Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01/10/2022, 17:24
Static task
static1
Behavioral task
behavioral1
Sample
df2aa1d6f25c273676a5e424286792c20bd3dec7096c8ac36143f018c66619dc.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
df2aa1d6f25c273676a5e424286792c20bd3dec7096c8ac36143f018c66619dc.exe
Resource
win10v2004-20220812-en
General
-
Target
df2aa1d6f25c273676a5e424286792c20bd3dec7096c8ac36143f018c66619dc.exe
-
Size
992KB
-
MD5
728c92b937610a7631c30e65b92f6790
-
SHA1
47e9fd333ab90625cfcb5e7f9563a40bf8eda104
-
SHA256
df2aa1d6f25c273676a5e424286792c20bd3dec7096c8ac36143f018c66619dc
-
SHA512
af71486076d8f56c01d5d81b1f22df8b6081ec910b1a112fbd77e76c8b38b29ce31691627efb6bcde15e8917ced08c77b0de219d1136062742c16d36697e6a83
-
SSDEEP
24576:jrxLy1t/JHIYIbwayccc5Yk1GRxVEvWEsEfB4:ZG1FJHIR15YkgnVEvsEfi
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\ProgramData\\DoEckAMQ\\MewoQYsw.exe," df2aa1d6f25c273676a5e424286792c20bd3dec7096c8ac36143f018c66619dc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\ProgramData\\DoEckAMQ\\MewoQYsw.exe," df2aa1d6f25c273676a5e424286792c20bd3dec7096c8ac36143f018c66619dc.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Executes dropped EXE 4 IoCs
pid Process 1312 nEcQgsEA.exe 1848 MewoQYsw.exe 2572 UEoYYkEc.exe 3024 MewoQYsw.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation nEcQgsEA.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MewoQYsw.exe = "C:\\ProgramData\\DoEckAMQ\\MewoQYsw.exe" df2aa1d6f25c273676a5e424286792c20bd3dec7096c8ac36143f018c66619dc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nEcQgsEA.exe = "C:\\Users\\Admin\\ReAcIIME\\nEcQgsEA.exe" nEcQgsEA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MewoQYsw.exe = "C:\\ProgramData\\DoEckAMQ\\MewoQYsw.exe" MewoQYsw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MewoQYsw.exe = "C:\\ProgramData\\DoEckAMQ\\MewoQYsw.exe" MewoQYsw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MewoQYsw.exe = "C:\\ProgramData\\DoEckAMQ\\MewoQYsw.exe" UEoYYkEc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nEcQgsEA.exe = "C:\\Users\\Admin\\ReAcIIME\\nEcQgsEA.exe" df2aa1d6f25c273676a5e424286792c20bd3dec7096c8ac36143f018c66619dc.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\shell32.dll.exe nEcQgsEA.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\ReAcIIME UEoYYkEc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\ReAcIIME\nEcQgsEA UEoYYkEc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry key 1 TTPs 3 IoCs
pid Process 1396 reg.exe 2952 reg.exe 2668 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4644 df2aa1d6f25c273676a5e424286792c20bd3dec7096c8ac36143f018c66619dc.exe 4644 df2aa1d6f25c273676a5e424286792c20bd3dec7096c8ac36143f018c66619dc.exe 4644 df2aa1d6f25c273676a5e424286792c20bd3dec7096c8ac36143f018c66619dc.exe 4644 df2aa1d6f25c273676a5e424286792c20bd3dec7096c8ac36143f018c66619dc.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1312 nEcQgsEA.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe 1312 nEcQgsEA.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4644 wrote to memory of 1312 4644 df2aa1d6f25c273676a5e424286792c20bd3dec7096c8ac36143f018c66619dc.exe 82 PID 4644 wrote to memory of 1312 4644 df2aa1d6f25c273676a5e424286792c20bd3dec7096c8ac36143f018c66619dc.exe 82 PID 4644 wrote to memory of 1312 4644 df2aa1d6f25c273676a5e424286792c20bd3dec7096c8ac36143f018c66619dc.exe 82 PID 4644 wrote to memory of 1848 4644 df2aa1d6f25c273676a5e424286792c20bd3dec7096c8ac36143f018c66619dc.exe 83 PID 4644 wrote to memory of 1848 4644 df2aa1d6f25c273676a5e424286792c20bd3dec7096c8ac36143f018c66619dc.exe 83 PID 4644 wrote to memory of 1848 4644 df2aa1d6f25c273676a5e424286792c20bd3dec7096c8ac36143f018c66619dc.exe 83 PID 1312 wrote to memory of 3024 1312 nEcQgsEA.exe 87 PID 1312 wrote to memory of 3024 1312 nEcQgsEA.exe 87 PID 1312 wrote to memory of 3024 1312 nEcQgsEA.exe 87 PID 4644 wrote to memory of 1396 4644 df2aa1d6f25c273676a5e424286792c20bd3dec7096c8ac36143f018c66619dc.exe 98 PID 4644 wrote to memory of 1396 4644 df2aa1d6f25c273676a5e424286792c20bd3dec7096c8ac36143f018c66619dc.exe 98 PID 4644 wrote to memory of 1396 4644 df2aa1d6f25c273676a5e424286792c20bd3dec7096c8ac36143f018c66619dc.exe 98 PID 4644 wrote to memory of 2952 4644 df2aa1d6f25c273676a5e424286792c20bd3dec7096c8ac36143f018c66619dc.exe 93 PID 4644 wrote to memory of 2952 4644 df2aa1d6f25c273676a5e424286792c20bd3dec7096c8ac36143f018c66619dc.exe 93 PID 4644 wrote to memory of 2952 4644 df2aa1d6f25c273676a5e424286792c20bd3dec7096c8ac36143f018c66619dc.exe 93 PID 4644 wrote to memory of 2668 4644 df2aa1d6f25c273676a5e424286792c20bd3dec7096c8ac36143f018c66619dc.exe 96 PID 4644 wrote to memory of 2668 4644 df2aa1d6f25c273676a5e424286792c20bd3dec7096c8ac36143f018c66619dc.exe 96 PID 4644 wrote to memory of 2668 4644 df2aa1d6f25c273676a5e424286792c20bd3dec7096c8ac36143f018c66619dc.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\df2aa1d6f25c273676a5e424286792c20bd3dec7096c8ac36143f018c66619dc.exe"C:\Users\Admin\AppData\Local\Temp\df2aa1d6f25c273676a5e424286792c20bd3dec7096c8ac36143f018c66619dc.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Users\Admin\ReAcIIME\nEcQgsEA.exe"C:\Users\Admin\ReAcIIME\nEcQgsEA.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\ProgramData\DoEckAMQ\MewoQYsw.exe"C:\ProgramData\DoEckAMQ\MewoQYsw.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3024
-
-
-
C:\ProgramData\DoEckAMQ\MewoQYsw.exe"C:\ProgramData\DoEckAMQ\MewoQYsw.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1848
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵
- Modifies registry key
PID:2952
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵
- UAC bypass
- Modifies registry key
PID:2668
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:1396
-
-
C:\ProgramData\kMMgkswo\UEoYYkEc.exeC:\ProgramData\kMMgkswo\UEoYYkEc.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:2572
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
980KB
MD5203f435850e4efe54c916c8e4b3a6136
SHA1e477f33d73a331b89df61d33f9ef0d70aca13027
SHA256b012b00b64bda89a3074c24f03a379ffa7ce23686a40329f86da3d15ff7b6aec
SHA51232f0af5033953b6ccc9475a0eddfe8f51b9fbb5d92129f36a2fac59127f784ebdfb73002fbf5b18dc10c9a7930f55d91dcb37ab188f73ce5bd64bf6866bc4714
-
Filesize
980KB
MD5203f435850e4efe54c916c8e4b3a6136
SHA1e477f33d73a331b89df61d33f9ef0d70aca13027
SHA256b012b00b64bda89a3074c24f03a379ffa7ce23686a40329f86da3d15ff7b6aec
SHA51232f0af5033953b6ccc9475a0eddfe8f51b9fbb5d92129f36a2fac59127f784ebdfb73002fbf5b18dc10c9a7930f55d91dcb37ab188f73ce5bd64bf6866bc4714
-
Filesize
980KB
MD5203f435850e4efe54c916c8e4b3a6136
SHA1e477f33d73a331b89df61d33f9ef0d70aca13027
SHA256b012b00b64bda89a3074c24f03a379ffa7ce23686a40329f86da3d15ff7b6aec
SHA51232f0af5033953b6ccc9475a0eddfe8f51b9fbb5d92129f36a2fac59127f784ebdfb73002fbf5b18dc10c9a7930f55d91dcb37ab188f73ce5bd64bf6866bc4714
-
Filesize
984KB
MD5932bb9aa5a65dfab38a77c1650d40ba1
SHA1d72b578b3164bbfaddb5b64406f5443a06bf385d
SHA256fdb30d5383647f664f692c1c86295e9d1d5dfa085e665e8df7b31d3b80bc4090
SHA512d30fffd5ec66459af35e03309c6cd4f41b78459228936f9e3cb6f1c2a22f0152dc6977d8f5a2d8540c0b2259e1d9d77b2f4e007d2fc50848cc4f60112777dce8
-
Filesize
984KB
MD5932bb9aa5a65dfab38a77c1650d40ba1
SHA1d72b578b3164bbfaddb5b64406f5443a06bf385d
SHA256fdb30d5383647f664f692c1c86295e9d1d5dfa085e665e8df7b31d3b80bc4090
SHA512d30fffd5ec66459af35e03309c6cd4f41b78459228936f9e3cb6f1c2a22f0152dc6977d8f5a2d8540c0b2259e1d9d77b2f4e007d2fc50848cc4f60112777dce8
-
Filesize
982KB
MD5ffbea279f914ceac8ea50589c9c5b6d6
SHA1ff4a617eb02998edc6814a2bd53c406d100642ce
SHA2563eed78dd25af3e581d3f178d01318cad0faea16fc23cefe4fbf601fa11b0c36c
SHA512065d5127bbf0614cf46d774a973e76e91963f70eabb278b75765cf6a55844ee05490f819c57c7467aa2574602c447e76e99df3be316dc7f048017d14e1886592
-
Filesize
982KB
MD5ffbea279f914ceac8ea50589c9c5b6d6
SHA1ff4a617eb02998edc6814a2bd53c406d100642ce
SHA2563eed78dd25af3e581d3f178d01318cad0faea16fc23cefe4fbf601fa11b0c36c
SHA512065d5127bbf0614cf46d774a973e76e91963f70eabb278b75765cf6a55844ee05490f819c57c7467aa2574602c447e76e99df3be316dc7f048017d14e1886592