Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04/10/2024, 01:09
Static task
static1
Behavioral task
behavioral1
Sample
fb885d8facb11669cec4eab2f2293a420deab266a3981b5af75f7a594559df68N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fb885d8facb11669cec4eab2f2293a420deab266a3981b5af75f7a594559df68N.exe
Resource
win10v2004-20240802-en
General
-
Target
fb885d8facb11669cec4eab2f2293a420deab266a3981b5af75f7a594559df68N.exe
-
Size
135KB
-
MD5
7cfac3074c665252bdcf11d5f2d0fd20
-
SHA1
62c99a5ad322e77cf31d80a92809647bbcbd6203
-
SHA256
fb885d8facb11669cec4eab2f2293a420deab266a3981b5af75f7a594559df68
-
SHA512
7abf066a55c4c7ce99ce1369fa905eff9dd9d2063e396a2984d85f5e47b68e6174b46b6d4e2fb8dd9ce7e7469c742f10e7307fd4dfc45a182a0ddea591a081cf
-
SSDEEP
1536:UfsEqouTRcG/Mzvgf7xEuvnXNTRdUzwTekUOisZ1yDDajtXbVVKa:UVqoCl/YgjxEufVU0TbTyDDalLKa
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 4324 explorer.exe 1760 spoolsv.exe 960 svchost.exe 1016 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\themes\explorer.exe fb885d8facb11669cec4eab2f2293a420deab266a3981b5af75f7a594559df68N.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fb885d8facb11669cec4eab2f2293a420deab266a3981b5af75f7a594559df68N.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3536 fb885d8facb11669cec4eab2f2293a420deab266a3981b5af75f7a594559df68N.exe 3536 fb885d8facb11669cec4eab2f2293a420deab266a3981b5af75f7a594559df68N.exe 3536 fb885d8facb11669cec4eab2f2293a420deab266a3981b5af75f7a594559df68N.exe 3536 fb885d8facb11669cec4eab2f2293a420deab266a3981b5af75f7a594559df68N.exe 3536 fb885d8facb11669cec4eab2f2293a420deab266a3981b5af75f7a594559df68N.exe 3536 fb885d8facb11669cec4eab2f2293a420deab266a3981b5af75f7a594559df68N.exe 3536 fb885d8facb11669cec4eab2f2293a420deab266a3981b5af75f7a594559df68N.exe 3536 fb885d8facb11669cec4eab2f2293a420deab266a3981b5af75f7a594559df68N.exe 3536 fb885d8facb11669cec4eab2f2293a420deab266a3981b5af75f7a594559df68N.exe 3536 fb885d8facb11669cec4eab2f2293a420deab266a3981b5af75f7a594559df68N.exe 3536 fb885d8facb11669cec4eab2f2293a420deab266a3981b5af75f7a594559df68N.exe 3536 fb885d8facb11669cec4eab2f2293a420deab266a3981b5af75f7a594559df68N.exe 3536 fb885d8facb11669cec4eab2f2293a420deab266a3981b5af75f7a594559df68N.exe 3536 fb885d8facb11669cec4eab2f2293a420deab266a3981b5af75f7a594559df68N.exe 3536 fb885d8facb11669cec4eab2f2293a420deab266a3981b5af75f7a594559df68N.exe 3536 fb885d8facb11669cec4eab2f2293a420deab266a3981b5af75f7a594559df68N.exe 3536 fb885d8facb11669cec4eab2f2293a420deab266a3981b5af75f7a594559df68N.exe 3536 fb885d8facb11669cec4eab2f2293a420deab266a3981b5af75f7a594559df68N.exe 3536 fb885d8facb11669cec4eab2f2293a420deab266a3981b5af75f7a594559df68N.exe 3536 fb885d8facb11669cec4eab2f2293a420deab266a3981b5af75f7a594559df68N.exe 3536 fb885d8facb11669cec4eab2f2293a420deab266a3981b5af75f7a594559df68N.exe 3536 fb885d8facb11669cec4eab2f2293a420deab266a3981b5af75f7a594559df68N.exe 3536 fb885d8facb11669cec4eab2f2293a420deab266a3981b5af75f7a594559df68N.exe 3536 fb885d8facb11669cec4eab2f2293a420deab266a3981b5af75f7a594559df68N.exe 3536 fb885d8facb11669cec4eab2f2293a420deab266a3981b5af75f7a594559df68N.exe 3536 fb885d8facb11669cec4eab2f2293a420deab266a3981b5af75f7a594559df68N.exe 3536 fb885d8facb11669cec4eab2f2293a420deab266a3981b5af75f7a594559df68N.exe 3536 fb885d8facb11669cec4eab2f2293a420deab266a3981b5af75f7a594559df68N.exe 3536 fb885d8facb11669cec4eab2f2293a420deab266a3981b5af75f7a594559df68N.exe 3536 fb885d8facb11669cec4eab2f2293a420deab266a3981b5af75f7a594559df68N.exe 3536 fb885d8facb11669cec4eab2f2293a420deab266a3981b5af75f7a594559df68N.exe 3536 fb885d8facb11669cec4eab2f2293a420deab266a3981b5af75f7a594559df68N.exe 3536 fb885d8facb11669cec4eab2f2293a420deab266a3981b5af75f7a594559df68N.exe 3536 fb885d8facb11669cec4eab2f2293a420deab266a3981b5af75f7a594559df68N.exe 4324 explorer.exe 4324 explorer.exe 4324 explorer.exe 4324 explorer.exe 4324 explorer.exe 4324 explorer.exe 4324 explorer.exe 4324 explorer.exe 4324 explorer.exe 4324 explorer.exe 4324 explorer.exe 4324 explorer.exe 4324 explorer.exe 4324 explorer.exe 4324 explorer.exe 4324 explorer.exe 4324 explorer.exe 4324 explorer.exe 4324 explorer.exe 4324 explorer.exe 4324 explorer.exe 4324 explorer.exe 4324 explorer.exe 4324 explorer.exe 4324 explorer.exe 4324 explorer.exe 4324 explorer.exe 4324 explorer.exe 4324 explorer.exe 4324 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 4324 explorer.exe 960 svchost.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 3536 fb885d8facb11669cec4eab2f2293a420deab266a3981b5af75f7a594559df68N.exe 3536 fb885d8facb11669cec4eab2f2293a420deab266a3981b5af75f7a594559df68N.exe 4324 explorer.exe 4324 explorer.exe 1760 spoolsv.exe 1760 spoolsv.exe 960 svchost.exe 960 svchost.exe 1016 spoolsv.exe 1016 spoolsv.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3536 wrote to memory of 4324 3536 fb885d8facb11669cec4eab2f2293a420deab266a3981b5af75f7a594559df68N.exe 82 PID 3536 wrote to memory of 4324 3536 fb885d8facb11669cec4eab2f2293a420deab266a3981b5af75f7a594559df68N.exe 82 PID 3536 wrote to memory of 4324 3536 fb885d8facb11669cec4eab2f2293a420deab266a3981b5af75f7a594559df68N.exe 82 PID 4324 wrote to memory of 1760 4324 explorer.exe 83 PID 4324 wrote to memory of 1760 4324 explorer.exe 83 PID 4324 wrote to memory of 1760 4324 explorer.exe 83 PID 1760 wrote to memory of 960 1760 spoolsv.exe 84 PID 1760 wrote to memory of 960 1760 spoolsv.exe 84 PID 1760 wrote to memory of 960 1760 spoolsv.exe 84 PID 960 wrote to memory of 1016 960 svchost.exe 85 PID 960 wrote to memory of 1016 960 svchost.exe 85 PID 960 wrote to memory of 1016 960 svchost.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\fb885d8facb11669cec4eab2f2293a420deab266a3981b5af75f7a594559df68N.exe"C:\Users\Admin\AppData\Local\Temp\fb885d8facb11669cec4eab2f2293a420deab266a3981b5af75f7a594559df68N.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3536 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4324 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1760 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:960 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1016
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135KB
MD5d24eb394a60428d6d866819727d68517
SHA128d3fae8f807f53416a868941131ac7eb5b5ffdd
SHA256c182d4e30238962921adcb320d43c440e902fcaab55eb318516a778125b7740d
SHA51273f571c89831f2c2f82eda71810f0eaac0eed8d73fb50bee8769efe82f95d8b730df6727501ad653cb138dd5df2493da9fd0bf647264f536068600df9f9d31df
-
Filesize
135KB
MD57a03088437c2018228421d5f22872f14
SHA11bf7aaf3324f3f7a72cf8a817533858686b599af
SHA256fabea995c1e5d451ce6705d8661298d694e7c24ae70f71351e52181260661497
SHA512a7e85fdbc0958e85d48b6ac977dd2940306287a54d2512f6120a837a2fbbfa1952a734184113f2d37e6ea04c9898314b87875b2b13e56fb3c60eb0e4a9ff238b
-
Filesize
135KB
MD5a66d08be085682650c872ce5615cf8df
SHA18081d4c4b9e2306f844aa53d3503de8565dcac77
SHA25672ce0fd7a6a832581d147ff39e935b4575c230417c43278c23869bb77f57da3e
SHA512828f41648c37a7b98d9349724ca22daee2e4a7ea6ab790d8552a1a580e00f4f13d561ce52ed28be4339655205efcc60927360362ea65ebb72648e5a0984d9007