Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/11/2024, 01:06

General

  • Target

    8234f60cfbfae39174415f9d4abbfc21453f9f31e5548f13636ea9faa0b67820.exe

  • Size

    206KB

  • MD5

    6866f46c7116c1edc78a09acb11e0e77

  • SHA1

    e2d6836eb5a222a1087d463094140808758e2718

  • SHA256

    8234f60cfbfae39174415f9d4abbfc21453f9f31e5548f13636ea9faa0b67820

  • SHA512

    353533dcafe8196ee4fc751f5d4bc28fa23ea6318b809ec6aee74bbd462c9f1434b3b14ab00e608d9eb8be9772701b1b8e1525819c41f670e1a303b76e140e0d

  • SSDEEP

    3072:5vEfVUzSLhIVbV6i5LirrlZrHyrUHUckoMQ2RN6unv:5vEN2U+T6i5LirrllHy4HUcMQY6E

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 8 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8234f60cfbfae39174415f9d4abbfc21453f9f31e5548f13636ea9faa0b67820.exe
    "C:\Users\Admin\AppData\Local\Temp\8234f60cfbfae39174415f9d4abbfc21453f9f31e5548f13636ea9faa0b67820.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2108
    • \??\c:\windows\system\explorer.exe
      c:\windows\system\explorer.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visiblity of hidden/system files in Explorer
      • Boot or Logon Autostart Execution: Active Setup
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1224
      • \??\c:\windows\system\spoolsv.exe
        c:\windows\system\spoolsv.exe SE
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4664
        • \??\c:\windows\system\svchost.exe
          c:\windows\system\svchost.exe
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visiblity of hidden/system files in Explorer
          • Boot or Logon Autostart Execution: Active Setup
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2376
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe PR
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            PID:3460
          • C:\Windows\SysWOW64\at.exe
            at 01:08 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
            5⤵
            • System Location Discovery: System Language Discovery
            PID:4508
          • C:\Windows\SysWOW64\at.exe
            at 01:09 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
            5⤵
            • System Location Discovery: System Language Discovery
            PID:1724
          • C:\Windows\SysWOW64\at.exe
            at 01:10 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
            5⤵
            • System Location Discovery: System Language Discovery
            PID:3472

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\mrsys.exe

    Filesize

    206KB

    MD5

    896df913a3649f85c84434041502c417

    SHA1

    3223c774f1af3eedda73e5ce4543d5dbf15cf9ed

    SHA256

    fe1ddf8972497200d88e428d124f79f2f69597c2b0dbc76c9b5928fa04bf571c

    SHA512

    b0c57cb819e47f22241539744019b7d03c31efaeeecb255e7fbabeb81cd9a40a1569b8b5abc3f9f883805856ac2a93c35dc4e70c472bbff381bd363a41589ce6

  • C:\Windows\System\explorer.exe

    Filesize

    206KB

    MD5

    59df5648283f05fe5d3800b01eee0fcf

    SHA1

    fe14470237e38c460721d528729a0932902ce579

    SHA256

    8a5a3f5fe0474400139ec24390652e540977590e2fdef6f98d4fadf16fff9319

    SHA512

    ad876daf27c587a5cdb3acddd701d8c44fc151472170e3d179a8a16352f175ed31c5b9a66d11426edc2a33595e364a6f455dfc226d9128814eaa8040655a8365

  • C:\Windows\System\spoolsv.exe

    Filesize

    206KB

    MD5

    8ffc1797d2307063bf36326437e62730

    SHA1

    424c6eccc26c813f4f1b37728c686e507137836b

    SHA256

    4c8401d4726cccf2a5bfb064a090ac5d16813b3db19df5d4da061d4b38cd8e19

    SHA512

    078a3f839988bc72abb699d693cca1a8610677ea501c35ad7b44b724d684851ae1a44388a551009f4fba75a8f937d91e4c15e457d8b49412069ce44be253c70e

  • C:\Windows\System\svchost.exe

    Filesize

    206KB

    MD5

    8ddc0132dedf9f8863797143c9996a90

    SHA1

    f10d6cb3464d201615de30115d39a706795d0b30

    SHA256

    147129de75da29956e5ec6ef202d9a5c3185324b609ce822e28da04079e1ee00

    SHA512

    053529b2ca126caa39f4942d46ada6879ea936959fdd76b3a4706ee1f98d3247c390d68ca35f2594fb39eedb0c84b047a35878bbdeff0749473888208e790b96

  • memory/1224-38-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2108-0-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2108-37-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2376-39-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/3460-32-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/4664-35-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB