Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2024, 01:06
Static task
static1
Behavioral task
behavioral1
Sample
8234f60cfbfae39174415f9d4abbfc21453f9f31e5548f13636ea9faa0b67820.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8234f60cfbfae39174415f9d4abbfc21453f9f31e5548f13636ea9faa0b67820.exe
Resource
win10v2004-20241007-en
General
-
Target
8234f60cfbfae39174415f9d4abbfc21453f9f31e5548f13636ea9faa0b67820.exe
-
Size
206KB
-
MD5
6866f46c7116c1edc78a09acb11e0e77
-
SHA1
e2d6836eb5a222a1087d463094140808758e2718
-
SHA256
8234f60cfbfae39174415f9d4abbfc21453f9f31e5548f13636ea9faa0b67820
-
SHA512
353533dcafe8196ee4fc751f5d4bc28fa23ea6318b809ec6aee74bbd462c9f1434b3b14ab00e608d9eb8be9772701b1b8e1525819c41f670e1a303b76e140e0d
-
SSDEEP
3072:5vEfVUzSLhIVbV6i5LirrlZrHyrUHUckoMQ2RN6unv:5vEN2U+T6i5LirrllHy4HUcMQY6E
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 8 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe -
Executes dropped EXE 4 IoCs
pid Process 1224 explorer.exe 4664 spoolsv.exe 2376 svchost.exe 3460 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\system\udsys.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe 8234f60cfbfae39174415f9d4abbfc21453f9f31e5548f13636ea9faa0b67820.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8234f60cfbfae39174415f9d4abbfc21453f9f31e5548f13636ea9faa0b67820.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2108 8234f60cfbfae39174415f9d4abbfc21453f9f31e5548f13636ea9faa0b67820.exe 2108 8234f60cfbfae39174415f9d4abbfc21453f9f31e5548f13636ea9faa0b67820.exe 1224 explorer.exe 1224 explorer.exe 1224 explorer.exe 1224 explorer.exe 1224 explorer.exe 1224 explorer.exe 2376 svchost.exe 2376 svchost.exe 2376 svchost.exe 2376 svchost.exe 1224 explorer.exe 1224 explorer.exe 2376 svchost.exe 2376 svchost.exe 1224 explorer.exe 1224 explorer.exe 2376 svchost.exe 2376 svchost.exe 1224 explorer.exe 1224 explorer.exe 2376 svchost.exe 2376 svchost.exe 1224 explorer.exe 1224 explorer.exe 2376 svchost.exe 2376 svchost.exe 1224 explorer.exe 1224 explorer.exe 2376 svchost.exe 2376 svchost.exe 1224 explorer.exe 1224 explorer.exe 2376 svchost.exe 2376 svchost.exe 1224 explorer.exe 1224 explorer.exe 2376 svchost.exe 2376 svchost.exe 1224 explorer.exe 1224 explorer.exe 2376 svchost.exe 2376 svchost.exe 1224 explorer.exe 1224 explorer.exe 2376 svchost.exe 2376 svchost.exe 1224 explorer.exe 1224 explorer.exe 2376 svchost.exe 2376 svchost.exe 1224 explorer.exe 1224 explorer.exe 2376 svchost.exe 2376 svchost.exe 1224 explorer.exe 1224 explorer.exe 2376 svchost.exe 2376 svchost.exe 1224 explorer.exe 1224 explorer.exe 2376 svchost.exe 2376 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 1224 explorer.exe 2376 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2108 8234f60cfbfae39174415f9d4abbfc21453f9f31e5548f13636ea9faa0b67820.exe 2108 8234f60cfbfae39174415f9d4abbfc21453f9f31e5548f13636ea9faa0b67820.exe 1224 explorer.exe 1224 explorer.exe 4664 spoolsv.exe 4664 spoolsv.exe 2376 svchost.exe 2376 svchost.exe 3460 spoolsv.exe 3460 spoolsv.exe 1224 explorer.exe 1224 explorer.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2108 wrote to memory of 1224 2108 8234f60cfbfae39174415f9d4abbfc21453f9f31e5548f13636ea9faa0b67820.exe 82 PID 2108 wrote to memory of 1224 2108 8234f60cfbfae39174415f9d4abbfc21453f9f31e5548f13636ea9faa0b67820.exe 82 PID 2108 wrote to memory of 1224 2108 8234f60cfbfae39174415f9d4abbfc21453f9f31e5548f13636ea9faa0b67820.exe 82 PID 1224 wrote to memory of 4664 1224 explorer.exe 83 PID 1224 wrote to memory of 4664 1224 explorer.exe 83 PID 1224 wrote to memory of 4664 1224 explorer.exe 83 PID 4664 wrote to memory of 2376 4664 spoolsv.exe 84 PID 4664 wrote to memory of 2376 4664 spoolsv.exe 84 PID 4664 wrote to memory of 2376 4664 spoolsv.exe 84 PID 2376 wrote to memory of 3460 2376 svchost.exe 85 PID 2376 wrote to memory of 3460 2376 svchost.exe 85 PID 2376 wrote to memory of 3460 2376 svchost.exe 85 PID 2376 wrote to memory of 4508 2376 svchost.exe 86 PID 2376 wrote to memory of 4508 2376 svchost.exe 86 PID 2376 wrote to memory of 4508 2376 svchost.exe 86 PID 2376 wrote to memory of 1724 2376 svchost.exe 97 PID 2376 wrote to memory of 1724 2376 svchost.exe 97 PID 2376 wrote to memory of 1724 2376 svchost.exe 97 PID 2376 wrote to memory of 3472 2376 svchost.exe 99 PID 2376 wrote to memory of 3472 2376 svchost.exe 99 PID 2376 wrote to memory of 3472 2376 svchost.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\8234f60cfbfae39174415f9d4abbfc21453f9f31e5548f13636ea9faa0b67820.exe"C:\Users\Admin\AppData\Local\Temp\8234f60cfbfae39174415f9d4abbfc21453f9f31e5548f13636ea9faa0b67820.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2108 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1224 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4664 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2376 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3460
-
-
C:\Windows\SysWOW64\at.exeat 01:08 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:4508
-
-
C:\Windows\SysWOW64\at.exeat 01:09 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:1724
-
-
C:\Windows\SysWOW64\at.exeat 01:10 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:3472
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD5896df913a3649f85c84434041502c417
SHA13223c774f1af3eedda73e5ce4543d5dbf15cf9ed
SHA256fe1ddf8972497200d88e428d124f79f2f69597c2b0dbc76c9b5928fa04bf571c
SHA512b0c57cb819e47f22241539744019b7d03c31efaeeecb255e7fbabeb81cd9a40a1569b8b5abc3f9f883805856ac2a93c35dc4e70c472bbff381bd363a41589ce6
-
Filesize
206KB
MD559df5648283f05fe5d3800b01eee0fcf
SHA1fe14470237e38c460721d528729a0932902ce579
SHA2568a5a3f5fe0474400139ec24390652e540977590e2fdef6f98d4fadf16fff9319
SHA512ad876daf27c587a5cdb3acddd701d8c44fc151472170e3d179a8a16352f175ed31c5b9a66d11426edc2a33595e364a6f455dfc226d9128814eaa8040655a8365
-
Filesize
206KB
MD58ffc1797d2307063bf36326437e62730
SHA1424c6eccc26c813f4f1b37728c686e507137836b
SHA2564c8401d4726cccf2a5bfb064a090ac5d16813b3db19df5d4da061d4b38cd8e19
SHA512078a3f839988bc72abb699d693cca1a8610677ea501c35ad7b44b724d684851ae1a44388a551009f4fba75a8f937d91e4c15e457d8b49412069ce44be253c70e
-
Filesize
206KB
MD58ddc0132dedf9f8863797143c9996a90
SHA1f10d6cb3464d201615de30115d39a706795d0b30
SHA256147129de75da29956e5ec6ef202d9a5c3185324b609ce822e28da04079e1ee00
SHA512053529b2ca126caa39f4942d46ada6879ea936959fdd76b3a4706ee1f98d3247c390d68ca35f2594fb39eedb0c84b047a35878bbdeff0749473888208e790b96