Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2024, 00:54
Static task
static1
Behavioral task
behavioral1
Sample
42b6c18de4ce9efe34e6551c3f99860658f508dee031bd12031dba704922607bN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
42b6c18de4ce9efe34e6551c3f99860658f508dee031bd12031dba704922607bN.exe
Resource
win10v2004-20241007-en
General
-
Target
42b6c18de4ce9efe34e6551c3f99860658f508dee031bd12031dba704922607bN.exe
-
Size
135KB
-
MD5
d0a26b7e6362a2fcab740f2b2f1f9fc0
-
SHA1
65079204050f5bb5721853c9e3ce7b63754d4fbc
-
SHA256
42b6c18de4ce9efe34e6551c3f99860658f508dee031bd12031dba704922607b
-
SHA512
25f7424ec363abdd0c571cd0a39b9389dd0f94fc7d715f71225fa40bdeac85908c08ccac40af2d11d93609e233f4aac120b7091d2c795afad2b041fc6de91d20
-
SSDEEP
1536:UfsEqouTRcG/Mzvgf7xEuvnXNTRdUzwTekUOisZ1yDDajtXbVVgJ:UVqoCl/YgjxEufVU0TbTyDDalkJ
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 4640 explorer.exe 3968 spoolsv.exe 1188 svchost.exe 1792 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\themes\explorer.exe 42b6c18de4ce9efe34e6551c3f99860658f508dee031bd12031dba704922607bN.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 42b6c18de4ce9efe34e6551c3f99860658f508dee031bd12031dba704922607bN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4788 42b6c18de4ce9efe34e6551c3f99860658f508dee031bd12031dba704922607bN.exe 4788 42b6c18de4ce9efe34e6551c3f99860658f508dee031bd12031dba704922607bN.exe 4788 42b6c18de4ce9efe34e6551c3f99860658f508dee031bd12031dba704922607bN.exe 4788 42b6c18de4ce9efe34e6551c3f99860658f508dee031bd12031dba704922607bN.exe 4788 42b6c18de4ce9efe34e6551c3f99860658f508dee031bd12031dba704922607bN.exe 4788 42b6c18de4ce9efe34e6551c3f99860658f508dee031bd12031dba704922607bN.exe 4788 42b6c18de4ce9efe34e6551c3f99860658f508dee031bd12031dba704922607bN.exe 4788 42b6c18de4ce9efe34e6551c3f99860658f508dee031bd12031dba704922607bN.exe 4788 42b6c18de4ce9efe34e6551c3f99860658f508dee031bd12031dba704922607bN.exe 4788 42b6c18de4ce9efe34e6551c3f99860658f508dee031bd12031dba704922607bN.exe 4788 42b6c18de4ce9efe34e6551c3f99860658f508dee031bd12031dba704922607bN.exe 4788 42b6c18de4ce9efe34e6551c3f99860658f508dee031bd12031dba704922607bN.exe 4788 42b6c18de4ce9efe34e6551c3f99860658f508dee031bd12031dba704922607bN.exe 4788 42b6c18de4ce9efe34e6551c3f99860658f508dee031bd12031dba704922607bN.exe 4788 42b6c18de4ce9efe34e6551c3f99860658f508dee031bd12031dba704922607bN.exe 4788 42b6c18de4ce9efe34e6551c3f99860658f508dee031bd12031dba704922607bN.exe 4788 42b6c18de4ce9efe34e6551c3f99860658f508dee031bd12031dba704922607bN.exe 4788 42b6c18de4ce9efe34e6551c3f99860658f508dee031bd12031dba704922607bN.exe 4788 42b6c18de4ce9efe34e6551c3f99860658f508dee031bd12031dba704922607bN.exe 4788 42b6c18de4ce9efe34e6551c3f99860658f508dee031bd12031dba704922607bN.exe 4788 42b6c18de4ce9efe34e6551c3f99860658f508dee031bd12031dba704922607bN.exe 4788 42b6c18de4ce9efe34e6551c3f99860658f508dee031bd12031dba704922607bN.exe 4788 42b6c18de4ce9efe34e6551c3f99860658f508dee031bd12031dba704922607bN.exe 4788 42b6c18de4ce9efe34e6551c3f99860658f508dee031bd12031dba704922607bN.exe 4788 42b6c18de4ce9efe34e6551c3f99860658f508dee031bd12031dba704922607bN.exe 4788 42b6c18de4ce9efe34e6551c3f99860658f508dee031bd12031dba704922607bN.exe 4788 42b6c18de4ce9efe34e6551c3f99860658f508dee031bd12031dba704922607bN.exe 4788 42b6c18de4ce9efe34e6551c3f99860658f508dee031bd12031dba704922607bN.exe 4788 42b6c18de4ce9efe34e6551c3f99860658f508dee031bd12031dba704922607bN.exe 4788 42b6c18de4ce9efe34e6551c3f99860658f508dee031bd12031dba704922607bN.exe 4788 42b6c18de4ce9efe34e6551c3f99860658f508dee031bd12031dba704922607bN.exe 4788 42b6c18de4ce9efe34e6551c3f99860658f508dee031bd12031dba704922607bN.exe 4788 42b6c18de4ce9efe34e6551c3f99860658f508dee031bd12031dba704922607bN.exe 4788 42b6c18de4ce9efe34e6551c3f99860658f508dee031bd12031dba704922607bN.exe 4640 explorer.exe 4640 explorer.exe 4640 explorer.exe 4640 explorer.exe 4640 explorer.exe 4640 explorer.exe 4640 explorer.exe 4640 explorer.exe 4640 explorer.exe 4640 explorer.exe 4640 explorer.exe 4640 explorer.exe 4640 explorer.exe 4640 explorer.exe 4640 explorer.exe 4640 explorer.exe 4640 explorer.exe 4640 explorer.exe 4640 explorer.exe 4640 explorer.exe 4640 explorer.exe 4640 explorer.exe 4640 explorer.exe 4640 explorer.exe 4640 explorer.exe 4640 explorer.exe 4640 explorer.exe 4640 explorer.exe 4640 explorer.exe 4640 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 4640 explorer.exe 1188 svchost.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 4788 42b6c18de4ce9efe34e6551c3f99860658f508dee031bd12031dba704922607bN.exe 4788 42b6c18de4ce9efe34e6551c3f99860658f508dee031bd12031dba704922607bN.exe 4640 explorer.exe 4640 explorer.exe 3968 spoolsv.exe 3968 spoolsv.exe 1188 svchost.exe 1188 svchost.exe 1792 spoolsv.exe 1792 spoolsv.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4788 wrote to memory of 4640 4788 42b6c18de4ce9efe34e6551c3f99860658f508dee031bd12031dba704922607bN.exe 83 PID 4788 wrote to memory of 4640 4788 42b6c18de4ce9efe34e6551c3f99860658f508dee031bd12031dba704922607bN.exe 83 PID 4788 wrote to memory of 4640 4788 42b6c18de4ce9efe34e6551c3f99860658f508dee031bd12031dba704922607bN.exe 83 PID 4640 wrote to memory of 3968 4640 explorer.exe 84 PID 4640 wrote to memory of 3968 4640 explorer.exe 84 PID 4640 wrote to memory of 3968 4640 explorer.exe 84 PID 3968 wrote to memory of 1188 3968 spoolsv.exe 85 PID 3968 wrote to memory of 1188 3968 spoolsv.exe 85 PID 3968 wrote to memory of 1188 3968 spoolsv.exe 85 PID 1188 wrote to memory of 1792 1188 svchost.exe 86 PID 1188 wrote to memory of 1792 1188 svchost.exe 86 PID 1188 wrote to memory of 1792 1188 svchost.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\42b6c18de4ce9efe34e6551c3f99860658f508dee031bd12031dba704922607bN.exe"C:\Users\Admin\AppData\Local\Temp\42b6c18de4ce9efe34e6551c3f99860658f508dee031bd12031dba704922607bN.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4788 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4640 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3968 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1188 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1792
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135KB
MD5421b339804d388e62c80985ac0a5e9ea
SHA19ee534ec4cd5448cbd3befcaebdd44320639c740
SHA25650c65e61fc54ba62a49a8e4a0026cc402d0697a0829499f1ff1abaab270388f7
SHA512f3fae56c82ae0f14d2767282d780607c4c058a999a412a9c84b3611d0eabc806a041ffd726dfeb183c0b3deab0f58f43294c7b4ae12446fc546fe9d8ffd92d19
-
Filesize
135KB
MD5681f8a2d7f2d077351449308c9dd429e
SHA1773bf05bffa84f4dd2378fc136b0836d18dedd39
SHA256e2ae3c7c6c1951a17935c6c2e1c628342f5e1f93d31caa73105e4fffc7202707
SHA512d43ef4ace8d01db15dbc3a564e585725f90c9d4cdf66ee39962c24acf6c040adebedfbf05ef1f4f2568c08f44b07807c9a7a1ab1ac3c9a19d1f912ef07902510
-
Filesize
135KB
MD503254f15fa774be41a3fe97fdab76eb9
SHA139ba3cf8af5a2e8c927db0a3e8c164200f44fc91
SHA256a870de3b5e953a8613d2585aaabedb42749812a4ac0a6aba9fd0f1a73072f5c7
SHA51279329301d5e47b11aeaa7ac379b49be02803d843eb0736ae6651462652633e52ee70c42da8f11dc42ee6fe12ee09e8bb3a8cbb8148bc84ed2a1af8596038d8cf