/memory/216-44-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral2/memory/1520-45-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral2/memory/1520-53-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral2/memory/216-54-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral2/memory/1520-57-0x0000000000400000-0x0000000000A16000-memory.dmp themida -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA spoolsv.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA a04537c8928883ec8cf9f3ed9890b120N.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA explorer.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA spoolsv.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 3532 a04537c8928883ec8cf9f3ed9890b120N.exe 1520 explorer.exe 4928 spoolsv.exe 216 svchost.exe 4624 spoolsv.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\themes\explorer.exe a04537c8928883ec8cf9f3ed9890b120N.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a04537c8928883ec8cf9f3ed9890b120N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3532 a04537c8928883ec8cf9f3ed9890b120N.exe 3532 a04537c8928883ec8cf9f3ed9890b120N.exe 3532 a04537c8928883ec8cf9f3ed9890b120N.exe 3532 a04537c8928883ec8cf9f3ed9890b120N.exe 3532 a04537c8928883ec8cf9f3ed9890b120N.exe 3532 a04537c8928883ec8cf9f3ed9890b120N.exe 3532 a04537c8928883ec8cf9f3ed9890b120N.exe 3532 a04537c8928883ec8cf9f3ed9890b120N.exe 3532 a04537c8928883ec8cf9f3ed9890b120N.exe 3532 a04537c8928883ec8cf9f3ed9890b120N.exe 3532 a04537c8928883ec8cf9f3ed9890b120N.exe 3532 a04537c8928883ec8cf9f3ed9890b120N.exe 3532 a04537c8928883ec8cf9f3ed9890b120N.exe 3532 a04537c8928883ec8cf9f3ed9890b120N.exe 3532 a04537c8928883ec8cf9f3ed9890b120N.exe 3532 a04537c8928883ec8cf9f3ed9890b120N.exe 3532 a04537c8928883ec8cf9f3ed9890b120N.exe 3532 a04537c8928883ec8cf9f3ed9890b120N.exe 3532 a04537c8928883ec8cf9f3ed9890b120N.exe 3532 a04537c8928883ec8cf9f3ed9890b120N.exe 3532 a04537c8928883ec8cf9f3ed9890b120N.exe 3532 a04537c8928883ec8cf9f3ed9890b120N.exe 3532 a04537c8928883ec8cf9f3ed9890b120N.exe 3532 a04537c8928883ec8cf9f3ed9890b120N.exe 3532 a04537c8928883ec8cf9f3ed9890b120N.exe 3532 a04537c8928883ec8cf9f3ed9890b120N.exe 3532 a04537c8928883ec8cf9f3ed9890b120N.exe 3532 a04537c8928883ec8cf9f3ed9890b120N.exe 3532 a04537c8928883ec8cf9f3ed9890b120N.exe 3532 a04537c8928883ec8cf9f3ed9890b120N.exe 3532 a04537c8928883ec8cf9f3ed9890b120N.exe 3532 a04537c8928883ec8cf9f3ed9890b120N.exe 3532 a04537c8928883ec8cf9f3ed9890b120N.exe 3532 a04537c8928883ec8cf9f3ed9890b120N.exe 1520 explorer.exe 1520 explorer.exe 1520 explorer.exe 1520 explorer.exe 1520 explorer.exe 1520 explorer.exe 1520 explorer.exe 1520 explorer.exe 1520 explorer.exe 1520 explorer.exe 1520 explorer.exe 1520 explorer.exe 1520 explorer.exe 1520 explorer.exe 1520 explorer.exe 1520 explorer.exe 1520 explorer.exe 1520 explorer.exe 1520 explorer.exe 1520 explorer.exe 1520 explorer.exe 1520 explorer.exe 1520 explorer.exe 1520 explorer.exe 1520 explorer.exe 1520 explorer.exe 1520 explorer.exe 1520 explorer.exe 1520 explorer.exe 1520 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 1520 explorer.exe 216 svchost.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 3532 a04537c8928883ec8cf9f3ed9890b120N.exe 3532 a04537c8928883ec8cf9f3ed9890b120N.exe 1520 explorer.exe 1520 explorer.exe 4928 spoolsv.exe 4928 spoolsv.exe 216 svchost.exe 216 svchost.exe 4624 spoolsv.exe 4624 spoolsv.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3532 wrote to memory of 1520 3532 a04537c8928883ec8cf9f3ed9890b120N.exe 87 PID 3532 wrote to memory of 1520 3532 a04537c8928883ec8cf9f3ed9890b120N.exe 87 PID 3532 wrote to memory of 1520 3532 a04537c8928883ec8cf9f3ed9890b120N.exe 87 PID 1520 wrote to memory of 4928 1520 explorer.exe 88 PID 1520 wrote to memory of 4928 1520 explorer.exe 88 PID 1520 wrote to memory of 4928 1520 explorer.exe 88 PID 4928 wrote to memory of 216 4928 spoolsv.exe 90 PID 4928 wrote to memory of 216 4928 spoolsv.exe 90 PID 4928 wrote to memory of 216 4928 spoolsv.exe 90 PID 216 wrote to memory of 4624 216 svchost.exe 91 PID 216 wrote to memory of 4624 216 svchost.exe 91 PID 216 wrote to memory of 4624 216 svchost.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\a04537c8928883ec8cf9f3ed9890b120N.exe"C:\Users\Admin\AppData\Local\Temp\a04537c8928883ec8cf9f3ed9890b120N.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3532 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1520 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4928 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:216 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4624
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Virtualization/Sandbox Evasion
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD5e21333bdddf5f93412432aef4834537a
SHA1b64257f1a75dc45d0255bd1485930c8815c23f4e
SHA25615aa7e1f9236b4ae23b4f8f920e32d3a728f499e548848f66033173472b60c52
SHA51223980ee3907f162c8db3f5cd8490732618e312622c446275a40c625116fb07a806affa3afe12cf31b3fba86cba43a4b0ff5df0b393b36821673f8f685a573be1
-
Filesize
2.6MB
MD58351b4ea443a2e3cc7e421536876a16d
SHA126b920b0e0dc13da9293bfd5078ae69a2abbc6df
SHA256ab1d5cf0ccb3a090ad0e88852952539acece33cc49a854019311ba9981612f59
SHA5121765c7bebfc204e610bc4573c64eea3f59008e8625829126e07265d6362259af0c6fec983f09ccf885f3f7ca12f9c3efa54ccbb03167c362ea286f83d6a4b880
-
Filesize
2.6MB
MD53d698eb6fd87e8c71520f24e34322a76
SHA183be08d3a3fba251ba4042891516f607a7f86f75
SHA256286e63953b5ea8da509ab51adbdebf9cd5a3d603b3b0ad21cb4a7129b9ede903
SHA512e609e7cb94ade89983d23e87bc1cf88ee3576890fef7b5c28529ee2362da300927fba12ffa614774093514f4f11aae1981f705d1ff88216c944eb1278ecbc52c