Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20/01/2025, 09:15
Static task
static1
Behavioral task
behavioral1
Sample
71a808e07d3392bc04529c4bd24b369e9a411e1b27e30cd83eaaefa7b0afbd46N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
71a808e07d3392bc04529c4bd24b369e9a411e1b27e30cd83eaaefa7b0afbd46N.exe
Resource
win10v2004-20241007-en
General
-
Target
71a808e07d3392bc04529c4bd24b369e9a411e1b27e30cd83eaaefa7b0afbd46N.exe
-
Size
135KB
-
MD5
5266d8ea97ed0539fc9b5a8d0c423ad0
-
SHA1
98a16b5a9cd2083218be383dc110251b11913e06
-
SHA256
71a808e07d3392bc04529c4bd24b369e9a411e1b27e30cd83eaaefa7b0afbd46
-
SHA512
d7e21b7bd9a43b6293c2626a1d2d8ba2e00aeb9edec671916e4bf34a453174c376d5e15cb00a8eb4c6bb31f11573799aa2c8f6c5753b75a455cbc3afcd2ede60
-
SSDEEP
1536:UfsEqouTRcG/Mzvgf7xEuvnXNTRdUzwTekUOisZ1yDDajtXbVLv6w:UVqoCl/YgjxEufVU0TbTyDDalpv6w
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
Executes dropped EXE 4 IoCs
pid Process 3004 explorer.exe 1724 spoolsv.exe 2220 svchost.exe 2752 spoolsv.exe -
Loads dropped DLL 4 IoCs
pid Process 2012 71a808e07d3392bc04529c4bd24b369e9a411e1b27e30cd83eaaefa7b0afbd46N.exe 3004 explorer.exe 1724 spoolsv.exe 2220 svchost.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\Resources\tjud.exe explorer.exe File opened for modification \??\c:\windows\resources\themes\explorer.exe 71a808e07d3392bc04529c4bd24b369e9a411e1b27e30cd83eaaefa7b0afbd46N.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 71a808e07d3392bc04529c4bd24b369e9a411e1b27e30cd83eaaefa7b0afbd46N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2060 schtasks.exe 2828 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2012 71a808e07d3392bc04529c4bd24b369e9a411e1b27e30cd83eaaefa7b0afbd46N.exe 2012 71a808e07d3392bc04529c4bd24b369e9a411e1b27e30cd83eaaefa7b0afbd46N.exe 2012 71a808e07d3392bc04529c4bd24b369e9a411e1b27e30cd83eaaefa7b0afbd46N.exe 2012 71a808e07d3392bc04529c4bd24b369e9a411e1b27e30cd83eaaefa7b0afbd46N.exe 2012 71a808e07d3392bc04529c4bd24b369e9a411e1b27e30cd83eaaefa7b0afbd46N.exe 2012 71a808e07d3392bc04529c4bd24b369e9a411e1b27e30cd83eaaefa7b0afbd46N.exe 2012 71a808e07d3392bc04529c4bd24b369e9a411e1b27e30cd83eaaefa7b0afbd46N.exe 2012 71a808e07d3392bc04529c4bd24b369e9a411e1b27e30cd83eaaefa7b0afbd46N.exe 2012 71a808e07d3392bc04529c4bd24b369e9a411e1b27e30cd83eaaefa7b0afbd46N.exe 2012 71a808e07d3392bc04529c4bd24b369e9a411e1b27e30cd83eaaefa7b0afbd46N.exe 2012 71a808e07d3392bc04529c4bd24b369e9a411e1b27e30cd83eaaefa7b0afbd46N.exe 2012 71a808e07d3392bc04529c4bd24b369e9a411e1b27e30cd83eaaefa7b0afbd46N.exe 2012 71a808e07d3392bc04529c4bd24b369e9a411e1b27e30cd83eaaefa7b0afbd46N.exe 2012 71a808e07d3392bc04529c4bd24b369e9a411e1b27e30cd83eaaefa7b0afbd46N.exe 2012 71a808e07d3392bc04529c4bd24b369e9a411e1b27e30cd83eaaefa7b0afbd46N.exe 2012 71a808e07d3392bc04529c4bd24b369e9a411e1b27e30cd83eaaefa7b0afbd46N.exe 2012 71a808e07d3392bc04529c4bd24b369e9a411e1b27e30cd83eaaefa7b0afbd46N.exe 3004 explorer.exe 3004 explorer.exe 3004 explorer.exe 3004 explorer.exe 3004 explorer.exe 3004 explorer.exe 3004 explorer.exe 3004 explorer.exe 3004 explorer.exe 3004 explorer.exe 3004 explorer.exe 3004 explorer.exe 3004 explorer.exe 3004 explorer.exe 3004 explorer.exe 3004 explorer.exe 2220 svchost.exe 2220 svchost.exe 2220 svchost.exe 2220 svchost.exe 2220 svchost.exe 2220 svchost.exe 2220 svchost.exe 2220 svchost.exe 2220 svchost.exe 2220 svchost.exe 2220 svchost.exe 2220 svchost.exe 2220 svchost.exe 2220 svchost.exe 2220 svchost.exe 2220 svchost.exe 3004 explorer.exe 2220 svchost.exe 2220 svchost.exe 3004 explorer.exe 3004 explorer.exe 2220 svchost.exe 3004 explorer.exe 3004 explorer.exe 2220 svchost.exe 3004 explorer.exe 2220 svchost.exe 2220 svchost.exe 3004 explorer.exe 3004 explorer.exe 2220 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2220 svchost.exe 3004 explorer.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 2012 71a808e07d3392bc04529c4bd24b369e9a411e1b27e30cd83eaaefa7b0afbd46N.exe 2012 71a808e07d3392bc04529c4bd24b369e9a411e1b27e30cd83eaaefa7b0afbd46N.exe 3004 explorer.exe 3004 explorer.exe 1724 spoolsv.exe 1724 spoolsv.exe 2220 svchost.exe 2220 svchost.exe 2752 spoolsv.exe 2752 spoolsv.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2012 wrote to memory of 3004 2012 71a808e07d3392bc04529c4bd24b369e9a411e1b27e30cd83eaaefa7b0afbd46N.exe 30 PID 2012 wrote to memory of 3004 2012 71a808e07d3392bc04529c4bd24b369e9a411e1b27e30cd83eaaefa7b0afbd46N.exe 30 PID 2012 wrote to memory of 3004 2012 71a808e07d3392bc04529c4bd24b369e9a411e1b27e30cd83eaaefa7b0afbd46N.exe 30 PID 2012 wrote to memory of 3004 2012 71a808e07d3392bc04529c4bd24b369e9a411e1b27e30cd83eaaefa7b0afbd46N.exe 30 PID 3004 wrote to memory of 1724 3004 explorer.exe 31 PID 3004 wrote to memory of 1724 3004 explorer.exe 31 PID 3004 wrote to memory of 1724 3004 explorer.exe 31 PID 3004 wrote to memory of 1724 3004 explorer.exe 31 PID 1724 wrote to memory of 2220 1724 spoolsv.exe 32 PID 1724 wrote to memory of 2220 1724 spoolsv.exe 32 PID 1724 wrote to memory of 2220 1724 spoolsv.exe 32 PID 1724 wrote to memory of 2220 1724 spoolsv.exe 32 PID 2220 wrote to memory of 2752 2220 svchost.exe 33 PID 2220 wrote to memory of 2752 2220 svchost.exe 33 PID 2220 wrote to memory of 2752 2220 svchost.exe 33 PID 2220 wrote to memory of 2752 2220 svchost.exe 33 PID 3004 wrote to memory of 2860 3004 explorer.exe 34 PID 3004 wrote to memory of 2860 3004 explorer.exe 34 PID 3004 wrote to memory of 2860 3004 explorer.exe 34 PID 3004 wrote to memory of 2860 3004 explorer.exe 34 PID 2220 wrote to memory of 2060 2220 svchost.exe 35 PID 2220 wrote to memory of 2060 2220 svchost.exe 35 PID 2220 wrote to memory of 2060 2220 svchost.exe 35 PID 2220 wrote to memory of 2060 2220 svchost.exe 35 PID 2220 wrote to memory of 2828 2220 svchost.exe 39 PID 2220 wrote to memory of 2828 2220 svchost.exe 39 PID 2220 wrote to memory of 2828 2220 svchost.exe 39 PID 2220 wrote to memory of 2828 2220 svchost.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\71a808e07d3392bc04529c4bd24b369e9a411e1b27e30cd83eaaefa7b0afbd46N.exe"C:\Users\Admin\AppData\Local\Temp\71a808e07d3392bc04529c4bd24b369e9a411e1b27e30cd83eaaefa7b0afbd46N.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2012 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3004 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1724 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2220 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2752
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 09:17 /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2060
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 09:18 /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2828
-
-
-
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe3⤵PID:2860
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135KB
MD53e3d8c17ae93b4815b8d42d4c72e7fcb
SHA1fd4371e1793b11a10f3e983e1bde00c1911cb325
SHA256ba81c4d13d8632e6ab83e2faa34247733fbc34f66f5d23aa74ce9d67cc4c0715
SHA5127f493c4c978a38367f1f960ceeb86389cc295e5695b6e5885f8684d262af21a37c5cfba3a784da556bf7ce5948c2c94fe49f07b36ac000366bff85e68dca4559
-
Filesize
135KB
MD57c7dbbe70675f0a6b25e58b477f8cffb
SHA164f2c30cd6364b635bfc25065df91697424f9015
SHA256a63ceaa038b49a0b40e80d739fe777f57d60711d32e5f691bda679c22e07a423
SHA512a832540ddf31c1655a4fed27f623e5f9a2c352a25bf1f5cbcace7089ad8b61bc04ad9021b6594c75662ddd94ba0ff5bd2c0430f275982b71ec8c4e96fdcb679c
-
Filesize
135KB
MD536b6967a26b700b97c96fcb39de4366f
SHA1ed73f57cd72fc0d054515db3337e52a3e4cf3ef6
SHA2560c8ccb50d679f2c28c0b5a1d4730dbe216e3c2ddefc8361cf5bc7ba780f02e5b
SHA512f52ff913b0a1e6f8c3b1a0cf07925932e87473c9f623fcb5ed1c9165449883a785892ef6fc4f279d226ce75a52d9ce9a6fc361a613f4d7df2eeb29963ba47760