Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
29/09/2024, 21:12
Static task
static1
Behavioral task
behavioral1
Sample
4f8ec5a23c3029ef37b05a416cf63a6c276c6ea82db3050fe31f0dd27f007e22.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
4f8ec5a23c3029ef37b05a416cf63a6c276c6ea82db3050fe31f0dd27f007e22.exe
Resource
win10v2004-20240802-en
General
-
Target
4f8ec5a23c3029ef37b05a416cf63a6c276c6ea82db3050fe31f0dd27f007e22.exe
-
Size
135KB
-
MD5
30e98fd7c6bba9e873e05819a13bfa4e
-
SHA1
e491f8cfe171f0d73e5a0f7506eaa8e150f812be
-
SHA256
4f8ec5a23c3029ef37b05a416cf63a6c276c6ea82db3050fe31f0dd27f007e22
-
SHA512
d85f191149c027ab57ff2b0f55b587cc7f28b7aadf3c6c08cfb45753c046997b5fa7a2f87723b4c008ca0e52985a38ee143d8a9d2cc650d62ebd6de29e2ea914
-
SSDEEP
1536:4fsEqouTRcG/Mzvgf7xEuvnXNTRdUzwTekUOisZ1yDDajtXbVArBZ:4VqoCl/YgjxEufVU0TbTyDDalGZ
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 2448 explorer.exe 2320 spoolsv.exe 2828 svchost.exe 2776 spoolsv.exe -
Loads dropped DLL 4 IoCs
pid Process 2324 4f8ec5a23c3029ef37b05a416cf63a6c276c6ea82db3050fe31f0dd27f007e22.exe 2448 explorer.exe 2320 spoolsv.exe 2828 svchost.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\themes\explorer.exe 4f8ec5a23c3029ef37b05a416cf63a6c276c6ea82db3050fe31f0dd27f007e22.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4f8ec5a23c3029ef37b05a416cf63a6c276c6ea82db3050fe31f0dd27f007e22.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2640 schtasks.exe 2332 schtasks.exe 1036 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2324 4f8ec5a23c3029ef37b05a416cf63a6c276c6ea82db3050fe31f0dd27f007e22.exe 2324 4f8ec5a23c3029ef37b05a416cf63a6c276c6ea82db3050fe31f0dd27f007e22.exe 2324 4f8ec5a23c3029ef37b05a416cf63a6c276c6ea82db3050fe31f0dd27f007e22.exe 2324 4f8ec5a23c3029ef37b05a416cf63a6c276c6ea82db3050fe31f0dd27f007e22.exe 2324 4f8ec5a23c3029ef37b05a416cf63a6c276c6ea82db3050fe31f0dd27f007e22.exe 2324 4f8ec5a23c3029ef37b05a416cf63a6c276c6ea82db3050fe31f0dd27f007e22.exe 2324 4f8ec5a23c3029ef37b05a416cf63a6c276c6ea82db3050fe31f0dd27f007e22.exe 2324 4f8ec5a23c3029ef37b05a416cf63a6c276c6ea82db3050fe31f0dd27f007e22.exe 2324 4f8ec5a23c3029ef37b05a416cf63a6c276c6ea82db3050fe31f0dd27f007e22.exe 2324 4f8ec5a23c3029ef37b05a416cf63a6c276c6ea82db3050fe31f0dd27f007e22.exe 2324 4f8ec5a23c3029ef37b05a416cf63a6c276c6ea82db3050fe31f0dd27f007e22.exe 2324 4f8ec5a23c3029ef37b05a416cf63a6c276c6ea82db3050fe31f0dd27f007e22.exe 2324 4f8ec5a23c3029ef37b05a416cf63a6c276c6ea82db3050fe31f0dd27f007e22.exe 2324 4f8ec5a23c3029ef37b05a416cf63a6c276c6ea82db3050fe31f0dd27f007e22.exe 2324 4f8ec5a23c3029ef37b05a416cf63a6c276c6ea82db3050fe31f0dd27f007e22.exe 2324 4f8ec5a23c3029ef37b05a416cf63a6c276c6ea82db3050fe31f0dd27f007e22.exe 2324 4f8ec5a23c3029ef37b05a416cf63a6c276c6ea82db3050fe31f0dd27f007e22.exe 2448 explorer.exe 2448 explorer.exe 2448 explorer.exe 2448 explorer.exe 2448 explorer.exe 2448 explorer.exe 2448 explorer.exe 2448 explorer.exe 2448 explorer.exe 2448 explorer.exe 2448 explorer.exe 2448 explorer.exe 2448 explorer.exe 2448 explorer.exe 2448 explorer.exe 2448 explorer.exe 2828 svchost.exe 2828 svchost.exe 2828 svchost.exe 2828 svchost.exe 2828 svchost.exe 2828 svchost.exe 2828 svchost.exe 2828 svchost.exe 2828 svchost.exe 2828 svchost.exe 2828 svchost.exe 2828 svchost.exe 2828 svchost.exe 2828 svchost.exe 2828 svchost.exe 2828 svchost.exe 2448 explorer.exe 2448 explorer.exe 2448 explorer.exe 2828 svchost.exe 2828 svchost.exe 2448 explorer.exe 2828 svchost.exe 2448 explorer.exe 2828 svchost.exe 2448 explorer.exe 2828 svchost.exe 2448 explorer.exe 2828 svchost.exe 2448 explorer.exe 2828 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2448 explorer.exe 2828 svchost.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 2324 4f8ec5a23c3029ef37b05a416cf63a6c276c6ea82db3050fe31f0dd27f007e22.exe 2324 4f8ec5a23c3029ef37b05a416cf63a6c276c6ea82db3050fe31f0dd27f007e22.exe 2448 explorer.exe 2448 explorer.exe 2320 spoolsv.exe 2320 spoolsv.exe 2828 svchost.exe 2828 svchost.exe 2776 spoolsv.exe 2776 spoolsv.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 2324 wrote to memory of 2448 2324 4f8ec5a23c3029ef37b05a416cf63a6c276c6ea82db3050fe31f0dd27f007e22.exe 29 PID 2324 wrote to memory of 2448 2324 4f8ec5a23c3029ef37b05a416cf63a6c276c6ea82db3050fe31f0dd27f007e22.exe 29 PID 2324 wrote to memory of 2448 2324 4f8ec5a23c3029ef37b05a416cf63a6c276c6ea82db3050fe31f0dd27f007e22.exe 29 PID 2324 wrote to memory of 2448 2324 4f8ec5a23c3029ef37b05a416cf63a6c276c6ea82db3050fe31f0dd27f007e22.exe 29 PID 2448 wrote to memory of 2320 2448 explorer.exe 30 PID 2448 wrote to memory of 2320 2448 explorer.exe 30 PID 2448 wrote to memory of 2320 2448 explorer.exe 30 PID 2448 wrote to memory of 2320 2448 explorer.exe 30 PID 2320 wrote to memory of 2828 2320 spoolsv.exe 31 PID 2320 wrote to memory of 2828 2320 spoolsv.exe 31 PID 2320 wrote to memory of 2828 2320 spoolsv.exe 31 PID 2320 wrote to memory of 2828 2320 spoolsv.exe 31 PID 2828 wrote to memory of 2776 2828 svchost.exe 32 PID 2828 wrote to memory of 2776 2828 svchost.exe 32 PID 2828 wrote to memory of 2776 2828 svchost.exe 32 PID 2828 wrote to memory of 2776 2828 svchost.exe 32 PID 2448 wrote to memory of 2928 2448 explorer.exe 33 PID 2448 wrote to memory of 2928 2448 explorer.exe 33 PID 2448 wrote to memory of 2928 2448 explorer.exe 33 PID 2448 wrote to memory of 2928 2448 explorer.exe 33 PID 2828 wrote to memory of 2640 2828 svchost.exe 34 PID 2828 wrote to memory of 2640 2828 svchost.exe 34 PID 2828 wrote to memory of 2640 2828 svchost.exe 34 PID 2828 wrote to memory of 2640 2828 svchost.exe 34 PID 2828 wrote to memory of 2332 2828 svchost.exe 37 PID 2828 wrote to memory of 2332 2828 svchost.exe 37 PID 2828 wrote to memory of 2332 2828 svchost.exe 37 PID 2828 wrote to memory of 2332 2828 svchost.exe 37 PID 2828 wrote to memory of 1036 2828 svchost.exe 39 PID 2828 wrote to memory of 1036 2828 svchost.exe 39 PID 2828 wrote to memory of 1036 2828 svchost.exe 39 PID 2828 wrote to memory of 1036 2828 svchost.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\4f8ec5a23c3029ef37b05a416cf63a6c276c6ea82db3050fe31f0dd27f007e22.exe"C:\Users\Admin\AppData\Local\Temp\4f8ec5a23c3029ef37b05a416cf63a6c276c6ea82db3050fe31f0dd27f007e22.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2324 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2448 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2320 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2828 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2776
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 21:14 /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2640
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 21:15 /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2332
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 21:16 /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1036
-
-
-
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe3⤵PID:2928
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135KB
MD5352ef92ade300f928364f824ba98155f
SHA1aaf22a91a915dbbd2337aa7fc211e2c00d2de250
SHA256c1af4c18e5dbb1f54f8bdfa963c5d9c8a096bf36e909e5bb836e52faf9c628ad
SHA512899aea41b6f3b7bd43ee0aacd5501be3e56ec828b35b378227f949a3bf10506b0a1cdd64b16b6b5e0b6ae7c84d754f87e2606f6483ede3fd02573d3926580615
-
Filesize
135KB
MD578f6c43a883fa67c49f047cb4c2cc0ff
SHA156c7122fecfa06e6ddf9d9edae1b6b8c5cd0e562
SHA25621cc2b98ed42fba63b04e51e2cce93d227428fa5219cea060bc25d0cea5e946e
SHA51224beb0576d72cb7c7846cc9a2e8657f254062795e9c5eabc6ea2e0e4ce8f1554bda8f96e7361b52a2f5419b2b357de997ce6aa20fce061c2aea82d90e10b2ec6
-
Filesize
135KB
MD546ae053808120518394098ef3a02fa67
SHA122a92ff85f0f181ab627ea2c46892831aa218b78
SHA2561d4fb25559ff2f9aa310fae33562591aa8c09dfc3ac0755c674017020064ca55
SHA51205e6126114ffe60be38707d8c775ec3bfc81638bb9bc802f62477efa7d989eb65b86eedd96939e846030df686e2f9ba0fec65c51cf5879ebe5448f03a1a66770