Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/10/2024, 04:06

General

  • Target

    d1322936eef9707b3aae7c71f2e5a81b0190710ba5ac4b7c3a845f2a7f4fafdc.exe

  • Size

    255KB

  • MD5

    d298e59c984f1814754b040cedc857a0

  • SHA1

    c6b5bf48d5ef8152e838927957ba215b0c5f223d

  • SHA256

    d1322936eef9707b3aae7c71f2e5a81b0190710ba5ac4b7c3a845f2a7f4fafdc

  • SHA512

    2dae71bc19d2a9f1c15639f9e96b3bcae6e832b08777591413622d1059e28225e13cfef07b28df6f9a4bdc8d45c81ef43fcf357248a6ee6073be896d72f13a0e

  • SSDEEP

    6144:zvEN2U+T6i5LirrllHy4HUcMQY6A7290/5:zENN+T5xYrllrU7QY6WB

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 8 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Executes dropped EXE 6 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d1322936eef9707b3aae7c71f2e5a81b0190710ba5ac4b7c3a845f2a7f4fafdc.exe
    "C:\Users\Admin\AppData\Local\Temp\d1322936eef9707b3aae7c71f2e5a81b0190710ba5ac4b7c3a845f2a7f4fafdc.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4912
    • \??\c:\users\admin\appdata\local\temp\d1322936eef9707b3aae7c71f2e5a81b0190710ba5ac4b7c3a845f2a7f4fafdc.exe 
      c:\users\admin\appdata\local\temp\d1322936eef9707b3aae7c71f2e5a81b0190710ba5ac4b7c3a845f2a7f4fafdc.exe 
      2⤵
      • Executes dropped EXE
      PID:396
    • C:\Users\Admin\AppData\Local\icsys.icn.exe
      C:\Users\Admin\AppData\Local\icsys.icn.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1980
      • \??\c:\windows\system\explorer.exe
        c:\windows\system\explorer.exe
        3⤵
        • Modifies WinLogon for persistence
        • Modifies visiblity of hidden/system files in Explorer
        • Boot or Logon Autostart Execution: Active Setup
        • Executes dropped EXE
        • Adds Run key to start application
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1952
        • \??\c:\windows\system\spoolsv.exe
          c:\windows\system\spoolsv.exe SE
          4⤵
          • Executes dropped EXE
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2068
          • \??\c:\windows\system\svchost.exe
            c:\windows\system\svchost.exe
            5⤵
            • Modifies WinLogon for persistence
            • Modifies visiblity of hidden/system files in Explorer
            • Boot or Logon Autostart Execution: Active Setup
            • Executes dropped EXE
            • Adds Run key to start application
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:100
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe PR
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of SetWindowsHookEx
              PID:3196
            • C:\Windows\SysWOW64\at.exe
              at 04:08 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
              6⤵
              • System Location Discovery: System Language Discovery
              PID:1276
            • C:\Windows\SysWOW64\at.exe
              at 04:09 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
              6⤵
              • System Location Discovery: System Language Discovery
              PID:4048
            • C:\Windows\SysWOW64\at.exe
              at 04:10 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
              6⤵
              • System Location Discovery: System Language Discovery
              PID:4564

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\d1322936eef9707b3aae7c71f2e5a81b0190710ba5ac4b7c3a845f2a7f4fafdc.exe 

    Filesize

    47KB

    MD5

    1192935bc75a50e8af4c6ea7ede378f4

    SHA1

    4398f671efcaa8b36451a7eb65c925a8c0e4fc93

    SHA256

    2c03c4f91ce923039be8c7756bd68668e7eb72341ff18b2daeabe4ce84787624

    SHA512

    95b49334cb12012c398484604bb64bcf8be82844cf74cb449f024868a817a9649f6075eab9d15232fae2606448184426ac8459f48eac7596339cf83b1fe317ce

  • C:\Users\Admin\AppData\Local\icsys.icn.exe

    Filesize

    207KB

    MD5

    b5a1254295268c1f39a08baa63300df0

    SHA1

    93f3961647b9a7d07d761467217f5f847a0f3619

    SHA256

    1f816824de8726b0be8f2de63562d6c8daa92204091677ec71f5917b3e7dd3f2

    SHA512

    e9a2ec81f948a477ff45038db88aab2ce86dfab0d153b89f938ec2cb4708b47bc256c03d98a1f72b2eb2456632dada0d096297d442e9d92d726ca76ca90278dc

  • C:\Users\Admin\AppData\Roaming\mrsys.exe

    Filesize

    206KB

    MD5

    895868485aa56fdaa82babbb6b74ebe2

    SHA1

    0d61525c800420099505691ec126f2540b00e48f

    SHA256

    09d6f8d84c4962f9d996ab587a43068140048d896fdb2c7252eff66faa81fda8

    SHA512

    aa06eb13fb8ccd16c5000b64e24271e825c61bcefdb3307faa891c0ea34fef664520997aae7972cfd22e8ced86919d38120763bbe13f384053bbf0283cf3763e

  • C:\Windows\System\explorer.exe

    Filesize

    206KB

    MD5

    7286209cf6cb5f9c1262c3550f242b7b

    SHA1

    f1056195ee47b59e7d33b03dee2921546e4a1f6e

    SHA256

    d6ac1dc677ac9d7e901038f2140f75215f40de3d556ec7d74088c696d8a9def2

    SHA512

    7abbf688d699f7da92a7877526426ca030fbad23f8ac9482c7784b42d1a95c10e2eee6a7fb082b4e5bd24d3e80e5cac68d261d297bd333f03e52cac306cd8950

  • C:\Windows\System\spoolsv.exe

    Filesize

    206KB

    MD5

    ae1d4a99b07d2708fe53ea3ada972741

    SHA1

    d70b547df3228a66d245a2d096be9944402ccdb7

    SHA256

    8202c8bfea2042aa33e9c416a696ff20672b0ff437fc06070fd00b153f34aea3

    SHA512

    fb79ddf1f16c8d3531b7a92a71094d58d50131d848e3ea645550ee0f5238e54f05d28ca285f70b8436ae77177cff41bdf795a10831ab4db4597e5834e6c80a9f

  • C:\Windows\System\svchost.exe

    Filesize

    206KB

    MD5

    0062dffa5ea01125fb312e609cca11ed

    SHA1

    fb26f0e6455cafc8b554144e12cd2eecc7d1ea78

    SHA256

    d29d969cb25d77a8def2adc7c81bf4900e518efabf1373a36e277b407c68112d

    SHA512

    763fd1200100a64325475c40c056bcd9a06c986c051551d901bd8700944b86197161e78604582b44decdebded604585429b038fd49873b16e66a851463721d67