Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/01/2025, 09:15
Static task
static1
Behavioral task
behavioral1
Sample
71a808e07d3392bc04529c4bd24b369e9a411e1b27e30cd83eaaefa7b0afbd46N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
71a808e07d3392bc04529c4bd24b369e9a411e1b27e30cd83eaaefa7b0afbd46N.exe
Resource
win10v2004-20241007-en
General
-
Target
71a808e07d3392bc04529c4bd24b369e9a411e1b27e30cd83eaaefa7b0afbd46N.exe
-
Size
135KB
-
MD5
5266d8ea97ed0539fc9b5a8d0c423ad0
-
SHA1
98a16b5a9cd2083218be383dc110251b11913e06
-
SHA256
71a808e07d3392bc04529c4bd24b369e9a411e1b27e30cd83eaaefa7b0afbd46
-
SHA512
d7e21b7bd9a43b6293c2626a1d2d8ba2e00aeb9edec671916e4bf34a453174c376d5e15cb00a8eb4c6bb31f11573799aa2c8f6c5753b75a455cbc3afcd2ede60
-
SSDEEP
1536:UfsEqouTRcG/Mzvgf7xEuvnXNTRdUzwTekUOisZ1yDDajtXbVLv6w:UVqoCl/YgjxEufVU0TbTyDDalpv6w
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 2268 explorer.exe 4820 spoolsv.exe 4592 svchost.exe 4868 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\themes\explorer.exe 71a808e07d3392bc04529c4bd24b369e9a411e1b27e30cd83eaaefa7b0afbd46N.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 71a808e07d3392bc04529c4bd24b369e9a411e1b27e30cd83eaaefa7b0afbd46N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 848 71a808e07d3392bc04529c4bd24b369e9a411e1b27e30cd83eaaefa7b0afbd46N.exe 848 71a808e07d3392bc04529c4bd24b369e9a411e1b27e30cd83eaaefa7b0afbd46N.exe 848 71a808e07d3392bc04529c4bd24b369e9a411e1b27e30cd83eaaefa7b0afbd46N.exe 848 71a808e07d3392bc04529c4bd24b369e9a411e1b27e30cd83eaaefa7b0afbd46N.exe 848 71a808e07d3392bc04529c4bd24b369e9a411e1b27e30cd83eaaefa7b0afbd46N.exe 848 71a808e07d3392bc04529c4bd24b369e9a411e1b27e30cd83eaaefa7b0afbd46N.exe 848 71a808e07d3392bc04529c4bd24b369e9a411e1b27e30cd83eaaefa7b0afbd46N.exe 848 71a808e07d3392bc04529c4bd24b369e9a411e1b27e30cd83eaaefa7b0afbd46N.exe 848 71a808e07d3392bc04529c4bd24b369e9a411e1b27e30cd83eaaefa7b0afbd46N.exe 848 71a808e07d3392bc04529c4bd24b369e9a411e1b27e30cd83eaaefa7b0afbd46N.exe 848 71a808e07d3392bc04529c4bd24b369e9a411e1b27e30cd83eaaefa7b0afbd46N.exe 848 71a808e07d3392bc04529c4bd24b369e9a411e1b27e30cd83eaaefa7b0afbd46N.exe 848 71a808e07d3392bc04529c4bd24b369e9a411e1b27e30cd83eaaefa7b0afbd46N.exe 848 71a808e07d3392bc04529c4bd24b369e9a411e1b27e30cd83eaaefa7b0afbd46N.exe 848 71a808e07d3392bc04529c4bd24b369e9a411e1b27e30cd83eaaefa7b0afbd46N.exe 848 71a808e07d3392bc04529c4bd24b369e9a411e1b27e30cd83eaaefa7b0afbd46N.exe 848 71a808e07d3392bc04529c4bd24b369e9a411e1b27e30cd83eaaefa7b0afbd46N.exe 848 71a808e07d3392bc04529c4bd24b369e9a411e1b27e30cd83eaaefa7b0afbd46N.exe 848 71a808e07d3392bc04529c4bd24b369e9a411e1b27e30cd83eaaefa7b0afbd46N.exe 848 71a808e07d3392bc04529c4bd24b369e9a411e1b27e30cd83eaaefa7b0afbd46N.exe 848 71a808e07d3392bc04529c4bd24b369e9a411e1b27e30cd83eaaefa7b0afbd46N.exe 848 71a808e07d3392bc04529c4bd24b369e9a411e1b27e30cd83eaaefa7b0afbd46N.exe 848 71a808e07d3392bc04529c4bd24b369e9a411e1b27e30cd83eaaefa7b0afbd46N.exe 848 71a808e07d3392bc04529c4bd24b369e9a411e1b27e30cd83eaaefa7b0afbd46N.exe 848 71a808e07d3392bc04529c4bd24b369e9a411e1b27e30cd83eaaefa7b0afbd46N.exe 848 71a808e07d3392bc04529c4bd24b369e9a411e1b27e30cd83eaaefa7b0afbd46N.exe 848 71a808e07d3392bc04529c4bd24b369e9a411e1b27e30cd83eaaefa7b0afbd46N.exe 848 71a808e07d3392bc04529c4bd24b369e9a411e1b27e30cd83eaaefa7b0afbd46N.exe 848 71a808e07d3392bc04529c4bd24b369e9a411e1b27e30cd83eaaefa7b0afbd46N.exe 848 71a808e07d3392bc04529c4bd24b369e9a411e1b27e30cd83eaaefa7b0afbd46N.exe 848 71a808e07d3392bc04529c4bd24b369e9a411e1b27e30cd83eaaefa7b0afbd46N.exe 848 71a808e07d3392bc04529c4bd24b369e9a411e1b27e30cd83eaaefa7b0afbd46N.exe 848 71a808e07d3392bc04529c4bd24b369e9a411e1b27e30cd83eaaefa7b0afbd46N.exe 848 71a808e07d3392bc04529c4bd24b369e9a411e1b27e30cd83eaaefa7b0afbd46N.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2268 explorer.exe 4592 svchost.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 848 71a808e07d3392bc04529c4bd24b369e9a411e1b27e30cd83eaaefa7b0afbd46N.exe 848 71a808e07d3392bc04529c4bd24b369e9a411e1b27e30cd83eaaefa7b0afbd46N.exe 2268 explorer.exe 2268 explorer.exe 4820 spoolsv.exe 4820 spoolsv.exe 4592 svchost.exe 4592 svchost.exe 4868 spoolsv.exe 4868 spoolsv.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 848 wrote to memory of 2268 848 71a808e07d3392bc04529c4bd24b369e9a411e1b27e30cd83eaaefa7b0afbd46N.exe 83 PID 848 wrote to memory of 2268 848 71a808e07d3392bc04529c4bd24b369e9a411e1b27e30cd83eaaefa7b0afbd46N.exe 83 PID 848 wrote to memory of 2268 848 71a808e07d3392bc04529c4bd24b369e9a411e1b27e30cd83eaaefa7b0afbd46N.exe 83 PID 2268 wrote to memory of 4820 2268 explorer.exe 84 PID 2268 wrote to memory of 4820 2268 explorer.exe 84 PID 2268 wrote to memory of 4820 2268 explorer.exe 84 PID 4820 wrote to memory of 4592 4820 spoolsv.exe 85 PID 4820 wrote to memory of 4592 4820 spoolsv.exe 85 PID 4820 wrote to memory of 4592 4820 spoolsv.exe 85 PID 4592 wrote to memory of 4868 4592 svchost.exe 86 PID 4592 wrote to memory of 4868 4592 svchost.exe 86 PID 4592 wrote to memory of 4868 4592 svchost.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\71a808e07d3392bc04529c4bd24b369e9a411e1b27e30cd83eaaefa7b0afbd46N.exe"C:\Users\Admin\AppData\Local\Temp\71a808e07d3392bc04529c4bd24b369e9a411e1b27e30cd83eaaefa7b0afbd46N.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:848 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2268 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4820 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4592 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4868
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135KB
MD5b5b5d598010068b93e7a043757810495
SHA16eb6226fce8736ba5c25177ddb0d008e58cdbc96
SHA256bc487b2d1809f8a38de2fb77c91628302c6e67ff7e48db68418e47e551f8dbca
SHA51296ba857c3977d3ae4a7b9f9baa0b756882b1c94723e1e6c0bdd2afeb35d42220232f7e1a363fc88ae2b99ab9edead1d62f651694fc1986a708068d106b59b55c
-
Filesize
135KB
MD57dcfaeb78c503f2bedacfa5a63c3e08f
SHA1f667fd3efca63e6250999c960dbc3fd032125e1b
SHA256edd0f4516919288c5a109631f3a8a60012b9fa9182154ee8e0e7e9290825f21e
SHA512f93e0a79e8ecc48b8cfa9068e50aceb3b97a67fe115ca4d93fad6dd87b9d7c32297151d76e0c1a8b0d0edbc5047107234ec52f8882fc6d6ec01d153928c276a1
-
Filesize
135KB
MD5b6a5682f8e2dfa8bcbafd387c42ec728
SHA1e121b53e542ca70d8b31aa6a153e0cf7ce7b711e
SHA25621a0d9166df2c4b1fb05ce40063e37e22f4cb13878a7668536cb1992b02a8fe6
SHA5125a7739567ae44e2626ace1ea879c1565961461d867989685eb7edfdb2481920df05e831c11005189cd722ab60adc44a40d4bc2ea54dfd7865dcf42863b9738aa