Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    18/10/2024, 05:43

General

  • Target

    6449181764ab8b7abdd395d9c034f53adeb990080bb83b1a8cb90c36c21aed52N.exe

  • Size

    135KB

  • MD5

    9239e2832598e4ff002e71199f4bc4c0

  • SHA1

    0b7295fc847ea4892946ad062d287e1f36fdfc32

  • SHA256

    6449181764ab8b7abdd395d9c034f53adeb990080bb83b1a8cb90c36c21aed52

  • SHA512

    a0e4f26bc76129b7ed315976137a2a31ae85e51950d02b28f316baf554b7aa5e723dbeccf0df1ba5d284ec24bb42c0f0929768a8a7a18b8c322e95462c8b2027

  • SSDEEP

    1536:UfsEqouTRcG/Mzvgf7xEuvnXNTRdUzwTekUOisZ1yDDajtXbVZDqIH:UVqoCl/YgjxEufVU0TbTyDDalPDfH

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6449181764ab8b7abdd395d9c034f53adeb990080bb83b1a8cb90c36c21aed52N.exe
    "C:\Users\Admin\AppData\Local\Temp\6449181764ab8b7abdd395d9c034f53adeb990080bb83b1a8cb90c36c21aed52N.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2484
    • \??\c:\windows\resources\themes\explorer.exe
      c:\windows\resources\themes\explorer.exe
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1736
      • \??\c:\windows\resources\spoolsv.exe
        c:\windows\resources\spoolsv.exe SE
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2400
        • \??\c:\windows\resources\svchost.exe
          c:\windows\resources\svchost.exe
          4⤵
          • Modifies visiblity of hidden/system files in Explorer
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:848
          • \??\c:\windows\resources\spoolsv.exe
            c:\windows\resources\spoolsv.exe PR
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            PID:2068
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 05:45 /f
            5⤵
            • System Location Discovery: System Language Discovery
            • Scheduled Task/Job: Scheduled Task
            PID:2940
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 05:46 /f
            5⤵
            • System Location Discovery: System Language Discovery
            • Scheduled Task/Job: Scheduled Task
            PID:3012
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 05:47 /f
            5⤵
            • System Location Discovery: System Language Discovery
            • Scheduled Task/Job: Scheduled Task
            PID:388
      • C:\Windows\Explorer.exe
        C:\Windows\Explorer.exe
        3⤵
          PID:2972

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\Resources\spoolsv.exe

      Filesize

      135KB

      MD5

      6d27f2730360e76047c7115ec3f8e9e7

      SHA1

      3590dfad9394ad0372743debc44c9ed58fb266f4

      SHA256

      805d7d98546ee4e5cff2bfc053ea2bfdf1ef8002f8831aaba7e42cd4dc3bfe29

      SHA512

      d81944172622cecd12fd75cfeaedf5a8314a28fa04391a3f01d16aaa857c68c6450904cf0f457f37871c6e54a8e5b20be8df2f7e6e3d51651acfa16b71003900

    • \Windows\Resources\Themes\explorer.exe

      Filesize

      135KB

      MD5

      0fd25013c785fac606a47a4582b1e1de

      SHA1

      36a419f363cf85b3852828b95cd57bdba8a4d555

      SHA256

      61860c10ef7e113a2766f7143aa6a6c2ccb1f5637815a3187f5012affa62b06e

      SHA512

      49892c697a728f44b992c61f41de1310b26d5ddf95abd7a5dc54bec17748446d99ff5dcebe6edb476844da296aabfed755a844e4b1d1bc2e3df504b06c74dfca

    • \Windows\Resources\svchost.exe

      Filesize

      135KB

      MD5

      6c549bb967490fbfbbe823f1c0923312

      SHA1

      efd0b007fb0838a231060ec90e9efc093458769f

      SHA256

      60683a3c0542fb049616deecd809572a2514ae3ce07adae7e3c0f0f4ff636a36

      SHA512

      745ca3412253437909926c7339bc91ee340499c57bede62e480d5176690624ad096ae957031b66c8cb1111d6c0ecd8f0933dda6cafc4d862cf93b49fa7b6f445

    • memory/848-45-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/1736-44-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/2068-41-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/2400-30-0x00000000002D0000-0x00000000002EF000-memory.dmp

      Filesize

      124KB

    • memory/2400-42-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/2484-0-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/2484-9-0x0000000000330000-0x000000000034F000-memory.dmp

      Filesize

      124KB

    • memory/2484-43-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB