Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2024, 19:48
Behavioral task
behavioral1
Sample
test4.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
test4.exe
Resource
win10v2004-20241007-en
General
-
Target
test4.exe
-
Size
9.4MB
-
MD5
73d1cea4a5006924ed638debbaf499f2
-
SHA1
fe7460ba99fc162e5cdc86525593992645496ab5
-
SHA256
256d07c7196d58f02c9aeeb8f888d6d0f005c38a385fe54aea1c4192dd98fb07
-
SHA512
559520b507fb57873c499476c3e347d72ba869ce4d3ef3ae25609a19cb3c3776e761854a4837975832213910fabe8d55ee080737ae9f4d8d613318c5cdc29f94
-
SSDEEP
196608:dvfZZnCZww0CeVdEX4B5Afq/i7cXKP3ynEM1fe4clIkwiA4zOC3CRIOGhqw5Mz7:57CZwZ7EX6229q3bwi4RMqw5I
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
Executes dropped EXE 6 IoCs
pid Process 3928 test4.exe 412 icsys.icn.exe 2300 explorer.exe 3164 spoolsv.exe 4876 svchost.exe 1460 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe File opened for modification C:\Windows\Resources\Themes\icsys.icn.exe test4.exe File opened for modification \??\c:\windows\resources\themes\explorer.exe icsys.icn.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe -
Detects Pyinstaller 1 IoCs
resource yara_rule behavioral2/files/0x000b000000023b83-7.dat pyinstaller -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language test4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icsys.icn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 348 test4.exe 348 test4.exe 348 test4.exe 348 test4.exe 348 test4.exe 348 test4.exe 348 test4.exe 348 test4.exe 348 test4.exe 348 test4.exe 348 test4.exe 348 test4.exe 348 test4.exe 348 test4.exe 348 test4.exe 348 test4.exe 348 test4.exe 348 test4.exe 348 test4.exe 348 test4.exe 348 test4.exe 348 test4.exe 348 test4.exe 348 test4.exe 348 test4.exe 348 test4.exe 348 test4.exe 348 test4.exe 348 test4.exe 348 test4.exe 348 test4.exe 348 test4.exe 412 icsys.icn.exe 412 icsys.icn.exe 412 icsys.icn.exe 412 icsys.icn.exe 412 icsys.icn.exe 412 icsys.icn.exe 412 icsys.icn.exe 412 icsys.icn.exe 412 icsys.icn.exe 412 icsys.icn.exe 412 icsys.icn.exe 412 icsys.icn.exe 412 icsys.icn.exe 412 icsys.icn.exe 412 icsys.icn.exe 412 icsys.icn.exe 412 icsys.icn.exe 412 icsys.icn.exe 412 icsys.icn.exe 412 icsys.icn.exe 412 icsys.icn.exe 412 icsys.icn.exe 412 icsys.icn.exe 412 icsys.icn.exe 412 icsys.icn.exe 412 icsys.icn.exe 412 icsys.icn.exe 412 icsys.icn.exe 412 icsys.icn.exe 412 icsys.icn.exe 412 icsys.icn.exe 412 icsys.icn.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2300 explorer.exe 4876 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 348 test4.exe 348 test4.exe 412 icsys.icn.exe 412 icsys.icn.exe 2300 explorer.exe 2300 explorer.exe 3164 spoolsv.exe 3164 spoolsv.exe 4876 svchost.exe 4876 svchost.exe 1460 spoolsv.exe 1460 spoolsv.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 348 wrote to memory of 3928 348 test4.exe 85 PID 348 wrote to memory of 3928 348 test4.exe 85 PID 348 wrote to memory of 412 348 test4.exe 87 PID 348 wrote to memory of 412 348 test4.exe 87 PID 348 wrote to memory of 412 348 test4.exe 87 PID 412 wrote to memory of 2300 412 icsys.icn.exe 89 PID 412 wrote to memory of 2300 412 icsys.icn.exe 89 PID 412 wrote to memory of 2300 412 icsys.icn.exe 89 PID 2300 wrote to memory of 3164 2300 explorer.exe 90 PID 2300 wrote to memory of 3164 2300 explorer.exe 90 PID 2300 wrote to memory of 3164 2300 explorer.exe 90 PID 3164 wrote to memory of 4876 3164 spoolsv.exe 91 PID 3164 wrote to memory of 4876 3164 spoolsv.exe 91 PID 3164 wrote to memory of 4876 3164 spoolsv.exe 91 PID 4876 wrote to memory of 1460 4876 svchost.exe 92 PID 4876 wrote to memory of 1460 4876 svchost.exe 92 PID 4876 wrote to memory of 1460 4876 svchost.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\test4.exe"C:\Users\Admin\AppData\Local\Temp\test4.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:348 -
\??\c:\users\admin\appdata\local\temp\test4.exec:\users\admin\appdata\local\temp\test4.exe2⤵
- Executes dropped EXE
PID:3928
-
-
C:\Windows\Resources\Themes\icsys.icn.exeC:\Windows\Resources\Themes\icsys.icn.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:412 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe3⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2300 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE4⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3164 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe5⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4876 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1460
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9.2MB
MD5bcc2ec5df92b3311268bd77a08f6c595
SHA172e06d959800f33b2aa9f9903979de4e15f12f83
SHA256ef536b66c50cd2372d954dd790ef1a77bcac1632747d00cd425ae2272b44ce1c
SHA51284a6942d26a54e376168990429fa44f033e7f39182338a30498cd9289c65f341a7abfa2b6706abdb32ea1c6b2ca6cbb82bf260aec8eddd71522b6dc1e6a153d5
-
Filesize
135KB
MD57caa6e9484182ad353f46ffdf40d2169
SHA1129bf36e1adfe1e59d0481ab713ea06d8ae70059
SHA25621e9fed50ae0552a99db01785c7e9c98c1bc8cff8a0106a9bad1f42fc0d00475
SHA5120a7350de53d3cebb5c8a82d7311cb7382f134c11124de4094d1131194920fdc0b135b71207113523162ebf288252115dcf1598634c3297a70fb207b216bf7dd6
-
Filesize
135KB
MD51e83d7c36a39f91fd355694fbbf5d908
SHA1f914623c700649394a9a7b2b595401024257be91
SHA25677bb53794a7a5ef1a19f17efe75270f07c6309c0b0f7c3cc496eafc6895eebce
SHA512adca94f5c97fbf388fed36ebfb30c04442aa1d6c0cc9945ef65969c08a84f2c2c9fe9f4495c6fef081fbd037fc32749ffcb54428cc8811d9a7f164948e27c8cf
-
Filesize
135KB
MD5d139b21e7ecae936c63d37cf2e3e314d
SHA1f1f4e300b5a035cd48e08d88b775d3808ec55798
SHA256e92fa94363158ff02df7cc1908ab80fd8b90c60dc5303ad8e15379186166189f
SHA512df027944f8860f0251fdb86708e19e4bdc26b61d88d2bce5b21c6cab293cec084bc5a5269f6a6bf9458287db0431e5a6bc357c886675ff387fba18170521c5c0
-
Filesize
135KB
MD5701a3d47cb88781a2c6b8a8d1834f31e
SHA14f6ddd25b5beff12bd502b8afb438e95e97b625b
SHA2560b28d41d8f06af1c7baa453ae6a76bd3cbc534d362f30252f7693c2202973242
SHA512ce491d10e8c49d04e9773958f21ee77b25028f8726e07dabf2a79414aedf4a898143efcfaaf5b002b77f314cc2fcc7b9e165630b2eb8759fab173b7d92879ef3