Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
154s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
11/10/2022, 20:29
Static task
static1
Behavioral task
behavioral1
Sample
569b20b5c29521ef8ae02ce31de4216b1d30c194d101e63f6987f47f3832e293.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
569b20b5c29521ef8ae02ce31de4216b1d30c194d101e63f6987f47f3832e293.exe
Resource
win10v2004-20220812-en
General
-
Target
569b20b5c29521ef8ae02ce31de4216b1d30c194d101e63f6987f47f3832e293.exe
-
Size
156KB
-
MD5
6c0a33f53233906586cd6ba124aa1dc8
-
SHA1
9165be1ca5a0f91d8d21b173ac4be7188418e3f9
-
SHA256
569b20b5c29521ef8ae02ce31de4216b1d30c194d101e63f6987f47f3832e293
-
SHA512
42d6704a63d5b98ece548da88d1ecccd15b7fff4469753328f5b31bac2b898a23153d0b95a639f9af7abbbd592f9bb41eb77ba52154cdd3988d215ae7c3c66e2
-
SSDEEP
1536:MZan4ngzp0B8GMNuRe305Xrud5N9jRMmBUKH7zD87/u+JcBqVbv1BsbhbEle+RRw:fogekufubFKVXcBqB1BGSjNX
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 569b20b5c29521ef8ae02ce31de4216b1d30c194d101e63f6987f47f3832e293.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" htbeuk.exe -
Executes dropped EXE 1 IoCs
pid Process 1480 htbeuk.exe -
Loads dropped DLL 2 IoCs
pid Process 1148 569b20b5c29521ef8ae02ce31de4216b1d30c194d101e63f6987f47f3832e293.exe 1148 569b20b5c29521ef8ae02ce31de4216b1d30c194d101e63f6987f47f3832e293.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\htbeuk = "C:\\Users\\Admin\\htbeuk.exe /q" htbeuk.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\htbeuk = "C:\\Users\\Admin\\htbeuk.exe /a" htbeuk.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\htbeuk = "C:\\Users\\Admin\\htbeuk.exe /k" htbeuk.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\htbeuk = "C:\\Users\\Admin\\htbeuk.exe /n" htbeuk.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ htbeuk.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\htbeuk = "C:\\Users\\Admin\\htbeuk.exe /w" htbeuk.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\htbeuk = "C:\\Users\\Admin\\htbeuk.exe /f" htbeuk.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 569b20b5c29521ef8ae02ce31de4216b1d30c194d101e63f6987f47f3832e293.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\htbeuk = "C:\\Users\\Admin\\htbeuk.exe /d" 569b20b5c29521ef8ae02ce31de4216b1d30c194d101e63f6987f47f3832e293.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\htbeuk = "C:\\Users\\Admin\\htbeuk.exe /s" htbeuk.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\htbeuk = "C:\\Users\\Admin\\htbeuk.exe /x" htbeuk.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\htbeuk = "C:\\Users\\Admin\\htbeuk.exe /p" htbeuk.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\htbeuk = "C:\\Users\\Admin\\htbeuk.exe /u" htbeuk.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\htbeuk = "C:\\Users\\Admin\\htbeuk.exe /l" htbeuk.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\htbeuk = "C:\\Users\\Admin\\htbeuk.exe /g" htbeuk.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\htbeuk = "C:\\Users\\Admin\\htbeuk.exe /b" htbeuk.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\htbeuk = "C:\\Users\\Admin\\htbeuk.exe /i" htbeuk.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\htbeuk = "C:\\Users\\Admin\\htbeuk.exe /t" htbeuk.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\htbeuk = "C:\\Users\\Admin\\htbeuk.exe /v" htbeuk.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\htbeuk = "C:\\Users\\Admin\\htbeuk.exe /d" htbeuk.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\htbeuk = "C:\\Users\\Admin\\htbeuk.exe /j" htbeuk.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\htbeuk = "C:\\Users\\Admin\\htbeuk.exe /h" htbeuk.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\htbeuk = "C:\\Users\\Admin\\htbeuk.exe /o" htbeuk.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\htbeuk = "C:\\Users\\Admin\\htbeuk.exe /e" htbeuk.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\htbeuk = "C:\\Users\\Admin\\htbeuk.exe /c" htbeuk.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\htbeuk = "C:\\Users\\Admin\\htbeuk.exe /m" htbeuk.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\htbeuk = "C:\\Users\\Admin\\htbeuk.exe /r" htbeuk.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\htbeuk = "C:\\Users\\Admin\\htbeuk.exe /y" htbeuk.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\htbeuk = "C:\\Users\\Admin\\htbeuk.exe /z" htbeuk.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1148 569b20b5c29521ef8ae02ce31de4216b1d30c194d101e63f6987f47f3832e293.exe 1480 htbeuk.exe 1480 htbeuk.exe 1480 htbeuk.exe 1480 htbeuk.exe 1480 htbeuk.exe 1480 htbeuk.exe 1480 htbeuk.exe 1480 htbeuk.exe 1480 htbeuk.exe 1480 htbeuk.exe 1480 htbeuk.exe 1480 htbeuk.exe 1480 htbeuk.exe 1480 htbeuk.exe 1480 htbeuk.exe 1480 htbeuk.exe 1480 htbeuk.exe 1480 htbeuk.exe 1480 htbeuk.exe 1480 htbeuk.exe 1480 htbeuk.exe 1480 htbeuk.exe 1480 htbeuk.exe 1480 htbeuk.exe 1480 htbeuk.exe 1480 htbeuk.exe 1480 htbeuk.exe 1480 htbeuk.exe 1480 htbeuk.exe 1480 htbeuk.exe 1480 htbeuk.exe 1480 htbeuk.exe 1480 htbeuk.exe 1480 htbeuk.exe 1480 htbeuk.exe 1480 htbeuk.exe 1480 htbeuk.exe 1480 htbeuk.exe 1480 htbeuk.exe 1480 htbeuk.exe 1480 htbeuk.exe 1480 htbeuk.exe 1480 htbeuk.exe 1480 htbeuk.exe 1480 htbeuk.exe 1480 htbeuk.exe 1480 htbeuk.exe 1480 htbeuk.exe 1480 htbeuk.exe 1480 htbeuk.exe 1480 htbeuk.exe 1480 htbeuk.exe 1480 htbeuk.exe 1480 htbeuk.exe 1480 htbeuk.exe 1480 htbeuk.exe 1480 htbeuk.exe 1480 htbeuk.exe 1480 htbeuk.exe 1480 htbeuk.exe 1480 htbeuk.exe 1480 htbeuk.exe 1480 htbeuk.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1148 569b20b5c29521ef8ae02ce31de4216b1d30c194d101e63f6987f47f3832e293.exe 1480 htbeuk.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1148 wrote to memory of 1480 1148 569b20b5c29521ef8ae02ce31de4216b1d30c194d101e63f6987f47f3832e293.exe 27 PID 1148 wrote to memory of 1480 1148 569b20b5c29521ef8ae02ce31de4216b1d30c194d101e63f6987f47f3832e293.exe 27 PID 1148 wrote to memory of 1480 1148 569b20b5c29521ef8ae02ce31de4216b1d30c194d101e63f6987f47f3832e293.exe 27 PID 1148 wrote to memory of 1480 1148 569b20b5c29521ef8ae02ce31de4216b1d30c194d101e63f6987f47f3832e293.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\569b20b5c29521ef8ae02ce31de4216b1d30c194d101e63f6987f47f3832e293.exe"C:\Users\Admin\AppData\Local\Temp\569b20b5c29521ef8ae02ce31de4216b1d30c194d101e63f6987f47f3832e293.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Users\Admin\htbeuk.exe"C:\Users\Admin\htbeuk.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1480
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
156KB
MD57bf53e2229f231223eebfb8c9f2b4d49
SHA16f44a278b4b7d3369595a9e3f620f2ca0e3b3933
SHA25684a430a27bdd7eb3df835ac858bb32d684569a1dbcbf3301b166c5f99238976b
SHA512d4a7673cd9b6a98b975c35b0b05898e5e85044c7f7e289d6718bdb8ee214cb60216a71c9b6217fff68cebfeea0b6fd08e52e18a9aa82c4f7ecab35b5fccfb4b5
-
Filesize
156KB
MD57bf53e2229f231223eebfb8c9f2b4d49
SHA16f44a278b4b7d3369595a9e3f620f2ca0e3b3933
SHA25684a430a27bdd7eb3df835ac858bb32d684569a1dbcbf3301b166c5f99238976b
SHA512d4a7673cd9b6a98b975c35b0b05898e5e85044c7f7e289d6718bdb8ee214cb60216a71c9b6217fff68cebfeea0b6fd08e52e18a9aa82c4f7ecab35b5fccfb4b5
-
Filesize
156KB
MD57bf53e2229f231223eebfb8c9f2b4d49
SHA16f44a278b4b7d3369595a9e3f620f2ca0e3b3933
SHA25684a430a27bdd7eb3df835ac858bb32d684569a1dbcbf3301b166c5f99238976b
SHA512d4a7673cd9b6a98b975c35b0b05898e5e85044c7f7e289d6718bdb8ee214cb60216a71c9b6217fff68cebfeea0b6fd08e52e18a9aa82c4f7ecab35b5fccfb4b5
-
Filesize
156KB
MD57bf53e2229f231223eebfb8c9f2b4d49
SHA16f44a278b4b7d3369595a9e3f620f2ca0e3b3933
SHA25684a430a27bdd7eb3df835ac858bb32d684569a1dbcbf3301b166c5f99238976b
SHA512d4a7673cd9b6a98b975c35b0b05898e5e85044c7f7e289d6718bdb8ee214cb60216a71c9b6217fff68cebfeea0b6fd08e52e18a9aa82c4f7ecab35b5fccfb4b5