Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
18/10/2024, 05:43
Static task
static1
Behavioral task
behavioral1
Sample
6449181764ab8b7abdd395d9c034f53adeb990080bb83b1a8cb90c36c21aed52N.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
6449181764ab8b7abdd395d9c034f53adeb990080bb83b1a8cb90c36c21aed52N.exe
Resource
win10v2004-20241007-en
General
-
Target
6449181764ab8b7abdd395d9c034f53adeb990080bb83b1a8cb90c36c21aed52N.exe
-
Size
135KB
-
MD5
9239e2832598e4ff002e71199f4bc4c0
-
SHA1
0b7295fc847ea4892946ad062d287e1f36fdfc32
-
SHA256
6449181764ab8b7abdd395d9c034f53adeb990080bb83b1a8cb90c36c21aed52
-
SHA512
a0e4f26bc76129b7ed315976137a2a31ae85e51950d02b28f316baf554b7aa5e723dbeccf0df1ba5d284ec24bb42c0f0929768a8a7a18b8c322e95462c8b2027
-
SSDEEP
1536:UfsEqouTRcG/Mzvgf7xEuvnXNTRdUzwTekUOisZ1yDDajtXbVZDqIH:UVqoCl/YgjxEufVU0TbTyDDalPDfH
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 1736 explorer.exe 2400 spoolsv.exe 848 svchost.exe 2068 spoolsv.exe -
Loads dropped DLL 4 IoCs
pid Process 2484 6449181764ab8b7abdd395d9c034f53adeb990080bb83b1a8cb90c36c21aed52N.exe 1736 explorer.exe 2400 spoolsv.exe 848 svchost.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\themes\explorer.exe 6449181764ab8b7abdd395d9c034f53adeb990080bb83b1a8cb90c36c21aed52N.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6449181764ab8b7abdd395d9c034f53adeb990080bb83b1a8cb90c36c21aed52N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3012 schtasks.exe 388 schtasks.exe 2940 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2484 6449181764ab8b7abdd395d9c034f53adeb990080bb83b1a8cb90c36c21aed52N.exe 2484 6449181764ab8b7abdd395d9c034f53adeb990080bb83b1a8cb90c36c21aed52N.exe 2484 6449181764ab8b7abdd395d9c034f53adeb990080bb83b1a8cb90c36c21aed52N.exe 2484 6449181764ab8b7abdd395d9c034f53adeb990080bb83b1a8cb90c36c21aed52N.exe 2484 6449181764ab8b7abdd395d9c034f53adeb990080bb83b1a8cb90c36c21aed52N.exe 2484 6449181764ab8b7abdd395d9c034f53adeb990080bb83b1a8cb90c36c21aed52N.exe 2484 6449181764ab8b7abdd395d9c034f53adeb990080bb83b1a8cb90c36c21aed52N.exe 2484 6449181764ab8b7abdd395d9c034f53adeb990080bb83b1a8cb90c36c21aed52N.exe 2484 6449181764ab8b7abdd395d9c034f53adeb990080bb83b1a8cb90c36c21aed52N.exe 2484 6449181764ab8b7abdd395d9c034f53adeb990080bb83b1a8cb90c36c21aed52N.exe 2484 6449181764ab8b7abdd395d9c034f53adeb990080bb83b1a8cb90c36c21aed52N.exe 2484 6449181764ab8b7abdd395d9c034f53adeb990080bb83b1a8cb90c36c21aed52N.exe 2484 6449181764ab8b7abdd395d9c034f53adeb990080bb83b1a8cb90c36c21aed52N.exe 2484 6449181764ab8b7abdd395d9c034f53adeb990080bb83b1a8cb90c36c21aed52N.exe 2484 6449181764ab8b7abdd395d9c034f53adeb990080bb83b1a8cb90c36c21aed52N.exe 2484 6449181764ab8b7abdd395d9c034f53adeb990080bb83b1a8cb90c36c21aed52N.exe 2484 6449181764ab8b7abdd395d9c034f53adeb990080bb83b1a8cb90c36c21aed52N.exe 1736 explorer.exe 1736 explorer.exe 1736 explorer.exe 1736 explorer.exe 1736 explorer.exe 1736 explorer.exe 1736 explorer.exe 1736 explorer.exe 1736 explorer.exe 1736 explorer.exe 1736 explorer.exe 1736 explorer.exe 1736 explorer.exe 1736 explorer.exe 1736 explorer.exe 1736 explorer.exe 848 svchost.exe 848 svchost.exe 848 svchost.exe 848 svchost.exe 848 svchost.exe 848 svchost.exe 848 svchost.exe 848 svchost.exe 848 svchost.exe 848 svchost.exe 848 svchost.exe 848 svchost.exe 848 svchost.exe 848 svchost.exe 848 svchost.exe 848 svchost.exe 1736 explorer.exe 1736 explorer.exe 1736 explorer.exe 848 svchost.exe 848 svchost.exe 1736 explorer.exe 848 svchost.exe 1736 explorer.exe 1736 explorer.exe 848 svchost.exe 1736 explorer.exe 848 svchost.exe 1736 explorer.exe 848 svchost.exe 1736 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 1736 explorer.exe 848 svchost.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 2484 6449181764ab8b7abdd395d9c034f53adeb990080bb83b1a8cb90c36c21aed52N.exe 2484 6449181764ab8b7abdd395d9c034f53adeb990080bb83b1a8cb90c36c21aed52N.exe 1736 explorer.exe 1736 explorer.exe 2400 spoolsv.exe 2400 spoolsv.exe 848 svchost.exe 848 svchost.exe 2068 spoolsv.exe 2068 spoolsv.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 2484 wrote to memory of 1736 2484 6449181764ab8b7abdd395d9c034f53adeb990080bb83b1a8cb90c36c21aed52N.exe 30 PID 2484 wrote to memory of 1736 2484 6449181764ab8b7abdd395d9c034f53adeb990080bb83b1a8cb90c36c21aed52N.exe 30 PID 2484 wrote to memory of 1736 2484 6449181764ab8b7abdd395d9c034f53adeb990080bb83b1a8cb90c36c21aed52N.exe 30 PID 2484 wrote to memory of 1736 2484 6449181764ab8b7abdd395d9c034f53adeb990080bb83b1a8cb90c36c21aed52N.exe 30 PID 1736 wrote to memory of 2400 1736 explorer.exe 31 PID 1736 wrote to memory of 2400 1736 explorer.exe 31 PID 1736 wrote to memory of 2400 1736 explorer.exe 31 PID 1736 wrote to memory of 2400 1736 explorer.exe 31 PID 2400 wrote to memory of 848 2400 spoolsv.exe 32 PID 2400 wrote to memory of 848 2400 spoolsv.exe 32 PID 2400 wrote to memory of 848 2400 spoolsv.exe 32 PID 2400 wrote to memory of 848 2400 spoolsv.exe 32 PID 848 wrote to memory of 2068 848 svchost.exe 33 PID 848 wrote to memory of 2068 848 svchost.exe 33 PID 848 wrote to memory of 2068 848 svchost.exe 33 PID 848 wrote to memory of 2068 848 svchost.exe 33 PID 1736 wrote to memory of 2972 1736 explorer.exe 34 PID 1736 wrote to memory of 2972 1736 explorer.exe 34 PID 1736 wrote to memory of 2972 1736 explorer.exe 34 PID 1736 wrote to memory of 2972 1736 explorer.exe 34 PID 848 wrote to memory of 2940 848 svchost.exe 35 PID 848 wrote to memory of 2940 848 svchost.exe 35 PID 848 wrote to memory of 2940 848 svchost.exe 35 PID 848 wrote to memory of 2940 848 svchost.exe 35 PID 848 wrote to memory of 3012 848 svchost.exe 39 PID 848 wrote to memory of 3012 848 svchost.exe 39 PID 848 wrote to memory of 3012 848 svchost.exe 39 PID 848 wrote to memory of 3012 848 svchost.exe 39 PID 848 wrote to memory of 388 848 svchost.exe 41 PID 848 wrote to memory of 388 848 svchost.exe 41 PID 848 wrote to memory of 388 848 svchost.exe 41 PID 848 wrote to memory of 388 848 svchost.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\6449181764ab8b7abdd395d9c034f53adeb990080bb83b1a8cb90c36c21aed52N.exe"C:\Users\Admin\AppData\Local\Temp\6449181764ab8b7abdd395d9c034f53adeb990080bb83b1a8cb90c36c21aed52N.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2484 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1736 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2400 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:848 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2068
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 05:45 /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2940
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 05:46 /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3012
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 05:47 /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:388
-
-
-
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe3⤵PID:2972
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135KB
MD56d27f2730360e76047c7115ec3f8e9e7
SHA13590dfad9394ad0372743debc44c9ed58fb266f4
SHA256805d7d98546ee4e5cff2bfc053ea2bfdf1ef8002f8831aaba7e42cd4dc3bfe29
SHA512d81944172622cecd12fd75cfeaedf5a8314a28fa04391a3f01d16aaa857c68c6450904cf0f457f37871c6e54a8e5b20be8df2f7e6e3d51651acfa16b71003900
-
Filesize
135KB
MD50fd25013c785fac606a47a4582b1e1de
SHA136a419f363cf85b3852828b95cd57bdba8a4d555
SHA25661860c10ef7e113a2766f7143aa6a6c2ccb1f5637815a3187f5012affa62b06e
SHA51249892c697a728f44b992c61f41de1310b26d5ddf95abd7a5dc54bec17748446d99ff5dcebe6edb476844da296aabfed755a844e4b1d1bc2e3df504b06c74dfca
-
Filesize
135KB
MD56c549bb967490fbfbbe823f1c0923312
SHA1efd0b007fb0838a231060ec90e9efc093458769f
SHA25660683a3c0542fb049616deecd809572a2514ae3ce07adae7e3c0f0f4ff636a36
SHA512745ca3412253437909926c7339bc91ee340499c57bede62e480d5176690624ad096ae957031b66c8cb1111d6c0ecd8f0933dda6cafc4d862cf93b49fa7b6f445