Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
10AntiPubs D...er.exe
windows7-x64
10AntiPubs D...er.exe
windows10-2004-x64
10AntiPubs D...er.exe
windows7-x64
3AntiPubs D...er.exe
windows10-2004-x64
3AntiPubs D...ol.dll
windows7-x64
1AntiPubs D...ol.dll
windows10-2004-x64
1AntiPubs D...er.dll
windows7-x64
1AntiPubs D...er.dll
windows10-2004-x64
1AntiPubs D...rk.dll
windows7-x64
1AntiPubs D...rk.dll
windows10-2004-x64
1AntiPubs D...ib.dll
windows7-x64
1AntiPubs D...ib.dll
windows10-2004-x64
1AntiPubs D...on.dll
windows7-x64
1AntiPubs D...on.dll
windows10-2004-x64
1AntiPubs D...er.exe
windows7-x64
10AntiPubs D...er.exe
windows10-2004-x64
10AntiPubs D...F6.dll
windows7-x64
1AntiPubs D...F6.dll
windows10-2004-x64
1AntiPubs D...nq.dll
windows7-x64
1AntiPubs D...nq.dll
windows10-2004-x64
1AntiPubs D...te.dll
windows7-x64
1AntiPubs D...te.dll
windows10-2004-x64
1AntiPubs D...te.exe
windows7-x64
10AntiPubs D...te.exe
windows10-2004-x64
10AntiPubs D...ar.dll
windows7-x64
1AntiPubs D...ar.dll
windows10-2004-x64
1AntiPubs D...er.exe
windows7-x64
3AntiPubs D...er.exe
windows10-2004-x64
3AntiPubs D...op.dll
windows7-x64
1AntiPubs D...op.dll
windows10-2004-x64
1AntiPubs D...op.dll
windows7-x64
3AntiPubs D...op.dll
windows10-2004-x64
3Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
22/12/2024, 12:23
Behavioral task
behavioral1
Sample
AntiPubs Dork Searcher EZ/._cache_Searcher.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
AntiPubs Dork Searcher EZ/._cache_Searcher.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
AntiPubs Dork Searcher EZ/._cache_searcher.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
AntiPubs Dork Searcher EZ/._cache_searcher.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
AntiPubs Dork Searcher EZ/Control.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
AntiPubs Dork Searcher EZ/Control.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
AntiPubs Dork Searcher EZ/EntityFramework.SqlServer.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
AntiPubs Dork Searcher EZ/EntityFramework.SqlServer.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
AntiPubs Dork Searcher EZ/EntityFramework.dll
Resource
win7-20241023-en
Behavioral task
behavioral10
Sample
AntiPubs Dork Searcher EZ/EntityFramework.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
AntiPubs Dork Searcher EZ/Interop.WMPLib.dll
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
AntiPubs Dork Searcher EZ/Interop.WMPLib.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
AntiPubs Dork Searcher EZ/Newtonsoft.Json.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
AntiPubs Dork Searcher EZ/Newtonsoft.Json.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
AntiPubs Dork Searcher EZ/Searcher.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
AntiPubs Dork Searcher EZ/Searcher.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
AntiPubs Dork Searcher EZ/System.Data.SQLite.EF6.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
AntiPubs Dork Searcher EZ/System.Data.SQLite.EF6.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
AntiPubs Dork Searcher EZ/System.Data.SQLite.Linq.dll
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
AntiPubs Dork Searcher EZ/System.Data.SQLite.Linq.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
AntiPubs Dork Searcher EZ/System.Data.SQLite.dll
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
AntiPubs Dork Searcher EZ/System.Data.SQLite.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
AntiPubs Dork Searcher EZ/Update.exe
Resource
win7-20241010-en
Behavioral task
behavioral24
Sample
AntiPubs Dork Searcher EZ/Update.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
AntiPubs Dork Searcher EZ/War.dll
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
AntiPubs Dork Searcher EZ/War.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
AntiPubs Dork Searcher EZ/searcher.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
AntiPubs Dork Searcher EZ/searcher.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
AntiPubs Dork Searcher EZ/x64/SQLite.Interop.dll
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
AntiPubs Dork Searcher EZ/x64/SQLite.Interop.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
AntiPubs Dork Searcher EZ/x86/SQLite.Interop.dll
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
AntiPubs Dork Searcher EZ/x86/SQLite.Interop.dll
Resource
win10v2004-20241007-en
General
-
Target
AntiPubs Dork Searcher EZ/._cache_Searcher.exe
-
Size
7.0MB
-
MD5
15eb4b61e2e64ac84925535dc5ffe8de
-
SHA1
b95491efa58261ca585878238fa24d98fae41287
-
SHA256
3b28aaf3dd8ea9623ab80e4f567e65b8bb5db686b129f27f6d9bc0907f2ed289
-
SHA512
489751c78f8aded9a4b77eada0cccedab4d0faf50443607e17d81f65856ff77ad2842cb2ba5002e377c48fff441d86d38f74273367353fc2572a80ff980c14b5
-
SSDEEP
98304:JyldpqU5s+h9oK4MtPSXDjLWdNo/v5LlCKly37gjA1tCJa8IRku6Fml2u:JyldD5smuMQDfUi/vXgIa8IRkZI2u
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
Executes dropped EXE 6 IoCs
pid Process 2532 ._cache_searcher.exe 2700 icsys.icn.exe 2808 explorer.exe 2948 spoolsv.exe 2844 svchost.exe 2908 spoolsv.exe -
Loads dropped DLL 6 IoCs
pid Process 2368 ._cache_Searcher.exe 2368 ._cache_Searcher.exe 2700 icsys.icn.exe 2808 explorer.exe 2948 spoolsv.exe 2844 svchost.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\Resources\Themes\icsys.icn.exe ._cache_Searcher.exe File opened for modification \??\c:\windows\resources\themes\explorer.exe icsys.icn.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_searcher.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icsys.icn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Searcher.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2620 schtasks.exe 2472 schtasks.exe 576 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2368 ._cache_Searcher.exe 2368 ._cache_Searcher.exe 2368 ._cache_Searcher.exe 2368 ._cache_Searcher.exe 2368 ._cache_Searcher.exe 2368 ._cache_Searcher.exe 2368 ._cache_Searcher.exe 2368 ._cache_Searcher.exe 2368 ._cache_Searcher.exe 2368 ._cache_Searcher.exe 2368 ._cache_Searcher.exe 2368 ._cache_Searcher.exe 2368 ._cache_Searcher.exe 2368 ._cache_Searcher.exe 2368 ._cache_Searcher.exe 2368 ._cache_Searcher.exe 2700 icsys.icn.exe 2700 icsys.icn.exe 2700 icsys.icn.exe 2700 icsys.icn.exe 2700 icsys.icn.exe 2700 icsys.icn.exe 2700 icsys.icn.exe 2700 icsys.icn.exe 2700 icsys.icn.exe 2700 icsys.icn.exe 2700 icsys.icn.exe 2700 icsys.icn.exe 2700 icsys.icn.exe 2700 icsys.icn.exe 2700 icsys.icn.exe 2700 icsys.icn.exe 2700 icsys.icn.exe 2808 explorer.exe 2808 explorer.exe 2808 explorer.exe 2808 explorer.exe 2808 explorer.exe 2808 explorer.exe 2808 explorer.exe 2808 explorer.exe 2808 explorer.exe 2808 explorer.exe 2808 explorer.exe 2808 explorer.exe 2808 explorer.exe 2808 explorer.exe 2808 explorer.exe 2808 explorer.exe 2844 svchost.exe 2844 svchost.exe 2844 svchost.exe 2844 svchost.exe 2844 svchost.exe 2844 svchost.exe 2844 svchost.exe 2844 svchost.exe 2844 svchost.exe 2844 svchost.exe 2844 svchost.exe 2844 svchost.exe 2844 svchost.exe 2844 svchost.exe 2844 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2808 explorer.exe 2844 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2368 ._cache_Searcher.exe 2368 ._cache_Searcher.exe 2700 icsys.icn.exe 2700 icsys.icn.exe 2808 explorer.exe 2808 explorer.exe 2948 spoolsv.exe 2948 spoolsv.exe 2844 svchost.exe 2844 svchost.exe 2908 spoolsv.exe 2908 spoolsv.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 2368 wrote to memory of 2532 2368 ._cache_Searcher.exe 30 PID 2368 wrote to memory of 2532 2368 ._cache_Searcher.exe 30 PID 2368 wrote to memory of 2532 2368 ._cache_Searcher.exe 30 PID 2368 wrote to memory of 2532 2368 ._cache_Searcher.exe 30 PID 2368 wrote to memory of 2700 2368 ._cache_Searcher.exe 31 PID 2368 wrote to memory of 2700 2368 ._cache_Searcher.exe 31 PID 2368 wrote to memory of 2700 2368 ._cache_Searcher.exe 31 PID 2368 wrote to memory of 2700 2368 ._cache_Searcher.exe 31 PID 2700 wrote to memory of 2808 2700 icsys.icn.exe 32 PID 2700 wrote to memory of 2808 2700 icsys.icn.exe 32 PID 2700 wrote to memory of 2808 2700 icsys.icn.exe 32 PID 2700 wrote to memory of 2808 2700 icsys.icn.exe 32 PID 2808 wrote to memory of 2948 2808 explorer.exe 33 PID 2808 wrote to memory of 2948 2808 explorer.exe 33 PID 2808 wrote to memory of 2948 2808 explorer.exe 33 PID 2808 wrote to memory of 2948 2808 explorer.exe 33 PID 2948 wrote to memory of 2844 2948 spoolsv.exe 34 PID 2948 wrote to memory of 2844 2948 spoolsv.exe 34 PID 2948 wrote to memory of 2844 2948 spoolsv.exe 34 PID 2948 wrote to memory of 2844 2948 spoolsv.exe 34 PID 2844 wrote to memory of 2908 2844 svchost.exe 35 PID 2844 wrote to memory of 2908 2844 svchost.exe 35 PID 2844 wrote to memory of 2908 2844 svchost.exe 35 PID 2844 wrote to memory of 2908 2844 svchost.exe 35 PID 2808 wrote to memory of 2612 2808 explorer.exe 36 PID 2808 wrote to memory of 2612 2808 explorer.exe 36 PID 2808 wrote to memory of 2612 2808 explorer.exe 36 PID 2808 wrote to memory of 2612 2808 explorer.exe 36 PID 2844 wrote to memory of 2620 2844 svchost.exe 37 PID 2844 wrote to memory of 2620 2844 svchost.exe 37 PID 2844 wrote to memory of 2620 2844 svchost.exe 37 PID 2844 wrote to memory of 2620 2844 svchost.exe 37 PID 2844 wrote to memory of 2472 2844 svchost.exe 42 PID 2844 wrote to memory of 2472 2844 svchost.exe 42 PID 2844 wrote to memory of 2472 2844 svchost.exe 42 PID 2844 wrote to memory of 2472 2844 svchost.exe 42 PID 2844 wrote to memory of 576 2844 svchost.exe 44 PID 2844 wrote to memory of 576 2844 svchost.exe 44 PID 2844 wrote to memory of 576 2844 svchost.exe 44 PID 2844 wrote to memory of 576 2844 svchost.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\AntiPubs Dork Searcher EZ\._cache_Searcher.exe"C:\Users\Admin\AppData\Local\Temp\AntiPubs Dork Searcher EZ\._cache_Searcher.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2368 -
\??\c:\users\admin\appdata\local\temp\antipubs dork searcher ez\._cache_searcher.exe"c:\users\admin\appdata\local\temp\antipubs dork searcher ez\._cache_searcher.exe "2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2532
-
-
C:\Windows\Resources\Themes\icsys.icn.exeC:\Windows\Resources\Themes\icsys.icn.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2700 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe3⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2808 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2948 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe5⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2844 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2908
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 12:26 /f6⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2620
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 12:27 /f6⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2472
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 12:28 /f6⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:576
-
-
-
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe4⤵PID:2612
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135KB
MD5bb38812e659c3d728f409ba8206da43e
SHA1231777c045c807c20eb964c5a8714e1de9e4302b
SHA2569eee738a0be74282659e61da2764f358cd5db063019bab247d513b5b63af748f
SHA51291854244be2838e0efa5f3566ce3a4518484ab71fff5f06b86ef0b1309cb9e8dc988d63b0d35e54a6c7515b0c1cea9b95bbdfd469415459a46c58e96ed42a2fc
-
Filesize
6.8MB
MD5d4b43b2ce490d8786ccde6debcad2251
SHA1e88d0c6b5c336ee7c03e145532a6ce44db28af90
SHA2563aad4931bc76e1d654e5fe3fc6a1a10277b0d66190a8547782a3d7fa117ccc27
SHA5128bff940911e750f06c76c724b92de0753f4089d92f95e5d3d3659de3869a91908c6de25e480a0101d8149fcc881b71f585c39a2e9206393bb89f1f5e43bdda46
-
Filesize
135KB
MD530b356724669ee6d2599df754443b21e
SHA1581856a7e4367c088faeb99132ac6a9f4faef6ce
SHA256a6629bfc794f7513604612edc6a16fe9ff2b3e7a01738fec93d743327b81652d
SHA512cf9a4709719ae8b6a1c28c915e8035cb9cacade62c7888eea2658ecb639537206f397ab38ff241f6fa965e435b8160ab4482f6b2d9f43a475f0bdc829cedc7e3
-
Filesize
135KB
MD58bc314eacc0c908bc18740a074e2e25d
SHA1cfb522ffa2c08530f9cd10039e0a6ad08f6d2ce9
SHA2566c9eab8a8a8f456abb805428e06a1317d66a75b10f7e5fda196c7da437bba11e
SHA51260e9d324397963e48f54856ce65fcd76374908bac6919f380b6023e7cc72cef4c35b5c36cf76acd1b06f34c607ec6814a91a89df66939a85c03407dcd5956a6d
-
Filesize
135KB
MD511a62e327e82ae88a9635de56d8813fd
SHA137188d68b0a72b4fa751a725bea930a386b5f133
SHA2568a0ebf1b392959754c53b8a026931ac5a48b10f69c2320a0fb9a79083d7877be
SHA51294d20b9bce32b25e432b3b70c74add932a68a1a92cc31a872f7ec76dd22066b46211dd71794053e603103a9dcae227f6ef189ff9aa61ff49edc4254438783a0e