Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04/10/2024, 16:20
Static task
static1
Behavioral task
behavioral1
Sample
279a14e5e63ce040d19cec6770552acfbca3987252ffc5c7b5f49509b16da859N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
279a14e5e63ce040d19cec6770552acfbca3987252ffc5c7b5f49509b16da859N.exe
Resource
win10v2004-20240802-en
General
-
Target
279a14e5e63ce040d19cec6770552acfbca3987252ffc5c7b5f49509b16da859N.exe
-
Size
3.9MB
-
MD5
8de58fa69187da447b5bb410475d4500
-
SHA1
8df0491973255a49fac9bdde06a93b3e4c8dddb4
-
SHA256
279a14e5e63ce040d19cec6770552acfbca3987252ffc5c7b5f49509b16da859
-
SHA512
e9cc1da5bd2d04f15ca55311ef5e5face7bdb772744caa47b483ec4e3bf1a4c13ce4cdecb931e5c9218ed40b9ae8b2350877b665d813746e00ed685ed63afd02
-
SSDEEP
98304:nNRBOBfKgQIm9EOTqw8vjh9Ac9nUNupK4hVvcF+yHrAr:NR/gmeOqv7Ac9F0kh
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 6 IoCs
pid Process 4176 279a14e5e63ce040d19cec6770552acfbca3987252ffc5c7b5f49509b16da859n.exe 2228 icsys.icn.exe 1512 explorer.exe 1688 spoolsv.exe 2568 svchost.exe 1876 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\themes\explorer.exe icsys.icn.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe File opened for modification C:\Windows\Resources\Themes\icsys.icn.exe 279a14e5e63ce040d19cec6770552acfbca3987252ffc5c7b5f49509b16da859N.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 279a14e5e63ce040d19cec6770552acfbca3987252ffc5c7b5f49509b16da859N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icsys.icn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 624 279a14e5e63ce040d19cec6770552acfbca3987252ffc5c7b5f49509b16da859N.exe 624 279a14e5e63ce040d19cec6770552acfbca3987252ffc5c7b5f49509b16da859N.exe 624 279a14e5e63ce040d19cec6770552acfbca3987252ffc5c7b5f49509b16da859N.exe 624 279a14e5e63ce040d19cec6770552acfbca3987252ffc5c7b5f49509b16da859N.exe 624 279a14e5e63ce040d19cec6770552acfbca3987252ffc5c7b5f49509b16da859N.exe 624 279a14e5e63ce040d19cec6770552acfbca3987252ffc5c7b5f49509b16da859N.exe 624 279a14e5e63ce040d19cec6770552acfbca3987252ffc5c7b5f49509b16da859N.exe 624 279a14e5e63ce040d19cec6770552acfbca3987252ffc5c7b5f49509b16da859N.exe 624 279a14e5e63ce040d19cec6770552acfbca3987252ffc5c7b5f49509b16da859N.exe 624 279a14e5e63ce040d19cec6770552acfbca3987252ffc5c7b5f49509b16da859N.exe 624 279a14e5e63ce040d19cec6770552acfbca3987252ffc5c7b5f49509b16da859N.exe 624 279a14e5e63ce040d19cec6770552acfbca3987252ffc5c7b5f49509b16da859N.exe 624 279a14e5e63ce040d19cec6770552acfbca3987252ffc5c7b5f49509b16da859N.exe 624 279a14e5e63ce040d19cec6770552acfbca3987252ffc5c7b5f49509b16da859N.exe 624 279a14e5e63ce040d19cec6770552acfbca3987252ffc5c7b5f49509b16da859N.exe 624 279a14e5e63ce040d19cec6770552acfbca3987252ffc5c7b5f49509b16da859N.exe 624 279a14e5e63ce040d19cec6770552acfbca3987252ffc5c7b5f49509b16da859N.exe 624 279a14e5e63ce040d19cec6770552acfbca3987252ffc5c7b5f49509b16da859N.exe 624 279a14e5e63ce040d19cec6770552acfbca3987252ffc5c7b5f49509b16da859N.exe 624 279a14e5e63ce040d19cec6770552acfbca3987252ffc5c7b5f49509b16da859N.exe 624 279a14e5e63ce040d19cec6770552acfbca3987252ffc5c7b5f49509b16da859N.exe 624 279a14e5e63ce040d19cec6770552acfbca3987252ffc5c7b5f49509b16da859N.exe 624 279a14e5e63ce040d19cec6770552acfbca3987252ffc5c7b5f49509b16da859N.exe 624 279a14e5e63ce040d19cec6770552acfbca3987252ffc5c7b5f49509b16da859N.exe 624 279a14e5e63ce040d19cec6770552acfbca3987252ffc5c7b5f49509b16da859N.exe 624 279a14e5e63ce040d19cec6770552acfbca3987252ffc5c7b5f49509b16da859N.exe 624 279a14e5e63ce040d19cec6770552acfbca3987252ffc5c7b5f49509b16da859N.exe 624 279a14e5e63ce040d19cec6770552acfbca3987252ffc5c7b5f49509b16da859N.exe 624 279a14e5e63ce040d19cec6770552acfbca3987252ffc5c7b5f49509b16da859N.exe 624 279a14e5e63ce040d19cec6770552acfbca3987252ffc5c7b5f49509b16da859N.exe 624 279a14e5e63ce040d19cec6770552acfbca3987252ffc5c7b5f49509b16da859N.exe 624 279a14e5e63ce040d19cec6770552acfbca3987252ffc5c7b5f49509b16da859N.exe 2228 icsys.icn.exe 2228 icsys.icn.exe 2228 icsys.icn.exe 2228 icsys.icn.exe 2228 icsys.icn.exe 2228 icsys.icn.exe 2228 icsys.icn.exe 2228 icsys.icn.exe 2228 icsys.icn.exe 2228 icsys.icn.exe 2228 icsys.icn.exe 2228 icsys.icn.exe 2228 icsys.icn.exe 2228 icsys.icn.exe 2228 icsys.icn.exe 2228 icsys.icn.exe 2228 icsys.icn.exe 2228 icsys.icn.exe 2228 icsys.icn.exe 2228 icsys.icn.exe 2228 icsys.icn.exe 2228 icsys.icn.exe 2228 icsys.icn.exe 2228 icsys.icn.exe 2228 icsys.icn.exe 2228 icsys.icn.exe 2228 icsys.icn.exe 2228 icsys.icn.exe 2228 icsys.icn.exe 2228 icsys.icn.exe 2228 icsys.icn.exe 2228 icsys.icn.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 1512 explorer.exe 2568 svchost.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 624 279a14e5e63ce040d19cec6770552acfbca3987252ffc5c7b5f49509b16da859N.exe 624 279a14e5e63ce040d19cec6770552acfbca3987252ffc5c7b5f49509b16da859N.exe 2228 icsys.icn.exe 2228 icsys.icn.exe 4176 279a14e5e63ce040d19cec6770552acfbca3987252ffc5c7b5f49509b16da859n.exe 4176 279a14e5e63ce040d19cec6770552acfbca3987252ffc5c7b5f49509b16da859n.exe 1512 explorer.exe 1512 explorer.exe 1688 spoolsv.exe 1688 spoolsv.exe 2568 svchost.exe 2568 svchost.exe 1876 spoolsv.exe 1876 spoolsv.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 624 wrote to memory of 4176 624 279a14e5e63ce040d19cec6770552acfbca3987252ffc5c7b5f49509b16da859N.exe 83 PID 624 wrote to memory of 4176 624 279a14e5e63ce040d19cec6770552acfbca3987252ffc5c7b5f49509b16da859N.exe 83 PID 624 wrote to memory of 2228 624 279a14e5e63ce040d19cec6770552acfbca3987252ffc5c7b5f49509b16da859N.exe 84 PID 624 wrote to memory of 2228 624 279a14e5e63ce040d19cec6770552acfbca3987252ffc5c7b5f49509b16da859N.exe 84 PID 624 wrote to memory of 2228 624 279a14e5e63ce040d19cec6770552acfbca3987252ffc5c7b5f49509b16da859N.exe 84 PID 2228 wrote to memory of 1512 2228 icsys.icn.exe 85 PID 2228 wrote to memory of 1512 2228 icsys.icn.exe 85 PID 2228 wrote to memory of 1512 2228 icsys.icn.exe 85 PID 1512 wrote to memory of 1688 1512 explorer.exe 86 PID 1512 wrote to memory of 1688 1512 explorer.exe 86 PID 1512 wrote to memory of 1688 1512 explorer.exe 86 PID 1688 wrote to memory of 2568 1688 spoolsv.exe 87 PID 1688 wrote to memory of 2568 1688 spoolsv.exe 87 PID 1688 wrote to memory of 2568 1688 spoolsv.exe 87 PID 2568 wrote to memory of 1876 2568 svchost.exe 88 PID 2568 wrote to memory of 1876 2568 svchost.exe 88 PID 2568 wrote to memory of 1876 2568 svchost.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\279a14e5e63ce040d19cec6770552acfbca3987252ffc5c7b5f49509b16da859N.exe"C:\Users\Admin\AppData\Local\Temp\279a14e5e63ce040d19cec6770552acfbca3987252ffc5c7b5f49509b16da859N.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:624 -
\??\c:\users\admin\appdata\local\temp\279a14e5e63ce040d19cec6770552acfbca3987252ffc5c7b5f49509b16da859n.exec:\users\admin\appdata\local\temp\279a14e5e63ce040d19cec6770552acfbca3987252ffc5c7b5f49509b16da859n.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4176
-
-
C:\Windows\Resources\Themes\icsys.icn.exeC:\Windows\Resources\Themes\icsys.icn.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2228 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe3⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1512 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE4⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1688 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe5⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2568 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1876
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\279a14e5e63ce040d19cec6770552acfbca3987252ffc5c7b5f49509b16da859n.exe
Filesize3.8MB
MD546c17c999744470b689331f41eab7df1
SHA1b8a63127df6a87d333061c622220d6d70ed80f7c
SHA256c5b5def1c8882b702b6b25cbd94461c737bc151366d2d9eba5006c04886bfc9a
SHA5124b02a3e85b699f62df1b4fe752c4dee08cfabc9b8bb316bc39b854bd5187fc602943a95788ec680c7d3dc2c26ad882e69c0740294bd6cb3b32cdcd165a9441b6
-
Filesize
135KB
MD5ea2908c8ae286f87602e40c4823d722f
SHA1a74238e5f8a57610cb0fee40e210007cc837219e
SHA25629a42487243906e61c01db731707f4a8379a0ef9ab3cbd79cbbda86dba6d0b7a
SHA5124fa284e8730ddcc8d936a3aa93b80b8a1495535fd20fd88b2b7f4517d2e3173871ef8f3da713f46cbba2df2aee51e1dbb1ac06bf73724a3feb19bdc41ba44834
-
Filesize
135KB
MD5b0b6e90c633bbef6e4cb975355a7ab27
SHA11ea35abc8b24d9bcecf4c2245c777bde13b83258
SHA2565a9daac4e8bb916a97f1447e2f601744af206b3e42b0da886aeb8a905b644912
SHA512129cfa5870c046bebcba053a854b76fb6092ca702e16883dd6172ab3e4ffb2a5f1954004c2743bd7cfd6426b7e982fd445d82185d1b05eacfb36f3bdac9b950a
-
Filesize
135KB
MD566a9b9c3d3df1a6192a844882b5f4f77
SHA1e9cab0f0b9eee1279c63b6ed1df5f7d1e4e68a08
SHA2568b0c370e9058bbb7a4c3cfede248991369b228f02b92eaa06ce21afa206f89df
SHA5128c420f0b9ccf4fe05f845bf5d220c4e5775fe7afff1311d32a86687fd980edd9736ec0fa5a7cdc31b586761a73ec5a707e4f42c12cd469962a28553df3da423c
-
Filesize
135KB
MD50369fc873e638d0e05fd9432dea9830c
SHA19ad143c39e5be3b725ba16525a3bdcf0939512b2
SHA25685cdc2c72104de38b61b3dd5d042a64784f75c2f15a1821902814cee1d9197cf
SHA5121a328eb25e06acedd5ccd4f56d24adb0d60521adf1ad4f60aefc494f7ca931f4057078413063491bec947c214e277be6680d5d6672c6265b8a4c5c3f6cf6b1f4