Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/10/2024, 19:48
Behavioral task
behavioral1
Sample
test4.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
test4.exe
Resource
win10v2004-20241007-en
General
-
Target
test4.exe
-
Size
9.4MB
-
MD5
73d1cea4a5006924ed638debbaf499f2
-
SHA1
fe7460ba99fc162e5cdc86525593992645496ab5
-
SHA256
256d07c7196d58f02c9aeeb8f888d6d0f005c38a385fe54aea1c4192dd98fb07
-
SHA512
559520b507fb57873c499476c3e347d72ba869ce4d3ef3ae25609a19cb3c3776e761854a4837975832213910fabe8d55ee080737ae9f4d8d613318c5cdc29f94
-
SSDEEP
196608:dvfZZnCZww0CeVdEX4B5Afq/i7cXKP3ynEM1fe4clIkwiA4zOC3CRIOGhqw5Mz7:57CZwZ7EX6229q3bwi4RMqw5I
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
Executes dropped EXE 6 IoCs
pid Process 2980 test4.exe 644 icsys.icn.exe 2004 explorer.exe 2788 spoolsv.exe 2700 svchost.exe 2704 spoolsv.exe -
Loads dropped DLL 7 IoCs
pid Process 2312 test4.exe 2312 test4.exe 2300 Process not Found 644 icsys.icn.exe 2004 explorer.exe 2788 spoolsv.exe 2700 svchost.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe File opened for modification C:\Windows\Resources\Themes\icsys.icn.exe test4.exe File opened for modification \??\c:\windows\resources\themes\explorer.exe icsys.icn.exe -
Detects Pyinstaller 1 IoCs
resource yara_rule behavioral1/files/0x0007000000016aa9-6.dat pyinstaller -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language test4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icsys.icn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2680 schtasks.exe 1084 schtasks.exe 1380 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2312 test4.exe 2312 test4.exe 2312 test4.exe 2312 test4.exe 2312 test4.exe 2312 test4.exe 2312 test4.exe 2312 test4.exe 2312 test4.exe 2312 test4.exe 2312 test4.exe 2312 test4.exe 2312 test4.exe 2312 test4.exe 2312 test4.exe 2312 test4.exe 644 icsys.icn.exe 644 icsys.icn.exe 644 icsys.icn.exe 644 icsys.icn.exe 644 icsys.icn.exe 644 icsys.icn.exe 644 icsys.icn.exe 644 icsys.icn.exe 644 icsys.icn.exe 644 icsys.icn.exe 644 icsys.icn.exe 644 icsys.icn.exe 644 icsys.icn.exe 644 icsys.icn.exe 644 icsys.icn.exe 644 icsys.icn.exe 644 icsys.icn.exe 2004 explorer.exe 2004 explorer.exe 2004 explorer.exe 2004 explorer.exe 2004 explorer.exe 2004 explorer.exe 2004 explorer.exe 2004 explorer.exe 2004 explorer.exe 2004 explorer.exe 2004 explorer.exe 2004 explorer.exe 2004 explorer.exe 2004 explorer.exe 2004 explorer.exe 2004 explorer.exe 2700 svchost.exe 2700 svchost.exe 2700 svchost.exe 2700 svchost.exe 2700 svchost.exe 2700 svchost.exe 2700 svchost.exe 2700 svchost.exe 2700 svchost.exe 2700 svchost.exe 2700 svchost.exe 2700 svchost.exe 2700 svchost.exe 2700 svchost.exe 2700 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2700 svchost.exe 2004 explorer.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2312 test4.exe 2312 test4.exe 644 icsys.icn.exe 644 icsys.icn.exe 2004 explorer.exe 2004 explorer.exe 2788 spoolsv.exe 2788 spoolsv.exe 2700 svchost.exe 2700 svchost.exe 2704 spoolsv.exe 2704 spoolsv.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 2312 wrote to memory of 2980 2312 test4.exe 31 PID 2312 wrote to memory of 2980 2312 test4.exe 31 PID 2312 wrote to memory of 2980 2312 test4.exe 31 PID 2312 wrote to memory of 2980 2312 test4.exe 31 PID 2312 wrote to memory of 644 2312 test4.exe 32 PID 2312 wrote to memory of 644 2312 test4.exe 32 PID 2312 wrote to memory of 644 2312 test4.exe 32 PID 2312 wrote to memory of 644 2312 test4.exe 32 PID 644 wrote to memory of 2004 644 icsys.icn.exe 34 PID 644 wrote to memory of 2004 644 icsys.icn.exe 34 PID 644 wrote to memory of 2004 644 icsys.icn.exe 34 PID 644 wrote to memory of 2004 644 icsys.icn.exe 34 PID 2004 wrote to memory of 2788 2004 explorer.exe 35 PID 2004 wrote to memory of 2788 2004 explorer.exe 35 PID 2004 wrote to memory of 2788 2004 explorer.exe 35 PID 2004 wrote to memory of 2788 2004 explorer.exe 35 PID 2788 wrote to memory of 2700 2788 spoolsv.exe 36 PID 2788 wrote to memory of 2700 2788 spoolsv.exe 36 PID 2788 wrote to memory of 2700 2788 spoolsv.exe 36 PID 2788 wrote to memory of 2700 2788 spoolsv.exe 36 PID 2700 wrote to memory of 2704 2700 svchost.exe 37 PID 2700 wrote to memory of 2704 2700 svchost.exe 37 PID 2700 wrote to memory of 2704 2700 svchost.exe 37 PID 2700 wrote to memory of 2704 2700 svchost.exe 37 PID 2004 wrote to memory of 2904 2004 explorer.exe 38 PID 2004 wrote to memory of 2904 2004 explorer.exe 38 PID 2004 wrote to memory of 2904 2004 explorer.exe 38 PID 2004 wrote to memory of 2904 2004 explorer.exe 38 PID 2700 wrote to memory of 2680 2700 svchost.exe 39 PID 2700 wrote to memory of 2680 2700 svchost.exe 39 PID 2700 wrote to memory of 2680 2700 svchost.exe 39 PID 2700 wrote to memory of 2680 2700 svchost.exe 39 PID 2700 wrote to memory of 1084 2700 svchost.exe 42 PID 2700 wrote to memory of 1084 2700 svchost.exe 42 PID 2700 wrote to memory of 1084 2700 svchost.exe 42 PID 2700 wrote to memory of 1084 2700 svchost.exe 42 PID 2700 wrote to memory of 1380 2700 svchost.exe 45 PID 2700 wrote to memory of 1380 2700 svchost.exe 45 PID 2700 wrote to memory of 1380 2700 svchost.exe 45 PID 2700 wrote to memory of 1380 2700 svchost.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\test4.exe"C:\Users\Admin\AppData\Local\Temp\test4.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2312 -
\??\c:\users\admin\appdata\local\temp\test4.exec:\users\admin\appdata\local\temp\test4.exe2⤵
- Executes dropped EXE
PID:2980
-
-
C:\Windows\Resources\Themes\icsys.icn.exeC:\Windows\Resources\Themes\icsys.icn.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:644 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe3⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2004 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2788 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe5⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2700 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2704
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 19:50 /f6⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2680
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 19:51 /f6⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1084
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 19:52 /f6⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1380
-
-
-
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe4⤵PID:2904
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135KB
MD5b6e235f6253da610d4bd753b9143f7ed
SHA1c11e2230bdd73969648984db565703b657661765
SHA256a4e940bf3c9d5a30322b007819cfe587bd62e13625ea3334804471a8a8d023bc
SHA512a3b6ad66e439311939d85c134ec8eca280cd843ccca2a1a9c19a8046576ca4d19226ea9f58cc962963260825eb7635d84be8b565a962ba1ecb0d862f657d63b3
-
Filesize
135KB
MD51e83d7c36a39f91fd355694fbbf5d908
SHA1f914623c700649394a9a7b2b595401024257be91
SHA25677bb53794a7a5ef1a19f17efe75270f07c6309c0b0f7c3cc496eafc6895eebce
SHA512adca94f5c97fbf388fed36ebfb30c04442aa1d6c0cc9945ef65969c08a84f2c2c9fe9f4495c6fef081fbd037fc32749ffcb54428cc8811d9a7f164948e27c8cf
-
Filesize
135KB
MD57ae2c5ac8ac20d7f84f92a499a543238
SHA100dbe0fefaa5242f0cdb11a0b2a34651a2a04e99
SHA256e9003a67c1271fbdc93a0a4ce72b4f21172935fa02b6b089d073c1e9cea9e1e4
SHA512aa9278aa36373f59e58b273a5086dbe5a3d1574fe0a8541bce0bf0f903a7964e3be5768b2aede9238eba464b88efc283acdf9eb0db076d4b5e939df042e2c7bf
-
Filesize
9.2MB
MD5bcc2ec5df92b3311268bd77a08f6c595
SHA172e06d959800f33b2aa9f9903979de4e15f12f83
SHA256ef536b66c50cd2372d954dd790ef1a77bcac1632747d00cd425ae2272b44ce1c
SHA51284a6942d26a54e376168990429fa44f033e7f39182338a30498cd9289c65f341a7abfa2b6706abdb32ea1c6b2ca6cbb82bf260aec8eddd71522b6dc1e6a153d5
-
Filesize
135KB
MD51a7879df3d5347ac7ef9d923ce7a69a0
SHA15c47c65b753e9977dc6c2beff3945932591fb2ad
SHA2566ffc0e6879a724c8d3689078d127880274dda95e48706d3eb09d15be8db9241a
SHA5123f194b03629a4c61aea8c6b745e547ce08a13ca1e94a7212f232c11acb198ec79393065f397a364a38302849c7da59cec1a50c52b18b5f7b648d86da47171367