Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/10/2024, 12:50

General

  • Target

    46154c0c670ecd7b9a9966fef17352e80366371a5c7240617b0c416ef18b4c49N.exe

  • Size

    1.7MB

  • MD5

    13b9675d1e67b8cc1c401038647535d0

  • SHA1

    b0d760d490932040490748ed641b245c90a0245a

  • SHA256

    46154c0c670ecd7b9a9966fef17352e80366371a5c7240617b0c416ef18b4c49

  • SHA512

    d2752cfe32df336a4602120b5b5b52d006137547a0aad4718ff85ff0c955946b8f88711bf61ee4d1841968927bfaa36e8428523c83f36297b334c518f0753167

  • SSDEEP

    49152:tnsExITYbNbNWo4kSH3OqtwI6V6dRPaRWLT:RsExIT4bNJFY3Oqt1d1eWLT

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 6 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 5 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\46154c0c670ecd7b9a9966fef17352e80366371a5c7240617b0c416ef18b4c49N.exe
    "C:\Users\Admin\AppData\Local\Temp\46154c0c670ecd7b9a9966fef17352e80366371a5c7240617b0c416ef18b4c49N.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1200
    • \??\c:\users\admin\appdata\local\temp\46154c0c670ecd7b9a9966fef17352e80366371a5c7240617b0c416ef18b4c49n.exe 
      c:\users\admin\appdata\local\temp\46154c0c670ecd7b9a9966fef17352e80366371a5c7240617b0c416ef18b4c49n.exe 
      2⤵
      • Executes dropped EXE
      • Enumerates system info in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1612
    • C:\Windows\Resources\Themes\icsys.icn.exe
      C:\Windows\Resources\Themes\icsys.icn.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:5000
      • \??\c:\windows\resources\themes\explorer.exe
        c:\windows\resources\themes\explorer.exe
        3⤵
        • Modifies visiblity of hidden/system files in Explorer
        • Executes dropped EXE
        • Adds Run key to start application
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4528
        • \??\c:\windows\resources\spoolsv.exe
          c:\windows\resources\spoolsv.exe SE
          4⤵
          • Executes dropped EXE
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2612
          • \??\c:\windows\resources\svchost.exe
            c:\windows\resources\svchost.exe
            5⤵
            • Modifies visiblity of hidden/system files in Explorer
            • Executes dropped EXE
            • Adds Run key to start application
            • Drops file in System32 directory
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:4396
            • \??\c:\windows\resources\spoolsv.exe
              c:\windows\resources\spoolsv.exe PR
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of SetWindowsHookEx
              PID:3624

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\46154c0c670ecd7b9a9966fef17352e80366371a5c7240617b0c416ef18b4c49n.exe 

    Filesize

    1.6MB

    MD5

    ed87e86892e7f39fb9911a5e8451bc12

    SHA1

    f2d3f0dbca4c0777de5819f0d96036cd90293020

    SHA256

    643eaebfd8a057e6e9cc88863d7e9430b932b06470ea7ba809e337c99c4c4890

    SHA512

    8fcd881b7d0b24bbf91a7ecc1de1bd3fd7020f4d933b79c0d423e6f0365660fb3a141a0de32db57fe322f36fdb64a2add29d578db396ddd708bdb6e094904fcf

  • C:\Windows\Resources\Themes\explorer.exe

    Filesize

    135KB

    MD5

    50de53fa2691e001e2e754d9c306c53a

    SHA1

    e810986c0a9c69fd8634ecc9dc0e54f2df00767d

    SHA256

    696e8d01aaa854c182fb69d209a4e65555e8fe83e6e528cce368c1fbc6089b79

    SHA512

    4771bc1f5b56eda12009e48352a9cd55d51eaf7bfa2f060cc156e01185c9685da441e9235e560e34fc0f20efd2f59cb12f53ce347b973869539a7e9fc83962b2

  • C:\Windows\Resources\Themes\icsys.icn.exe

    Filesize

    135KB

    MD5

    9ef8c8cef3be80b1fb5adc183dec4c43

    SHA1

    c34b76e1304a94c2dd591763718c7cf6ca8ede89

    SHA256

    d1a1ad3ee951b40257f1fc70c22d6c94efb20942e57f29dd4ab33fd8120de560

    SHA512

    3b8532f71be6e874cefde755b9d9c6a30baed56a8b58472704cff5205f8f5bd2f73c34eefa51ab678b8e52881baeb6c7b3982fdab4de4edd6849b67dfd9920b8

  • C:\Windows\Resources\spoolsv.exe

    Filesize

    135KB

    MD5

    4e1e8f3d92d69e565752dea6aee0602d

    SHA1

    b329e32d9a646d25195fc36a925c96555edb342e

    SHA256

    e2c668f2e92846b5bb7a28c1c9df788d6822b377addbbfebf1d95d9a68bd0991

    SHA512

    5d8592d0adfe49fbeee27b1292ab495ef6db51bcbbef852be3bb5aa9e2e17114a4121ff741e3e4f172b87995678173bc292d2efcff738c0d823971e87de0c871

  • C:\Windows\Resources\svchost.exe

    Filesize

    135KB

    MD5

    16c06bb384c861e1f39b0e7a75fbab70

    SHA1

    8332b74fba8800b27deccab613f39d6f05339470

    SHA256

    139a73d21716849b57dc441e065931d0624c68bce6fd39ff647fb7afb54563c9

    SHA512

    a62473c3aaa31ef0849b94acd8130780e495a34261a64217a296d421afbdbc5e1fecacf43443b0c4e32b02ea621376f4355560510b9d4ef2a9f9ae39295bf44c

  • memory/1200-52-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/1200-0-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/1612-10-0x0000024743180000-0x0000024743316000-memory.dmp

    Filesize

    1.6MB

  • memory/1612-11-0x000002475DDC0000-0x000002475DFD4000-memory.dmp

    Filesize

    2.1MB

  • memory/1612-12-0x00007FF91C9D0000-0x00007FF91D491000-memory.dmp

    Filesize

    10.8MB

  • memory/1612-9-0x00007FF91C9D3000-0x00007FF91C9D5000-memory.dmp

    Filesize

    8KB

  • memory/1612-53-0x00007FF91C9D3000-0x00007FF91C9D5000-memory.dmp

    Filesize

    8KB

  • memory/1612-54-0x00007FF91C9D0000-0x00007FF91D491000-memory.dmp

    Filesize

    10.8MB

  • memory/2612-50-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/3624-49-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/4396-43-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/4396-56-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/4528-55-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/5000-51-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/5000-16-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB