Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2022, 00:30
Static task
static1
Behavioral task
behavioral1
Sample
1448985a2cac29977d527553951d5c04a72e9cda76f8ef1e5c7f6b61f1bdb011.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1448985a2cac29977d527553951d5c04a72e9cda76f8ef1e5c7f6b61f1bdb011.exe
Resource
win10v2004-20220812-en
General
-
Target
1448985a2cac29977d527553951d5c04a72e9cda76f8ef1e5c7f6b61f1bdb011.exe
-
Size
268KB
-
MD5
6fe94326a6de6d12e8ff322ebce37560
-
SHA1
8e40518921762b0991e85bb7bab0f5e71f3cae24
-
SHA256
1448985a2cac29977d527553951d5c04a72e9cda76f8ef1e5c7f6b61f1bdb011
-
SHA512
36ca899025eb73fa162c2f51516099aba335185e8b71307e179aad75d64603ae34436b4e8c57c2b2d0725aaeff29689fe8fdab183675b25570213afe59b478e0
-
SSDEEP
3072:ZsSQrIhFDY1zuBvLen8DlZniqBXv7yOsWvgbsmIHX0WRIh:ZCMk1qFy8xZnisyOs2tHEWRe
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 1448985a2cac29977d527553951d5c04a72e9cda76f8ef1e5c7f6b61f1bdb011.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" fiiehij.exe -
Executes dropped EXE 1 IoCs
pid Process 4160 fiiehij.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 1448985a2cac29977d527553951d5c04a72e9cda76f8ef1e5c7f6b61f1bdb011.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fiiehij = "C:\\Users\\Admin\\fiiehij.exe /p" fiiehij.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fiiehij = "C:\\Users\\Admin\\fiiehij.exe /r" fiiehij.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fiiehij = "C:\\Users\\Admin\\fiiehij.exe /t" fiiehij.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fiiehij = "C:\\Users\\Admin\\fiiehij.exe /a" 1448985a2cac29977d527553951d5c04a72e9cda76f8ef1e5c7f6b61f1bdb011.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fiiehij = "C:\\Users\\Admin\\fiiehij.exe /a" fiiehij.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fiiehij = "C:\\Users\\Admin\\fiiehij.exe /u" fiiehij.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fiiehij = "C:\\Users\\Admin\\fiiehij.exe /m" fiiehij.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fiiehij = "C:\\Users\\Admin\\fiiehij.exe /d" fiiehij.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fiiehij = "C:\\Users\\Admin\\fiiehij.exe /k" fiiehij.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run\ fiiehij.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fiiehij = "C:\\Users\\Admin\\fiiehij.exe /q" fiiehij.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fiiehij = "C:\\Users\\Admin\\fiiehij.exe /f" fiiehij.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fiiehij = "C:\\Users\\Admin\\fiiehij.exe /z" fiiehij.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fiiehij = "C:\\Users\\Admin\\fiiehij.exe /h" fiiehij.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fiiehij = "C:\\Users\\Admin\\fiiehij.exe /e" fiiehij.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fiiehij = "C:\\Users\\Admin\\fiiehij.exe /n" fiiehij.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fiiehij = "C:\\Users\\Admin\\fiiehij.exe /s" fiiehij.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fiiehij = "C:\\Users\\Admin\\fiiehij.exe /o" fiiehij.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fiiehij = "C:\\Users\\Admin\\fiiehij.exe /c" fiiehij.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fiiehij = "C:\\Users\\Admin\\fiiehij.exe /g" fiiehij.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fiiehij = "C:\\Users\\Admin\\fiiehij.exe /l" fiiehij.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fiiehij = "C:\\Users\\Admin\\fiiehij.exe /v" fiiehij.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 1448985a2cac29977d527553951d5c04a72e9cda76f8ef1e5c7f6b61f1bdb011.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fiiehij = "C:\\Users\\Admin\\fiiehij.exe /i" fiiehij.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fiiehij = "C:\\Users\\Admin\\fiiehij.exe /j" fiiehij.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fiiehij = "C:\\Users\\Admin\\fiiehij.exe /x" fiiehij.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fiiehij = "C:\\Users\\Admin\\fiiehij.exe /w" fiiehij.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fiiehij = "C:\\Users\\Admin\\fiiehij.exe /b" fiiehij.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fiiehij = "C:\\Users\\Admin\\fiiehij.exe /y" fiiehij.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1044 1448985a2cac29977d527553951d5c04a72e9cda76f8ef1e5c7f6b61f1bdb011.exe 1044 1448985a2cac29977d527553951d5c04a72e9cda76f8ef1e5c7f6b61f1bdb011.exe 4160 fiiehij.exe 4160 fiiehij.exe 4160 fiiehij.exe 4160 fiiehij.exe 4160 fiiehij.exe 4160 fiiehij.exe 4160 fiiehij.exe 4160 fiiehij.exe 4160 fiiehij.exe 4160 fiiehij.exe 4160 fiiehij.exe 4160 fiiehij.exe 4160 fiiehij.exe 4160 fiiehij.exe 4160 fiiehij.exe 4160 fiiehij.exe 4160 fiiehij.exe 4160 fiiehij.exe 4160 fiiehij.exe 4160 fiiehij.exe 4160 fiiehij.exe 4160 fiiehij.exe 4160 fiiehij.exe 4160 fiiehij.exe 4160 fiiehij.exe 4160 fiiehij.exe 4160 fiiehij.exe 4160 fiiehij.exe 4160 fiiehij.exe 4160 fiiehij.exe 4160 fiiehij.exe 4160 fiiehij.exe 4160 fiiehij.exe 4160 fiiehij.exe 4160 fiiehij.exe 4160 fiiehij.exe 4160 fiiehij.exe 4160 fiiehij.exe 4160 fiiehij.exe 4160 fiiehij.exe 4160 fiiehij.exe 4160 fiiehij.exe 4160 fiiehij.exe 4160 fiiehij.exe 4160 fiiehij.exe 4160 fiiehij.exe 4160 fiiehij.exe 4160 fiiehij.exe 4160 fiiehij.exe 4160 fiiehij.exe 4160 fiiehij.exe 4160 fiiehij.exe 4160 fiiehij.exe 4160 fiiehij.exe 4160 fiiehij.exe 4160 fiiehij.exe 4160 fiiehij.exe 4160 fiiehij.exe 4160 fiiehij.exe 4160 fiiehij.exe 4160 fiiehij.exe 4160 fiiehij.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1044 1448985a2cac29977d527553951d5c04a72e9cda76f8ef1e5c7f6b61f1bdb011.exe 4160 fiiehij.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1044 wrote to memory of 4160 1044 1448985a2cac29977d527553951d5c04a72e9cda76f8ef1e5c7f6b61f1bdb011.exe 82 PID 1044 wrote to memory of 4160 1044 1448985a2cac29977d527553951d5c04a72e9cda76f8ef1e5c7f6b61f1bdb011.exe 82 PID 1044 wrote to memory of 4160 1044 1448985a2cac29977d527553951d5c04a72e9cda76f8ef1e5c7f6b61f1bdb011.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\1448985a2cac29977d527553951d5c04a72e9cda76f8ef1e5c7f6b61f1bdb011.exe"C:\Users\Admin\AppData\Local\Temp\1448985a2cac29977d527553951d5c04a72e9cda76f8ef1e5c7f6b61f1bdb011.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Users\Admin\fiiehij.exe"C:\Users\Admin\fiiehij.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4160
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
268KB
MD5b7572c33767fb89ba423e20688f32c04
SHA17703dd8fa86fb7fc639d60027ad8d2f0683412be
SHA256caf0e79748156d74f07beae078e23d42c29f91a897cc7f719341fc5e7d9ddba1
SHA512276ef82227c89eec852b412cf55bc2975389febe2d21397217560f6e653320b0f945f91528cc8a559e1fe028001b36ebf065e93258ca3a5c24ef84e0d76a879d
-
Filesize
268KB
MD5b7572c33767fb89ba423e20688f32c04
SHA17703dd8fa86fb7fc639d60027ad8d2f0683412be
SHA256caf0e79748156d74f07beae078e23d42c29f91a897cc7f719341fc5e7d9ddba1
SHA512276ef82227c89eec852b412cf55bc2975389febe2d21397217560f6e653320b0f945f91528cc8a559e1fe028001b36ebf065e93258ca3a5c24ef84e0d76a879d