Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
41s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02/10/2022, 00:25
Static task
static1
Behavioral task
behavioral1
Sample
c0bc1de86f71d1724083963e4a1031b2defa07f473c2281bb3860f76a094f38b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c0bc1de86f71d1724083963e4a1031b2defa07f473c2281bb3860f76a094f38b.exe
Resource
win10v2004-20220812-en
General
-
Target
c0bc1de86f71d1724083963e4a1031b2defa07f473c2281bb3860f76a094f38b.exe
-
Size
156KB
-
MD5
717e66cbcda10e096555e02a8dda1022
-
SHA1
230e6d6d26f8da94e4a0004543edcbc4f6139973
-
SHA256
c0bc1de86f71d1724083963e4a1031b2defa07f473c2281bb3860f76a094f38b
-
SHA512
6c9d23ab59b93dd00d0b77a2f23b44a10ebde17fac6ea0cb063dc64ecb75c319d4030b39b60fa09f1e66af70c0619974b8fe94d17091cfee4c8bd2b420d671ca
-
SSDEEP
3072:MBd1BE2MtU7Qv0w4ZRRQMMDwtIMCeFP4ANAKE5j4oQHZ:OdDE2R7Qvb4tQTaCeFP4ACd
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" c0bc1de86f71d1724083963e4a1031b2defa07f473c2281bb3860f76a094f38b.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" giuuge.exe -
Executes dropped EXE 1 IoCs
pid Process 1648 giuuge.exe -
Loads dropped DLL 2 IoCs
pid Process 2036 c0bc1de86f71d1724083963e4a1031b2defa07f473c2281bb3860f76a094f38b.exe 2036 c0bc1de86f71d1724083963e4a1031b2defa07f473c2281bb3860f76a094f38b.exe -
Adds Run key to start application 2 TTPs 53 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\giuuge = "C:\\Users\\Admin\\giuuge.exe /h" giuuge.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\giuuge = "C:\\Users\\Admin\\giuuge.exe /Y" giuuge.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\giuuge = "C:\\Users\\Admin\\giuuge.exe /U" giuuge.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\giuuge = "C:\\Users\\Admin\\giuuge.exe /D" giuuge.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\giuuge = "C:\\Users\\Admin\\giuuge.exe /n" giuuge.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\giuuge = "C:\\Users\\Admin\\giuuge.exe /F" giuuge.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\giuuge = "C:\\Users\\Admin\\giuuge.exe /I" giuuge.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\giuuge = "C:\\Users\\Admin\\giuuge.exe /x" giuuge.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\giuuge = "C:\\Users\\Admin\\giuuge.exe /c" giuuge.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\giuuge = "C:\\Users\\Admin\\giuuge.exe /m" giuuge.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\giuuge = "C:\\Users\\Admin\\giuuge.exe /q" giuuge.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\giuuge = "C:\\Users\\Admin\\giuuge.exe /V" giuuge.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\giuuge = "C:\\Users\\Admin\\giuuge.exe /e" giuuge.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\giuuge = "C:\\Users\\Admin\\giuuge.exe /u" giuuge.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\giuuge = "C:\\Users\\Admin\\giuuge.exe /t" giuuge.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\giuuge = "C:\\Users\\Admin\\giuuge.exe /i" giuuge.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\giuuge = "C:\\Users\\Admin\\giuuge.exe /N" giuuge.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\giuuge = "C:\\Users\\Admin\\giuuge.exe /y" giuuge.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\giuuge = "C:\\Users\\Admin\\giuuge.exe /C" giuuge.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\giuuge = "C:\\Users\\Admin\\giuuge.exe /a" giuuge.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\giuuge = "C:\\Users\\Admin\\giuuge.exe /M" giuuge.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\giuuge = "C:\\Users\\Admin\\giuuge.exe /f" giuuge.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\giuuge = "C:\\Users\\Admin\\giuuge.exe /z" giuuge.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ c0bc1de86f71d1724083963e4a1031b2defa07f473c2281bb3860f76a094f38b.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ giuuge.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\giuuge = "C:\\Users\\Admin\\giuuge.exe /g" giuuge.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\giuuge = "C:\\Users\\Admin\\giuuge.exe /j" giuuge.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\giuuge = "C:\\Users\\Admin\\giuuge.exe /b" giuuge.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\giuuge = "C:\\Users\\Admin\\giuuge.exe /R" giuuge.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\giuuge = "C:\\Users\\Admin\\giuuge.exe /w" giuuge.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\giuuge = "C:\\Users\\Admin\\giuuge.exe /K" giuuge.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\giuuge = "C:\\Users\\Admin\\giuuge.exe /Q" giuuge.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\giuuge = "C:\\Users\\Admin\\giuuge.exe /J" giuuge.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\giuuge = "C:\\Users\\Admin\\giuuge.exe /r" giuuge.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\giuuge = "C:\\Users\\Admin\\giuuge.exe /S" giuuge.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\giuuge = "C:\\Users\\Admin\\giuuge.exe /p" giuuge.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\giuuge = "C:\\Users\\Admin\\giuuge.exe /X" giuuge.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\giuuge = "C:\\Users\\Admin\\giuuge.exe /v" giuuge.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\giuuge = "C:\\Users\\Admin\\giuuge.exe /l" giuuge.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\giuuge = "C:\\Users\\Admin\\giuuge.exe /G" giuuge.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\giuuge = "C:\\Users\\Admin\\giuuge.exe /d" giuuge.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\giuuge = "C:\\Users\\Admin\\giuuge.exe /H" giuuge.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\giuuge = "C:\\Users\\Admin\\giuuge.exe /P" giuuge.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\giuuge = "C:\\Users\\Admin\\giuuge.exe /L" giuuge.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\giuuge = "C:\\Users\\Admin\\giuuge.exe /W" giuuge.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\giuuge = "C:\\Users\\Admin\\giuuge.exe /o" giuuge.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\giuuge = "C:\\Users\\Admin\\giuuge.exe /A" giuuge.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\giuuge = "C:\\Users\\Admin\\giuuge.exe /B" giuuge.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\giuuge = "C:\\Users\\Admin\\giuuge.exe /Z" giuuge.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\giuuge = "C:\\Users\\Admin\\giuuge.exe /T" giuuge.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\giuuge = "C:\\Users\\Admin\\giuuge.exe /s" c0bc1de86f71d1724083963e4a1031b2defa07f473c2281bb3860f76a094f38b.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\giuuge = "C:\\Users\\Admin\\giuuge.exe /k" giuuge.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\giuuge = "C:\\Users\\Admin\\giuuge.exe /O" giuuge.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2036 c0bc1de86f71d1724083963e4a1031b2defa07f473c2281bb3860f76a094f38b.exe 1648 giuuge.exe 1648 giuuge.exe 1648 giuuge.exe 1648 giuuge.exe 1648 giuuge.exe 1648 giuuge.exe 1648 giuuge.exe 1648 giuuge.exe 1648 giuuge.exe 1648 giuuge.exe 1648 giuuge.exe 1648 giuuge.exe 1648 giuuge.exe 1648 giuuge.exe 1648 giuuge.exe 1648 giuuge.exe 1648 giuuge.exe 1648 giuuge.exe 1648 giuuge.exe 1648 giuuge.exe 1648 giuuge.exe 1648 giuuge.exe 1648 giuuge.exe 1648 giuuge.exe 1648 giuuge.exe 1648 giuuge.exe 1648 giuuge.exe 1648 giuuge.exe 1648 giuuge.exe 1648 giuuge.exe 1648 giuuge.exe 1648 giuuge.exe 1648 giuuge.exe 1648 giuuge.exe 1648 giuuge.exe 1648 giuuge.exe 1648 giuuge.exe 1648 giuuge.exe 1648 giuuge.exe 1648 giuuge.exe 1648 giuuge.exe 1648 giuuge.exe 1648 giuuge.exe 1648 giuuge.exe 1648 giuuge.exe 1648 giuuge.exe 1648 giuuge.exe 1648 giuuge.exe 1648 giuuge.exe 1648 giuuge.exe 1648 giuuge.exe 1648 giuuge.exe 1648 giuuge.exe 1648 giuuge.exe 1648 giuuge.exe 1648 giuuge.exe 1648 giuuge.exe 1648 giuuge.exe 1648 giuuge.exe 1648 giuuge.exe 1648 giuuge.exe 1648 giuuge.exe 1648 giuuge.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2036 c0bc1de86f71d1724083963e4a1031b2defa07f473c2281bb3860f76a094f38b.exe 1648 giuuge.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2036 wrote to memory of 1648 2036 c0bc1de86f71d1724083963e4a1031b2defa07f473c2281bb3860f76a094f38b.exe 27 PID 2036 wrote to memory of 1648 2036 c0bc1de86f71d1724083963e4a1031b2defa07f473c2281bb3860f76a094f38b.exe 27 PID 2036 wrote to memory of 1648 2036 c0bc1de86f71d1724083963e4a1031b2defa07f473c2281bb3860f76a094f38b.exe 27 PID 2036 wrote to memory of 1648 2036 c0bc1de86f71d1724083963e4a1031b2defa07f473c2281bb3860f76a094f38b.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\c0bc1de86f71d1724083963e4a1031b2defa07f473c2281bb3860f76a094f38b.exe"C:\Users\Admin\AppData\Local\Temp\c0bc1de86f71d1724083963e4a1031b2defa07f473c2281bb3860f76a094f38b.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Users\Admin\giuuge.exe"C:\Users\Admin\giuuge.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1648
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
156KB
MD5bde3bd7aac826e296430f87e7a6e762a
SHA1fbd918cb5e9109736ae93dd760ae9b9800f4f1a3
SHA25686622c07376c26c79cc3aac159bd0f892151fd428cd69e6291ca07487031b5b3
SHA5128f8fd3230b15176240e8e45320c12532bb0c9cdcb976777e31a5dcc01af161013ec6f475ce337bcfff77dc1ce198de3164e3bd09aec2d632cfea20bc571d7f7e
-
Filesize
156KB
MD5bde3bd7aac826e296430f87e7a6e762a
SHA1fbd918cb5e9109736ae93dd760ae9b9800f4f1a3
SHA25686622c07376c26c79cc3aac159bd0f892151fd428cd69e6291ca07487031b5b3
SHA5128f8fd3230b15176240e8e45320c12532bb0c9cdcb976777e31a5dcc01af161013ec6f475ce337bcfff77dc1ce198de3164e3bd09aec2d632cfea20bc571d7f7e
-
Filesize
156KB
MD5bde3bd7aac826e296430f87e7a6e762a
SHA1fbd918cb5e9109736ae93dd760ae9b9800f4f1a3
SHA25686622c07376c26c79cc3aac159bd0f892151fd428cd69e6291ca07487031b5b3
SHA5128f8fd3230b15176240e8e45320c12532bb0c9cdcb976777e31a5dcc01af161013ec6f475ce337bcfff77dc1ce198de3164e3bd09aec2d632cfea20bc571d7f7e
-
Filesize
156KB
MD5bde3bd7aac826e296430f87e7a6e762a
SHA1fbd918cb5e9109736ae93dd760ae9b9800f4f1a3
SHA25686622c07376c26c79cc3aac159bd0f892151fd428cd69e6291ca07487031b5b3
SHA5128f8fd3230b15176240e8e45320c12532bb0c9cdcb976777e31a5dcc01af161013ec6f475ce337bcfff77dc1ce198de3164e3bd09aec2d632cfea20bc571d7f7e