Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
156s -
max time network
184s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2022, 00:38
Static task
static1
Behavioral task
behavioral1
Sample
33b3ba4b0b667de98dc0f0dfd4f816e1e3c90afcb69e6f573275b66c6e4038f2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
33b3ba4b0b667de98dc0f0dfd4f816e1e3c90afcb69e6f573275b66c6e4038f2.exe
Resource
win10v2004-20220812-en
General
-
Target
33b3ba4b0b667de98dc0f0dfd4f816e1e3c90afcb69e6f573275b66c6e4038f2.exe
-
Size
316KB
-
MD5
65cd83c7e9768ad110d5bf666ee274f0
-
SHA1
72d839f85d1e5370d3627ef4e2280cd346ecda16
-
SHA256
33b3ba4b0b667de98dc0f0dfd4f816e1e3c90afcb69e6f573275b66c6e4038f2
-
SHA512
6413a0ae6fbf11ad75992ea1cb5172af928d1bfa0749362d3ac33ced2c81f5683dc1bccee4741e598c20c68950e55194f5f1628d45890161bce222ad5303ccda
-
SSDEEP
6144:QMU/Y4Psq8gFV91GGGLVTmrshXj0MQH1DUhu1GJu+DODryKnKxU:HEUgFV6Hm1JKxU
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 33b3ba4b0b667de98dc0f0dfd4f816e1e3c90afcb69e6f573275b66c6e4038f2.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" beepoiw.exe -
Executes dropped EXE 1 IoCs
pid Process 3044 beepoiw.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 33b3ba4b0b667de98dc0f0dfd4f816e1e3c90afcb69e6f573275b66c6e4038f2.exe -
Adds Run key to start application 2 TTPs 54 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beepoiw = "C:\\Users\\Admin\\beepoiw.exe /H" beepoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beepoiw = "C:\\Users\\Admin\\beepoiw.exe /E" beepoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beepoiw = "C:\\Users\\Admin\\beepoiw.exe /i" beepoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beepoiw = "C:\\Users\\Admin\\beepoiw.exe /e" beepoiw.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run\ beepoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beepoiw = "C:\\Users\\Admin\\beepoiw.exe /f" beepoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beepoiw = "C:\\Users\\Admin\\beepoiw.exe /A" beepoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beepoiw = "C:\\Users\\Admin\\beepoiw.exe /U" beepoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beepoiw = "C:\\Users\\Admin\\beepoiw.exe /S" beepoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beepoiw = "C:\\Users\\Admin\\beepoiw.exe /I" beepoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beepoiw = "C:\\Users\\Admin\\beepoiw.exe /b" beepoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beepoiw = "C:\\Users\\Admin\\beepoiw.exe /D" beepoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beepoiw = "C:\\Users\\Admin\\beepoiw.exe /g" beepoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beepoiw = "C:\\Users\\Admin\\beepoiw.exe /q" beepoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beepoiw = "C:\\Users\\Admin\\beepoiw.exe /a" beepoiw.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 33b3ba4b0b667de98dc0f0dfd4f816e1e3c90afcb69e6f573275b66c6e4038f2.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beepoiw = "C:\\Users\\Admin\\beepoiw.exe /G" beepoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beepoiw = "C:\\Users\\Admin\\beepoiw.exe /p" beepoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beepoiw = "C:\\Users\\Admin\\beepoiw.exe /L" beepoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beepoiw = "C:\\Users\\Admin\\beepoiw.exe /d" beepoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beepoiw = "C:\\Users\\Admin\\beepoiw.exe /O" beepoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beepoiw = "C:\\Users\\Admin\\beepoiw.exe /w" beepoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beepoiw = "C:\\Users\\Admin\\beepoiw.exe /l" beepoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beepoiw = "C:\\Users\\Admin\\beepoiw.exe /c" beepoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beepoiw = "C:\\Users\\Admin\\beepoiw.exe /m" beepoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beepoiw = "C:\\Users\\Admin\\beepoiw.exe /Z" beepoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beepoiw = "C:\\Users\\Admin\\beepoiw.exe /C" beepoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beepoiw = "C:\\Users\\Admin\\beepoiw.exe /u" beepoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beepoiw = "C:\\Users\\Admin\\beepoiw.exe /t" beepoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beepoiw = "C:\\Users\\Admin\\beepoiw.exe /T" beepoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beepoiw = "C:\\Users\\Admin\\beepoiw.exe /Q" beepoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beepoiw = "C:\\Users\\Admin\\beepoiw.exe /r" beepoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beepoiw = "C:\\Users\\Admin\\beepoiw.exe /h" beepoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beepoiw = "C:\\Users\\Admin\\beepoiw.exe /z" beepoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beepoiw = "C:\\Users\\Admin\\beepoiw.exe /F" beepoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beepoiw = "C:\\Users\\Admin\\beepoiw.exe /J" beepoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beepoiw = "C:\\Users\\Admin\\beepoiw.exe /R" beepoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beepoiw = "C:\\Users\\Admin\\beepoiw.exe /X" beepoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beepoiw = "C:\\Users\\Admin\\beepoiw.exe /k" 33b3ba4b0b667de98dc0f0dfd4f816e1e3c90afcb69e6f573275b66c6e4038f2.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beepoiw = "C:\\Users\\Admin\\beepoiw.exe /s" beepoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beepoiw = "C:\\Users\\Admin\\beepoiw.exe /x" beepoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beepoiw = "C:\\Users\\Admin\\beepoiw.exe /N" beepoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beepoiw = "C:\\Users\\Admin\\beepoiw.exe /k" beepoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beepoiw = "C:\\Users\\Admin\\beepoiw.exe /n" beepoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beepoiw = "C:\\Users\\Admin\\beepoiw.exe /Y" beepoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beepoiw = "C:\\Users\\Admin\\beepoiw.exe /M" beepoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beepoiw = "C:\\Users\\Admin\\beepoiw.exe /v" beepoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beepoiw = "C:\\Users\\Admin\\beepoiw.exe /V" beepoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beepoiw = "C:\\Users\\Admin\\beepoiw.exe /B" beepoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beepoiw = "C:\\Users\\Admin\\beepoiw.exe /W" beepoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beepoiw = "C:\\Users\\Admin\\beepoiw.exe /P" beepoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beepoiw = "C:\\Users\\Admin\\beepoiw.exe /K" beepoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beepoiw = "C:\\Users\\Admin\\beepoiw.exe /y" beepoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beepoiw = "C:\\Users\\Admin\\beepoiw.exe /o" beepoiw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2616 33b3ba4b0b667de98dc0f0dfd4f816e1e3c90afcb69e6f573275b66c6e4038f2.exe 2616 33b3ba4b0b667de98dc0f0dfd4f816e1e3c90afcb69e6f573275b66c6e4038f2.exe 3044 beepoiw.exe 3044 beepoiw.exe 3044 beepoiw.exe 3044 beepoiw.exe 3044 beepoiw.exe 3044 beepoiw.exe 3044 beepoiw.exe 3044 beepoiw.exe 3044 beepoiw.exe 3044 beepoiw.exe 3044 beepoiw.exe 3044 beepoiw.exe 3044 beepoiw.exe 3044 beepoiw.exe 3044 beepoiw.exe 3044 beepoiw.exe 3044 beepoiw.exe 3044 beepoiw.exe 3044 beepoiw.exe 3044 beepoiw.exe 3044 beepoiw.exe 3044 beepoiw.exe 3044 beepoiw.exe 3044 beepoiw.exe 3044 beepoiw.exe 3044 beepoiw.exe 3044 beepoiw.exe 3044 beepoiw.exe 3044 beepoiw.exe 3044 beepoiw.exe 3044 beepoiw.exe 3044 beepoiw.exe 3044 beepoiw.exe 3044 beepoiw.exe 3044 beepoiw.exe 3044 beepoiw.exe 3044 beepoiw.exe 3044 beepoiw.exe 3044 beepoiw.exe 3044 beepoiw.exe 3044 beepoiw.exe 3044 beepoiw.exe 3044 beepoiw.exe 3044 beepoiw.exe 3044 beepoiw.exe 3044 beepoiw.exe 3044 beepoiw.exe 3044 beepoiw.exe 3044 beepoiw.exe 3044 beepoiw.exe 3044 beepoiw.exe 3044 beepoiw.exe 3044 beepoiw.exe 3044 beepoiw.exe 3044 beepoiw.exe 3044 beepoiw.exe 3044 beepoiw.exe 3044 beepoiw.exe 3044 beepoiw.exe 3044 beepoiw.exe 3044 beepoiw.exe 3044 beepoiw.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2616 33b3ba4b0b667de98dc0f0dfd4f816e1e3c90afcb69e6f573275b66c6e4038f2.exe 3044 beepoiw.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2616 wrote to memory of 3044 2616 33b3ba4b0b667de98dc0f0dfd4f816e1e3c90afcb69e6f573275b66c6e4038f2.exe 82 PID 2616 wrote to memory of 3044 2616 33b3ba4b0b667de98dc0f0dfd4f816e1e3c90afcb69e6f573275b66c6e4038f2.exe 82 PID 2616 wrote to memory of 3044 2616 33b3ba4b0b667de98dc0f0dfd4f816e1e3c90afcb69e6f573275b66c6e4038f2.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\33b3ba4b0b667de98dc0f0dfd4f816e1e3c90afcb69e6f573275b66c6e4038f2.exe"C:\Users\Admin\AppData\Local\Temp\33b3ba4b0b667de98dc0f0dfd4f816e1e3c90afcb69e6f573275b66c6e4038f2.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Users\Admin\beepoiw.exe"C:\Users\Admin\beepoiw.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3044
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
316KB
MD5b77b5ba124e8d251d2171c5e635e295b
SHA1d815922eddcc08c05471c4daf1e2b5e35c61f9d0
SHA25649051b1b019c77e4cc1733e9f408a7026279e3df3fac7d2af301f8c28aff4e63
SHA51213558497dcf7b94730bb95eef4825d70c5a918d99dc0989bd3252d3d2a7e9be3bdf2069d88df5c80695508e9909a287e57877cc079113b6c13d0b815c89e0b45
-
Filesize
316KB
MD5b77b5ba124e8d251d2171c5e635e295b
SHA1d815922eddcc08c05471c4daf1e2b5e35c61f9d0
SHA25649051b1b019c77e4cc1733e9f408a7026279e3df3fac7d2af301f8c28aff4e63
SHA51213558497dcf7b94730bb95eef4825d70c5a918d99dc0989bd3252d3d2a7e9be3bdf2069d88df5c80695508e9909a287e57877cc079113b6c13d0b815c89e0b45