Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21/11/2024, 01:06 UTC

General

  • Target

    8234f60cfbfae39174415f9d4abbfc21453f9f31e5548f13636ea9faa0b67820.exe

  • Size

    206KB

  • MD5

    6866f46c7116c1edc78a09acb11e0e77

  • SHA1

    e2d6836eb5a222a1087d463094140808758e2718

  • SHA256

    8234f60cfbfae39174415f9d4abbfc21453f9f31e5548f13636ea9faa0b67820

  • SHA512

    353533dcafe8196ee4fc751f5d4bc28fa23ea6318b809ec6aee74bbd462c9f1434b3b14ab00e608d9eb8be9772701b1b8e1525819c41f670e1a303b76e140e0d

  • SSDEEP

    3072:5vEfVUzSLhIVbV6i5LirrlZrHyrUHUckoMQ2RN6unv:5vEN2U+T6i5LirrllHy4HUcMQY6E

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 8 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 8 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8234f60cfbfae39174415f9d4abbfc21453f9f31e5548f13636ea9faa0b67820.exe
    "C:\Users\Admin\AppData\Local\Temp\8234f60cfbfae39174415f9d4abbfc21453f9f31e5548f13636ea9faa0b67820.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2516
    • \??\c:\windows\system\explorer.exe
      c:\windows\system\explorer.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visiblity of hidden/system files in Explorer
      • Boot or Logon Autostart Execution: Active Setup
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1776
      • \??\c:\windows\system\spoolsv.exe
        c:\windows\system\spoolsv.exe SE
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2244
        • \??\c:\windows\system\svchost.exe
          c:\windows\system\svchost.exe
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visiblity of hidden/system files in Explorer
          • Boot or Logon Autostart Execution: Active Setup
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2844
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe PR
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            PID:2824
          • C:\Windows\SysWOW64\at.exe
            at 01:08 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2784
          • C:\Windows\SysWOW64\at.exe
            at 01:09 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2944
          • C:\Windows\SysWOW64\at.exe
            at 01:10 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2016

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\mrsys.exe

    Filesize

    206KB

    MD5

    3ce52daed0cdc9c28a09ccdc6c0cdad5

    SHA1

    2f825b28224b8cc7e1bc64e9abfacdb818500343

    SHA256

    49dc6262e221feea8ee88c8bbade1fed6d415687a8828bcceaeb6391e04b7b08

    SHA512

    4936031f118f8adfe8353b43f2fd997b346ce92a1a8d1ec82a06865e99264fa0cf5d0c2197365b12ae7cbb9ac4042e0b345e1b48bac2c6e7a643a85ab326e3b3

  • \Windows\system\explorer.exe

    Filesize

    206KB

    MD5

    5131545365e8c457f6b60952d2dd1394

    SHA1

    387823e7b23a14c025c81a27123e298558cafe71

    SHA256

    6e16651a84d88336874e3ad50f5d0f9b8e9468947a98dad9608bcca30974ddc5

    SHA512

    3c61250e122847f8f333d05c0e39d758fb4d9b59907b40fc9c8c94d67bc5c897396640b7f1d56307bd892fa9d39ffdf54fb83252c0a4e9fecac27e1d92fb3169

  • \Windows\system\spoolsv.exe

    Filesize

    206KB

    MD5

    5be85462b946d6d7f262b557108c9d9d

    SHA1

    b9558982326603f88ff9dd5c25ae75b5b9b911c0

    SHA256

    52ed3a5070b5dd6a8580e84f4c7fc4004a7eb4491f577bf2f6e8bdcc76a4d653

    SHA512

    a5dcd02240a44ac211fc84db1e9a092f0534e78a160265733c43ab6f7e1cc53194e7624902b8153775294a97b05bc8b76ee7fb87820a354dc9417925c6fdbfd0

  • \Windows\system\svchost.exe

    Filesize

    206KB

    MD5

    e436765adfd72d939dcf8a99a1d96f7f

    SHA1

    f21425a6a590580b21de35007cbaaa76ee0d0142

    SHA256

    000216aee0cc455e41a43dbf60b88a7b3cb24b73c5979699a05b8706f32b376a

    SHA512

    e1d196644ed04490f7d8083c0f8610c179eff0af75840f08bee03756046bf0dfffc4d41f1d65e198aa874de51705a1f1263b6a64b5f60f9f471544e33a2eb87f

  • memory/1776-59-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2244-56-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2244-30-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2516-0-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2516-57-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2516-13-0x00000000030F0000-0x0000000003130000-memory.dmp

    Filesize

    256KB

  • memory/2516-14-0x00000000030F0000-0x0000000003130000-memory.dmp

    Filesize

    256KB

  • memory/2824-53-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2844-42-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2844-60-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.