Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2024, 04:06
Static task
static1
Behavioral task
behavioral1
Sample
d1322936eef9707b3aae7c71f2e5a81b0190710ba5ac4b7c3a845f2a7f4fafdc.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d1322936eef9707b3aae7c71f2e5a81b0190710ba5ac4b7c3a845f2a7f4fafdc.exe
Resource
win10v2004-20241007-en
General
-
Target
d1322936eef9707b3aae7c71f2e5a81b0190710ba5ac4b7c3a845f2a7f4fafdc.exe
-
Size
255KB
-
MD5
d298e59c984f1814754b040cedc857a0
-
SHA1
c6b5bf48d5ef8152e838927957ba215b0c5f223d
-
SHA256
d1322936eef9707b3aae7c71f2e5a81b0190710ba5ac4b7c3a845f2a7f4fafdc
-
SHA512
2dae71bc19d2a9f1c15639f9e96b3bcae6e832b08777591413622d1059e28225e13cfef07b28df6f9a4bdc8d45c81ef43fcf357248a6ee6073be896d72f13a0e
-
SSDEEP
6144:zvEN2U+T6i5LirrllHy4HUcMQY6A7290/5:zENN+T5xYrllrU7QY6WB
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 8 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe -
Executes dropped EXE 6 IoCs
pid Process 396 d1322936eef9707b3aae7c71f2e5a81b0190710ba5ac4b7c3a845f2a7f4fafdc.exe 1980 icsys.icn.exe 1952 explorer.exe 2068 spoolsv.exe 100 svchost.exe 3196 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification \??\c:\windows\system\explorer.exe icsys.icn.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d1322936eef9707b3aae7c71f2e5a81b0190710ba5ac4b7c3a845f2a7f4fafdc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icsys.icn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1980 icsys.icn.exe 1980 icsys.icn.exe 1952 explorer.exe 1952 explorer.exe 1952 explorer.exe 1952 explorer.exe 1952 explorer.exe 1952 explorer.exe 100 svchost.exe 100 svchost.exe 100 svchost.exe 100 svchost.exe 1952 explorer.exe 1952 explorer.exe 100 svchost.exe 100 svchost.exe 1952 explorer.exe 1952 explorer.exe 100 svchost.exe 100 svchost.exe 1952 explorer.exe 1952 explorer.exe 100 svchost.exe 100 svchost.exe 1952 explorer.exe 1952 explorer.exe 100 svchost.exe 100 svchost.exe 1952 explorer.exe 1952 explorer.exe 1952 explorer.exe 100 svchost.exe 1952 explorer.exe 100 svchost.exe 1952 explorer.exe 100 svchost.exe 1952 explorer.exe 100 svchost.exe 1952 explorer.exe 100 svchost.exe 1952 explorer.exe 100 svchost.exe 1952 explorer.exe 100 svchost.exe 1952 explorer.exe 100 svchost.exe 1952 explorer.exe 100 svchost.exe 1952 explorer.exe 100 svchost.exe 1952 explorer.exe 100 svchost.exe 1952 explorer.exe 100 svchost.exe 1952 explorer.exe 100 svchost.exe 1952 explorer.exe 100 svchost.exe 1952 explorer.exe 100 svchost.exe 1952 explorer.exe 100 svchost.exe 1952 explorer.exe 100 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 1952 explorer.exe 100 svchost.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 4912 d1322936eef9707b3aae7c71f2e5a81b0190710ba5ac4b7c3a845f2a7f4fafdc.exe 4912 d1322936eef9707b3aae7c71f2e5a81b0190710ba5ac4b7c3a845f2a7f4fafdc.exe 1980 icsys.icn.exe 1980 icsys.icn.exe 1952 explorer.exe 1952 explorer.exe 2068 spoolsv.exe 2068 spoolsv.exe 100 svchost.exe 100 svchost.exe 3196 spoolsv.exe 3196 spoolsv.exe 1952 explorer.exe 1952 explorer.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 4912 wrote to memory of 396 4912 d1322936eef9707b3aae7c71f2e5a81b0190710ba5ac4b7c3a845f2a7f4fafdc.exe 86 PID 4912 wrote to memory of 396 4912 d1322936eef9707b3aae7c71f2e5a81b0190710ba5ac4b7c3a845f2a7f4fafdc.exe 86 PID 4912 wrote to memory of 1980 4912 d1322936eef9707b3aae7c71f2e5a81b0190710ba5ac4b7c3a845f2a7f4fafdc.exe 88 PID 4912 wrote to memory of 1980 4912 d1322936eef9707b3aae7c71f2e5a81b0190710ba5ac4b7c3a845f2a7f4fafdc.exe 88 PID 4912 wrote to memory of 1980 4912 d1322936eef9707b3aae7c71f2e5a81b0190710ba5ac4b7c3a845f2a7f4fafdc.exe 88 PID 1980 wrote to memory of 1952 1980 icsys.icn.exe 89 PID 1980 wrote to memory of 1952 1980 icsys.icn.exe 89 PID 1980 wrote to memory of 1952 1980 icsys.icn.exe 89 PID 1952 wrote to memory of 2068 1952 explorer.exe 90 PID 1952 wrote to memory of 2068 1952 explorer.exe 90 PID 1952 wrote to memory of 2068 1952 explorer.exe 90 PID 2068 wrote to memory of 100 2068 spoolsv.exe 91 PID 2068 wrote to memory of 100 2068 spoolsv.exe 91 PID 2068 wrote to memory of 100 2068 spoolsv.exe 91 PID 100 wrote to memory of 3196 100 svchost.exe 92 PID 100 wrote to memory of 3196 100 svchost.exe 92 PID 100 wrote to memory of 3196 100 svchost.exe 92 PID 100 wrote to memory of 1276 100 svchost.exe 93 PID 100 wrote to memory of 1276 100 svchost.exe 93 PID 100 wrote to memory of 1276 100 svchost.exe 93 PID 100 wrote to memory of 4048 100 svchost.exe 98 PID 100 wrote to memory of 4048 100 svchost.exe 98 PID 100 wrote to memory of 4048 100 svchost.exe 98 PID 100 wrote to memory of 4564 100 svchost.exe 100 PID 100 wrote to memory of 4564 100 svchost.exe 100 PID 100 wrote to memory of 4564 100 svchost.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\d1322936eef9707b3aae7c71f2e5a81b0190710ba5ac4b7c3a845f2a7f4fafdc.exe"C:\Users\Admin\AppData\Local\Temp\d1322936eef9707b3aae7c71f2e5a81b0190710ba5ac4b7c3a845f2a7f4fafdc.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4912 -
\??\c:\users\admin\appdata\local\temp\d1322936eef9707b3aae7c71f2e5a81b0190710ba5ac4b7c3a845f2a7f4fafdc.exec:\users\admin\appdata\local\temp\d1322936eef9707b3aae7c71f2e5a81b0190710ba5ac4b7c3a845f2a7f4fafdc.exe2⤵
- Executes dropped EXE
PID:396
-
-
C:\Users\Admin\AppData\Local\icsys.icn.exeC:\Users\Admin\AppData\Local\icsys.icn.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1980 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe3⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1952 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE4⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2068 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe5⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:100 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3196
-
-
C:\Windows\SysWOW64\at.exeat 04:08 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe6⤵
- System Location Discovery: System Language Discovery
PID:1276
-
-
C:\Windows\SysWOW64\at.exeat 04:09 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe6⤵
- System Location Discovery: System Language Discovery
PID:4048
-
-
C:\Windows\SysWOW64\at.exeat 04:10 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe6⤵
- System Location Discovery: System Language Discovery
PID:4564
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\d1322936eef9707b3aae7c71f2e5a81b0190710ba5ac4b7c3a845f2a7f4fafdc.exe
Filesize47KB
MD51192935bc75a50e8af4c6ea7ede378f4
SHA14398f671efcaa8b36451a7eb65c925a8c0e4fc93
SHA2562c03c4f91ce923039be8c7756bd68668e7eb72341ff18b2daeabe4ce84787624
SHA51295b49334cb12012c398484604bb64bcf8be82844cf74cb449f024868a817a9649f6075eab9d15232fae2606448184426ac8459f48eac7596339cf83b1fe317ce
-
Filesize
207KB
MD5b5a1254295268c1f39a08baa63300df0
SHA193f3961647b9a7d07d761467217f5f847a0f3619
SHA2561f816824de8726b0be8f2de63562d6c8daa92204091677ec71f5917b3e7dd3f2
SHA512e9a2ec81f948a477ff45038db88aab2ce86dfab0d153b89f938ec2cb4708b47bc256c03d98a1f72b2eb2456632dada0d096297d442e9d92d726ca76ca90278dc
-
Filesize
206KB
MD5895868485aa56fdaa82babbb6b74ebe2
SHA10d61525c800420099505691ec126f2540b00e48f
SHA25609d6f8d84c4962f9d996ab587a43068140048d896fdb2c7252eff66faa81fda8
SHA512aa06eb13fb8ccd16c5000b64e24271e825c61bcefdb3307faa891c0ea34fef664520997aae7972cfd22e8ced86919d38120763bbe13f384053bbf0283cf3763e
-
Filesize
206KB
MD57286209cf6cb5f9c1262c3550f242b7b
SHA1f1056195ee47b59e7d33b03dee2921546e4a1f6e
SHA256d6ac1dc677ac9d7e901038f2140f75215f40de3d556ec7d74088c696d8a9def2
SHA5127abbf688d699f7da92a7877526426ca030fbad23f8ac9482c7784b42d1a95c10e2eee6a7fb082b4e5bd24d3e80e5cac68d261d297bd333f03e52cac306cd8950
-
Filesize
206KB
MD5ae1d4a99b07d2708fe53ea3ada972741
SHA1d70b547df3228a66d245a2d096be9944402ccdb7
SHA2568202c8bfea2042aa33e9c416a696ff20672b0ff437fc06070fd00b153f34aea3
SHA512fb79ddf1f16c8d3531b7a92a71094d58d50131d848e3ea645550ee0f5238e54f05d28ca285f70b8436ae77177cff41bdf795a10831ab4db4597e5834e6c80a9f
-
Filesize
206KB
MD50062dffa5ea01125fb312e609cca11ed
SHA1fb26f0e6455cafc8b554144e12cd2eecc7d1ea78
SHA256d29d969cb25d77a8def2adc7c81bf4900e518efabf1373a36e277b407c68112d
SHA512763fd1200100a64325475c40c056bcd9a06c986c051551d901bd8700944b86197161e78604582b44decdebded604585429b038fd49873b16e66a851463721d67