Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/10/2024, 12:50
Static task
static1
Behavioral task
behavioral1
Sample
46154c0c670ecd7b9a9966fef17352e80366371a5c7240617b0c416ef18b4c49N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
46154c0c670ecd7b9a9966fef17352e80366371a5c7240617b0c416ef18b4c49N.exe
Resource
win10v2004-20241007-en
General
-
Target
46154c0c670ecd7b9a9966fef17352e80366371a5c7240617b0c416ef18b4c49N.exe
-
Size
1.7MB
-
MD5
13b9675d1e67b8cc1c401038647535d0
-
SHA1
b0d760d490932040490748ed641b245c90a0245a
-
SHA256
46154c0c670ecd7b9a9966fef17352e80366371a5c7240617b0c416ef18b4c49
-
SHA512
d2752cfe32df336a4602120b5b5b52d006137547a0aad4718ff85ff0c955946b8f88711bf61ee4d1841968927bfaa36e8428523c83f36297b334c518f0753167
-
SSDEEP
49152:tnsExITYbNbNWo4kSH3OqtwI6V6dRPaRWLT:RsExIT4bNJFY3Oqt1d1eWLT
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 6 IoCs
pid Process 1612 46154c0c670ecd7b9a9966fef17352e80366371a5c7240617b0c416ef18b4c49n.exe 5000 icsys.icn.exe 4528 explorer.exe 2612 spoolsv.exe 4396 svchost.exe 3624 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\Resources\Themes\icsys.icn.exe 46154c0c670ecd7b9a9966fef17352e80366371a5c7240617b0c416ef18b4c49N.exe File opened for modification \??\c:\windows\resources\themes\explorer.exe icsys.icn.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 46154c0c670ecd7b9a9966fef17352e80366371a5c7240617b0c416ef18b4c49N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icsys.icn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS 46154c0c670ecd7b9a9966fef17352e80366371a5c7240617b0c416ef18b4c49n.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer 46154c0c670ecd7b9a9966fef17352e80366371a5c7240617b0c416ef18b4c49n.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion 46154c0c670ecd7b9a9966fef17352e80366371a5c7240617b0c416ef18b4c49n.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1200 46154c0c670ecd7b9a9966fef17352e80366371a5c7240617b0c416ef18b4c49N.exe 1200 46154c0c670ecd7b9a9966fef17352e80366371a5c7240617b0c416ef18b4c49N.exe 1200 46154c0c670ecd7b9a9966fef17352e80366371a5c7240617b0c416ef18b4c49N.exe 1200 46154c0c670ecd7b9a9966fef17352e80366371a5c7240617b0c416ef18b4c49N.exe 1200 46154c0c670ecd7b9a9966fef17352e80366371a5c7240617b0c416ef18b4c49N.exe 1200 46154c0c670ecd7b9a9966fef17352e80366371a5c7240617b0c416ef18b4c49N.exe 1200 46154c0c670ecd7b9a9966fef17352e80366371a5c7240617b0c416ef18b4c49N.exe 1200 46154c0c670ecd7b9a9966fef17352e80366371a5c7240617b0c416ef18b4c49N.exe 1200 46154c0c670ecd7b9a9966fef17352e80366371a5c7240617b0c416ef18b4c49N.exe 1200 46154c0c670ecd7b9a9966fef17352e80366371a5c7240617b0c416ef18b4c49N.exe 1200 46154c0c670ecd7b9a9966fef17352e80366371a5c7240617b0c416ef18b4c49N.exe 1200 46154c0c670ecd7b9a9966fef17352e80366371a5c7240617b0c416ef18b4c49N.exe 1200 46154c0c670ecd7b9a9966fef17352e80366371a5c7240617b0c416ef18b4c49N.exe 1200 46154c0c670ecd7b9a9966fef17352e80366371a5c7240617b0c416ef18b4c49N.exe 1200 46154c0c670ecd7b9a9966fef17352e80366371a5c7240617b0c416ef18b4c49N.exe 1200 46154c0c670ecd7b9a9966fef17352e80366371a5c7240617b0c416ef18b4c49N.exe 1200 46154c0c670ecd7b9a9966fef17352e80366371a5c7240617b0c416ef18b4c49N.exe 1200 46154c0c670ecd7b9a9966fef17352e80366371a5c7240617b0c416ef18b4c49N.exe 1200 46154c0c670ecd7b9a9966fef17352e80366371a5c7240617b0c416ef18b4c49N.exe 1200 46154c0c670ecd7b9a9966fef17352e80366371a5c7240617b0c416ef18b4c49N.exe 1200 46154c0c670ecd7b9a9966fef17352e80366371a5c7240617b0c416ef18b4c49N.exe 1200 46154c0c670ecd7b9a9966fef17352e80366371a5c7240617b0c416ef18b4c49N.exe 1200 46154c0c670ecd7b9a9966fef17352e80366371a5c7240617b0c416ef18b4c49N.exe 1200 46154c0c670ecd7b9a9966fef17352e80366371a5c7240617b0c416ef18b4c49N.exe 1200 46154c0c670ecd7b9a9966fef17352e80366371a5c7240617b0c416ef18b4c49N.exe 1200 46154c0c670ecd7b9a9966fef17352e80366371a5c7240617b0c416ef18b4c49N.exe 1200 46154c0c670ecd7b9a9966fef17352e80366371a5c7240617b0c416ef18b4c49N.exe 1200 46154c0c670ecd7b9a9966fef17352e80366371a5c7240617b0c416ef18b4c49N.exe 1200 46154c0c670ecd7b9a9966fef17352e80366371a5c7240617b0c416ef18b4c49N.exe 1200 46154c0c670ecd7b9a9966fef17352e80366371a5c7240617b0c416ef18b4c49N.exe 1200 46154c0c670ecd7b9a9966fef17352e80366371a5c7240617b0c416ef18b4c49N.exe 1200 46154c0c670ecd7b9a9966fef17352e80366371a5c7240617b0c416ef18b4c49N.exe 1612 46154c0c670ecd7b9a9966fef17352e80366371a5c7240617b0c416ef18b4c49n.exe 5000 icsys.icn.exe 5000 icsys.icn.exe 5000 icsys.icn.exe 5000 icsys.icn.exe 5000 icsys.icn.exe 5000 icsys.icn.exe 5000 icsys.icn.exe 5000 icsys.icn.exe 5000 icsys.icn.exe 5000 icsys.icn.exe 5000 icsys.icn.exe 5000 icsys.icn.exe 5000 icsys.icn.exe 5000 icsys.icn.exe 5000 icsys.icn.exe 5000 icsys.icn.exe 5000 icsys.icn.exe 5000 icsys.icn.exe 5000 icsys.icn.exe 5000 icsys.icn.exe 5000 icsys.icn.exe 5000 icsys.icn.exe 5000 icsys.icn.exe 5000 icsys.icn.exe 5000 icsys.icn.exe 5000 icsys.icn.exe 5000 icsys.icn.exe 5000 icsys.icn.exe 5000 icsys.icn.exe 5000 icsys.icn.exe 5000 icsys.icn.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 4528 explorer.exe 4396 svchost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1612 46154c0c670ecd7b9a9966fef17352e80366371a5c7240617b0c416ef18b4c49n.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1200 46154c0c670ecd7b9a9966fef17352e80366371a5c7240617b0c416ef18b4c49N.exe 1200 46154c0c670ecd7b9a9966fef17352e80366371a5c7240617b0c416ef18b4c49N.exe 5000 icsys.icn.exe 5000 icsys.icn.exe 4528 explorer.exe 4528 explorer.exe 2612 spoolsv.exe 2612 spoolsv.exe 4396 svchost.exe 4396 svchost.exe 3624 spoolsv.exe 3624 spoolsv.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1200 wrote to memory of 1612 1200 46154c0c670ecd7b9a9966fef17352e80366371a5c7240617b0c416ef18b4c49N.exe 84 PID 1200 wrote to memory of 1612 1200 46154c0c670ecd7b9a9966fef17352e80366371a5c7240617b0c416ef18b4c49N.exe 84 PID 1200 wrote to memory of 5000 1200 46154c0c670ecd7b9a9966fef17352e80366371a5c7240617b0c416ef18b4c49N.exe 87 PID 1200 wrote to memory of 5000 1200 46154c0c670ecd7b9a9966fef17352e80366371a5c7240617b0c416ef18b4c49N.exe 87 PID 1200 wrote to memory of 5000 1200 46154c0c670ecd7b9a9966fef17352e80366371a5c7240617b0c416ef18b4c49N.exe 87 PID 5000 wrote to memory of 4528 5000 icsys.icn.exe 88 PID 5000 wrote to memory of 4528 5000 icsys.icn.exe 88 PID 5000 wrote to memory of 4528 5000 icsys.icn.exe 88 PID 4528 wrote to memory of 2612 4528 explorer.exe 89 PID 4528 wrote to memory of 2612 4528 explorer.exe 89 PID 4528 wrote to memory of 2612 4528 explorer.exe 89 PID 2612 wrote to memory of 4396 2612 spoolsv.exe 90 PID 2612 wrote to memory of 4396 2612 spoolsv.exe 90 PID 2612 wrote to memory of 4396 2612 spoolsv.exe 90 PID 4396 wrote to memory of 3624 4396 svchost.exe 91 PID 4396 wrote to memory of 3624 4396 svchost.exe 91 PID 4396 wrote to memory of 3624 4396 svchost.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\46154c0c670ecd7b9a9966fef17352e80366371a5c7240617b0c416ef18b4c49N.exe"C:\Users\Admin\AppData\Local\Temp\46154c0c670ecd7b9a9966fef17352e80366371a5c7240617b0c416ef18b4c49N.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1200 -
\??\c:\users\admin\appdata\local\temp\46154c0c670ecd7b9a9966fef17352e80366371a5c7240617b0c416ef18b4c49n.exec:\users\admin\appdata\local\temp\46154c0c670ecd7b9a9966fef17352e80366371a5c7240617b0c416ef18b4c49n.exe2⤵
- Executes dropped EXE
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1612
-
-
C:\Windows\Resources\Themes\icsys.icn.exeC:\Windows\Resources\Themes\icsys.icn.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5000 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe3⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4528 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE4⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2612 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe5⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4396 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3624
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\46154c0c670ecd7b9a9966fef17352e80366371a5c7240617b0c416ef18b4c49n.exe
Filesize1.6MB
MD5ed87e86892e7f39fb9911a5e8451bc12
SHA1f2d3f0dbca4c0777de5819f0d96036cd90293020
SHA256643eaebfd8a057e6e9cc88863d7e9430b932b06470ea7ba809e337c99c4c4890
SHA5128fcd881b7d0b24bbf91a7ecc1de1bd3fd7020f4d933b79c0d423e6f0365660fb3a141a0de32db57fe322f36fdb64a2add29d578db396ddd708bdb6e094904fcf
-
Filesize
135KB
MD550de53fa2691e001e2e754d9c306c53a
SHA1e810986c0a9c69fd8634ecc9dc0e54f2df00767d
SHA256696e8d01aaa854c182fb69d209a4e65555e8fe83e6e528cce368c1fbc6089b79
SHA5124771bc1f5b56eda12009e48352a9cd55d51eaf7bfa2f060cc156e01185c9685da441e9235e560e34fc0f20efd2f59cb12f53ce347b973869539a7e9fc83962b2
-
Filesize
135KB
MD59ef8c8cef3be80b1fb5adc183dec4c43
SHA1c34b76e1304a94c2dd591763718c7cf6ca8ede89
SHA256d1a1ad3ee951b40257f1fc70c22d6c94efb20942e57f29dd4ab33fd8120de560
SHA5123b8532f71be6e874cefde755b9d9c6a30baed56a8b58472704cff5205f8f5bd2f73c34eefa51ab678b8e52881baeb6c7b3982fdab4de4edd6849b67dfd9920b8
-
Filesize
135KB
MD54e1e8f3d92d69e565752dea6aee0602d
SHA1b329e32d9a646d25195fc36a925c96555edb342e
SHA256e2c668f2e92846b5bb7a28c1c9df788d6822b377addbbfebf1d95d9a68bd0991
SHA5125d8592d0adfe49fbeee27b1292ab495ef6db51bcbbef852be3bb5aa9e2e17114a4121ff741e3e4f172b87995678173bc292d2efcff738c0d823971e87de0c871
-
Filesize
135KB
MD516c06bb384c861e1f39b0e7a75fbab70
SHA18332b74fba8800b27deccab613f39d6f05339470
SHA256139a73d21716849b57dc441e065931d0624c68bce6fd39ff647fb7afb54563c9
SHA512a62473c3aaa31ef0849b94acd8130780e495a34261a64217a296d421afbdbc5e1fecacf43443b0c4e32b02ea621376f4355560510b9d4ef2a9f9ae39295bf44c