Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/09/2024, 22:35
Static task
static1
Behavioral task
behavioral1
Sample
425ea814266e56db14373c04e1ce1983c3f8ad035256abeee67ef9b79720b1c2N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
425ea814266e56db14373c04e1ce1983c3f8ad035256abeee67ef9b79720b1c2N.exe
Resource
win10v2004-20240802-en
General
-
Target
425ea814266e56db14373c04e1ce1983c3f8ad035256abeee67ef9b79720b1c2N.exe
-
Size
135KB
-
MD5
1d1f9cba30fd8c13eec0a1f9497e91c0
-
SHA1
bb4de32cbd157fcaab4889feebf3262eaf3e33e3
-
SHA256
425ea814266e56db14373c04e1ce1983c3f8ad035256abeee67ef9b79720b1c2
-
SHA512
db78913378a434c1c641e5724f44b615d5af0bcd1f34a92e7f5ed97aca75d3a839773badce5c84ee6b5c3604d80d91ce5622bf538c4ab62187bb811484d5be21
-
SSDEEP
1536:XfsEqouTRcG/Mzvgf7xEuvnXNTRdUzwTekUOisZ1yDDajtXbgcN:XVqoCl/YgjxEufVU0TbTyDDalXN
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 2044 explorer.exe 1352 spoolsv.exe 2520 svchost.exe 3856 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe File opened for modification \??\c:\windows\resources\themes\explorer.exe 425ea814266e56db14373c04e1ce1983c3f8ad035256abeee67ef9b79720b1c2N.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 425ea814266e56db14373c04e1ce1983c3f8ad035256abeee67ef9b79720b1c2N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3316 425ea814266e56db14373c04e1ce1983c3f8ad035256abeee67ef9b79720b1c2N.exe 3316 425ea814266e56db14373c04e1ce1983c3f8ad035256abeee67ef9b79720b1c2N.exe 3316 425ea814266e56db14373c04e1ce1983c3f8ad035256abeee67ef9b79720b1c2N.exe 3316 425ea814266e56db14373c04e1ce1983c3f8ad035256abeee67ef9b79720b1c2N.exe 3316 425ea814266e56db14373c04e1ce1983c3f8ad035256abeee67ef9b79720b1c2N.exe 3316 425ea814266e56db14373c04e1ce1983c3f8ad035256abeee67ef9b79720b1c2N.exe 3316 425ea814266e56db14373c04e1ce1983c3f8ad035256abeee67ef9b79720b1c2N.exe 3316 425ea814266e56db14373c04e1ce1983c3f8ad035256abeee67ef9b79720b1c2N.exe 3316 425ea814266e56db14373c04e1ce1983c3f8ad035256abeee67ef9b79720b1c2N.exe 3316 425ea814266e56db14373c04e1ce1983c3f8ad035256abeee67ef9b79720b1c2N.exe 3316 425ea814266e56db14373c04e1ce1983c3f8ad035256abeee67ef9b79720b1c2N.exe 3316 425ea814266e56db14373c04e1ce1983c3f8ad035256abeee67ef9b79720b1c2N.exe 3316 425ea814266e56db14373c04e1ce1983c3f8ad035256abeee67ef9b79720b1c2N.exe 3316 425ea814266e56db14373c04e1ce1983c3f8ad035256abeee67ef9b79720b1c2N.exe 3316 425ea814266e56db14373c04e1ce1983c3f8ad035256abeee67ef9b79720b1c2N.exe 3316 425ea814266e56db14373c04e1ce1983c3f8ad035256abeee67ef9b79720b1c2N.exe 3316 425ea814266e56db14373c04e1ce1983c3f8ad035256abeee67ef9b79720b1c2N.exe 3316 425ea814266e56db14373c04e1ce1983c3f8ad035256abeee67ef9b79720b1c2N.exe 3316 425ea814266e56db14373c04e1ce1983c3f8ad035256abeee67ef9b79720b1c2N.exe 3316 425ea814266e56db14373c04e1ce1983c3f8ad035256abeee67ef9b79720b1c2N.exe 3316 425ea814266e56db14373c04e1ce1983c3f8ad035256abeee67ef9b79720b1c2N.exe 3316 425ea814266e56db14373c04e1ce1983c3f8ad035256abeee67ef9b79720b1c2N.exe 3316 425ea814266e56db14373c04e1ce1983c3f8ad035256abeee67ef9b79720b1c2N.exe 3316 425ea814266e56db14373c04e1ce1983c3f8ad035256abeee67ef9b79720b1c2N.exe 3316 425ea814266e56db14373c04e1ce1983c3f8ad035256abeee67ef9b79720b1c2N.exe 3316 425ea814266e56db14373c04e1ce1983c3f8ad035256abeee67ef9b79720b1c2N.exe 3316 425ea814266e56db14373c04e1ce1983c3f8ad035256abeee67ef9b79720b1c2N.exe 3316 425ea814266e56db14373c04e1ce1983c3f8ad035256abeee67ef9b79720b1c2N.exe 3316 425ea814266e56db14373c04e1ce1983c3f8ad035256abeee67ef9b79720b1c2N.exe 3316 425ea814266e56db14373c04e1ce1983c3f8ad035256abeee67ef9b79720b1c2N.exe 3316 425ea814266e56db14373c04e1ce1983c3f8ad035256abeee67ef9b79720b1c2N.exe 3316 425ea814266e56db14373c04e1ce1983c3f8ad035256abeee67ef9b79720b1c2N.exe 3316 425ea814266e56db14373c04e1ce1983c3f8ad035256abeee67ef9b79720b1c2N.exe 3316 425ea814266e56db14373c04e1ce1983c3f8ad035256abeee67ef9b79720b1c2N.exe 2044 explorer.exe 2044 explorer.exe 2044 explorer.exe 2044 explorer.exe 2044 explorer.exe 2044 explorer.exe 2044 explorer.exe 2044 explorer.exe 2044 explorer.exe 2044 explorer.exe 2044 explorer.exe 2044 explorer.exe 2044 explorer.exe 2044 explorer.exe 2044 explorer.exe 2044 explorer.exe 2044 explorer.exe 2044 explorer.exe 2044 explorer.exe 2044 explorer.exe 2044 explorer.exe 2044 explorer.exe 2044 explorer.exe 2044 explorer.exe 2044 explorer.exe 2044 explorer.exe 2044 explorer.exe 2044 explorer.exe 2044 explorer.exe 2044 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2044 explorer.exe 2520 svchost.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 3316 425ea814266e56db14373c04e1ce1983c3f8ad035256abeee67ef9b79720b1c2N.exe 3316 425ea814266e56db14373c04e1ce1983c3f8ad035256abeee67ef9b79720b1c2N.exe 2044 explorer.exe 2044 explorer.exe 1352 spoolsv.exe 1352 spoolsv.exe 2520 svchost.exe 2520 svchost.exe 3856 spoolsv.exe 3856 spoolsv.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3316 wrote to memory of 2044 3316 425ea814266e56db14373c04e1ce1983c3f8ad035256abeee67ef9b79720b1c2N.exe 82 PID 3316 wrote to memory of 2044 3316 425ea814266e56db14373c04e1ce1983c3f8ad035256abeee67ef9b79720b1c2N.exe 82 PID 3316 wrote to memory of 2044 3316 425ea814266e56db14373c04e1ce1983c3f8ad035256abeee67ef9b79720b1c2N.exe 82 PID 2044 wrote to memory of 1352 2044 explorer.exe 83 PID 2044 wrote to memory of 1352 2044 explorer.exe 83 PID 2044 wrote to memory of 1352 2044 explorer.exe 83 PID 1352 wrote to memory of 2520 1352 spoolsv.exe 84 PID 1352 wrote to memory of 2520 1352 spoolsv.exe 84 PID 1352 wrote to memory of 2520 1352 spoolsv.exe 84 PID 2520 wrote to memory of 3856 2520 svchost.exe 85 PID 2520 wrote to memory of 3856 2520 svchost.exe 85 PID 2520 wrote to memory of 3856 2520 svchost.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\425ea814266e56db14373c04e1ce1983c3f8ad035256abeee67ef9b79720b1c2N.exe"C:\Users\Admin\AppData\Local\Temp\425ea814266e56db14373c04e1ce1983c3f8ad035256abeee67ef9b79720b1c2N.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3316 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2044 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1352 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2520 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3856
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135KB
MD5671f02474e978bff11a5ed811f6896b8
SHA153a1d8dc48e0fa2aaa0d476bc92114a0216c3909
SHA256dde4254aec5bfcecfe408a0c6287b7a011f483023b7fbfe01dca21f23cd8bc3b
SHA5124daa680a67d78ec2b1f30844c25effd7ba51143a538f217d91c3c2f45ec0e8b246d07ffc3f68f2763d2c58291bc237983c89d9a48bd14ab53ad015e8d32991f1
-
Filesize
135KB
MD55786515e7a4d27fd82ef722a72ecd75d
SHA1deaea412d697e1106a593c1907b96b3f59780db5
SHA25654ebb2e7f0721fc3cec9ce0d21234eb1f120592d920abd5ddbfacb8fc5e52294
SHA512c1ca90f5925a237e17870c6f64528b37a0ddd94bbefaaf9e5cc89e15b3e9b887881d76e304fd24a7e0796c50974110705f5ae43ac9080cfd2f9557dfb35bb5a8
-
Filesize
135KB
MD5b9b2347aae29dad3cd3413ef53f6ecd8
SHA17892afb50e43ed160addfc0089ed2909421f9256
SHA256da390469b89cf4bf76fb749b395679391b1cd66258bbe28c2f92e14558eebc93
SHA512bb4aea741bd41b4f894446d364774f85b52f951f5ae14a72c5ee020d66c0bc72ae83bba98371298c85a3a9318b0e834f7e938c0e7d75d161116dac85b4f0a465