Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
155s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2022, 20:36 UTC
Static task
static1
Behavioral task
behavioral1
Sample
c51ad8d5313529c86b30bd3146dac4b278224ad2d492339ebacdd23bd27c4332.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c51ad8d5313529c86b30bd3146dac4b278224ad2d492339ebacdd23bd27c4332.exe
Resource
win10v2004-20220812-en
General
-
Target
c51ad8d5313529c86b30bd3146dac4b278224ad2d492339ebacdd23bd27c4332.exe
-
Size
228KB
-
MD5
76c15054b849efeda1044138224fb8e9
-
SHA1
58c0e9c01a0830ee0d15c17e03d4067304d9c419
-
SHA256
c51ad8d5313529c86b30bd3146dac4b278224ad2d492339ebacdd23bd27c4332
-
SHA512
0fef7c212d40274e12a28a51695ba38bfa73f7126918bfb7172e4c63ed91de5d338999bba11f07723cf15bf3f6c6eacf687f64ed3e55fc573203a254ba56f520
-
SSDEEP
3072:GNBMPJ4T2vaHfQmuKM7U6L9sxsHrl3B0mhQjUqvG44oQZiEIx:SBy4Sva/QVK+SxsHrl3B0mhPq+cW
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" c51ad8d5313529c86b30bd3146dac4b278224ad2d492339ebacdd23bd27c4332.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" beoyio.exe -
Executes dropped EXE 1 IoCs
pid Process 5048 beoyio.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation c51ad8d5313529c86b30bd3146dac4b278224ad2d492339ebacdd23bd27c4332.exe -
Adds Run key to start application 2 TTPs 54 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beoyio = "C:\\Users\\Admin\\beoyio.exe /F" beoyio.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beoyio = "C:\\Users\\Admin\\beoyio.exe /B" beoyio.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beoyio = "C:\\Users\\Admin\\beoyio.exe /A" beoyio.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beoyio = "C:\\Users\\Admin\\beoyio.exe /f" beoyio.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beoyio = "C:\\Users\\Admin\\beoyio.exe /V" beoyio.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run\ beoyio.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beoyio = "C:\\Users\\Admin\\beoyio.exe /d" beoyio.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beoyio = "C:\\Users\\Admin\\beoyio.exe /j" beoyio.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beoyio = "C:\\Users\\Admin\\beoyio.exe /D" beoyio.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beoyio = "C:\\Users\\Admin\\beoyio.exe /W" beoyio.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beoyio = "C:\\Users\\Admin\\beoyio.exe /l" beoyio.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beoyio = "C:\\Users\\Admin\\beoyio.exe /Q" beoyio.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beoyio = "C:\\Users\\Admin\\beoyio.exe /i" beoyio.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beoyio = "C:\\Users\\Admin\\beoyio.exe /o" beoyio.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beoyio = "C:\\Users\\Admin\\beoyio.exe /q" beoyio.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beoyio = "C:\\Users\\Admin\\beoyio.exe /U" beoyio.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beoyio = "C:\\Users\\Admin\\beoyio.exe /L" beoyio.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beoyio = "C:\\Users\\Admin\\beoyio.exe /P" beoyio.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beoyio = "C:\\Users\\Admin\\beoyio.exe /k" beoyio.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beoyio = "C:\\Users\\Admin\\beoyio.exe /w" beoyio.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beoyio = "C:\\Users\\Admin\\beoyio.exe /Y" beoyio.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beoyio = "C:\\Users\\Admin\\beoyio.exe /x" beoyio.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beoyio = "C:\\Users\\Admin\\beoyio.exe /N" beoyio.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beoyio = "C:\\Users\\Admin\\beoyio.exe /I" beoyio.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beoyio = "C:\\Users\\Admin\\beoyio.exe /h" beoyio.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beoyio = "C:\\Users\\Admin\\beoyio.exe /s" beoyio.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beoyio = "C:\\Users\\Admin\\beoyio.exe /y" beoyio.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beoyio = "C:\\Users\\Admin\\beoyio.exe /M" beoyio.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beoyio = "C:\\Users\\Admin\\beoyio.exe /n" beoyio.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beoyio = "C:\\Users\\Admin\\beoyio.exe /b" beoyio.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beoyio = "C:\\Users\\Admin\\beoyio.exe /C" c51ad8d5313529c86b30bd3146dac4b278224ad2d492339ebacdd23bd27c4332.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beoyio = "C:\\Users\\Admin\\beoyio.exe /R" beoyio.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beoyio = "C:\\Users\\Admin\\beoyio.exe /c" beoyio.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beoyio = "C:\\Users\\Admin\\beoyio.exe /S" beoyio.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beoyio = "C:\\Users\\Admin\\beoyio.exe /e" beoyio.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beoyio = "C:\\Users\\Admin\\beoyio.exe /E" beoyio.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beoyio = "C:\\Users\\Admin\\beoyio.exe /T" beoyio.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beoyio = "C:\\Users\\Admin\\beoyio.exe /O" beoyio.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beoyio = "C:\\Users\\Admin\\beoyio.exe /Z" beoyio.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beoyio = "C:\\Users\\Admin\\beoyio.exe /m" beoyio.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beoyio = "C:\\Users\\Admin\\beoyio.exe /u" beoyio.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beoyio = "C:\\Users\\Admin\\beoyio.exe /K" beoyio.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beoyio = "C:\\Users\\Admin\\beoyio.exe /H" beoyio.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beoyio = "C:\\Users\\Admin\\beoyio.exe /C" beoyio.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beoyio = "C:\\Users\\Admin\\beoyio.exe /X" beoyio.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beoyio = "C:\\Users\\Admin\\beoyio.exe /a" beoyio.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beoyio = "C:\\Users\\Admin\\beoyio.exe /G" beoyio.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beoyio = "C:\\Users\\Admin\\beoyio.exe /p" beoyio.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beoyio = "C:\\Users\\Admin\\beoyio.exe /t" beoyio.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beoyio = "C:\\Users\\Admin\\beoyio.exe /z" beoyio.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beoyio = "C:\\Users\\Admin\\beoyio.exe /v" beoyio.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beoyio = "C:\\Users\\Admin\\beoyio.exe /r" beoyio.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beoyio = "C:\\Users\\Admin\\beoyio.exe /J" beoyio.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run\ c51ad8d5313529c86b30bd3146dac4b278224ad2d492339ebacdd23bd27c4332.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4204 c51ad8d5313529c86b30bd3146dac4b278224ad2d492339ebacdd23bd27c4332.exe 4204 c51ad8d5313529c86b30bd3146dac4b278224ad2d492339ebacdd23bd27c4332.exe 5048 beoyio.exe 5048 beoyio.exe 5048 beoyio.exe 5048 beoyio.exe 5048 beoyio.exe 5048 beoyio.exe 5048 beoyio.exe 5048 beoyio.exe 5048 beoyio.exe 5048 beoyio.exe 5048 beoyio.exe 5048 beoyio.exe 5048 beoyio.exe 5048 beoyio.exe 5048 beoyio.exe 5048 beoyio.exe 5048 beoyio.exe 5048 beoyio.exe 5048 beoyio.exe 5048 beoyio.exe 5048 beoyio.exe 5048 beoyio.exe 5048 beoyio.exe 5048 beoyio.exe 5048 beoyio.exe 5048 beoyio.exe 5048 beoyio.exe 5048 beoyio.exe 5048 beoyio.exe 5048 beoyio.exe 5048 beoyio.exe 5048 beoyio.exe 5048 beoyio.exe 5048 beoyio.exe 5048 beoyio.exe 5048 beoyio.exe 5048 beoyio.exe 5048 beoyio.exe 5048 beoyio.exe 5048 beoyio.exe 5048 beoyio.exe 5048 beoyio.exe 5048 beoyio.exe 5048 beoyio.exe 5048 beoyio.exe 5048 beoyio.exe 5048 beoyio.exe 5048 beoyio.exe 5048 beoyio.exe 5048 beoyio.exe 5048 beoyio.exe 5048 beoyio.exe 5048 beoyio.exe 5048 beoyio.exe 5048 beoyio.exe 5048 beoyio.exe 5048 beoyio.exe 5048 beoyio.exe 5048 beoyio.exe 5048 beoyio.exe 5048 beoyio.exe 5048 beoyio.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4204 c51ad8d5313529c86b30bd3146dac4b278224ad2d492339ebacdd23bd27c4332.exe 5048 beoyio.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4204 wrote to memory of 5048 4204 c51ad8d5313529c86b30bd3146dac4b278224ad2d492339ebacdd23bd27c4332.exe 81 PID 4204 wrote to memory of 5048 4204 c51ad8d5313529c86b30bd3146dac4b278224ad2d492339ebacdd23bd27c4332.exe 81 PID 4204 wrote to memory of 5048 4204 c51ad8d5313529c86b30bd3146dac4b278224ad2d492339ebacdd23bd27c4332.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\c51ad8d5313529c86b30bd3146dac4b278224ad2d492339ebacdd23bd27c4332.exe"C:\Users\Admin\AppData\Local\Temp\c51ad8d5313529c86b30bd3146dac4b278224ad2d492339ebacdd23bd27c4332.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4204 -
C:\Users\Admin\beoyio.exe"C:\Users\Admin\beoyio.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5048
-
Network
-
Remote address:8.8.8.8:53Requestns1.player1532.comIN AResponse
-
Remote address:8.8.8.8:53Requestns1.videoall.orgIN AResponse
-
Remote address:8.8.8.8:53Requestns1.videoall.orgIN AResponse
-
322 B 7
-
260 B 5
-
322 B 7
-
322 B 7
-
322 B 7
-
322 B 7
-
8.8.8.8:53ns1.player1532.comdnsc51ad8d5313529c86b30bd3146dac4b278224ad2d492339ebacdd23bd27c4332.exe64 B 137 B 1 1
DNS Request
ns1.player1532.com
-
8.8.8.8:53ns1.videoall.orgdnsc51ad8d5313529c86b30bd3146dac4b278224ad2d492339ebacdd23bd27c4332.exe124 B 288 B 2 2
DNS Request
ns1.videoall.org
DNS Request
ns1.videoall.org
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
228KB
MD5730179341d080b1006493d909849f7f9
SHA10d87609e6c4639dec17fd4e166f95f9bfea85a1b
SHA25621c614e6b299655f8539d124b75ca85e474c33eed316194a78eba5858ea6690b
SHA51275c7b1e13617d5843b067864519b083d3dfa9b0c27d0fef0f863c854995fd08f465593021c2f18c4cfe027223191d610a4ee14ae1109cefefe979a13ce3c25fa
-
Filesize
228KB
MD5730179341d080b1006493d909849f7f9
SHA10d87609e6c4639dec17fd4e166f95f9bfea85a1b
SHA25621c614e6b299655f8539d124b75ca85e474c33eed316194a78eba5858ea6690b
SHA51275c7b1e13617d5843b067864519b083d3dfa9b0c27d0fef0f863c854995fd08f465593021c2f18c4cfe027223191d610a4ee14ae1109cefefe979a13ce3c25fa