Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2022, 20:43
Static task
static1
Behavioral task
behavioral1
Sample
17b3b3ab6abfd697dbef20be374d736a3e5997d606678a91b16b92935a7f3243.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
17b3b3ab6abfd697dbef20be374d736a3e5997d606678a91b16b92935a7f3243.exe
Resource
win10v2004-20220812-en
General
-
Target
17b3b3ab6abfd697dbef20be374d736a3e5997d606678a91b16b92935a7f3243.exe
-
Size
208KB
-
MD5
7afa320722d53e647956d52b50e0a7a0
-
SHA1
dcdfe35bb90ba5b031532c3bd483328027cf21ce
-
SHA256
17b3b3ab6abfd697dbef20be374d736a3e5997d606678a91b16b92935a7f3243
-
SHA512
abb5c26a77d42ea20c6ae53ef6c0805cf3fa30845a9dd8b74b3ac919f81d0c7c4a18fc3922ad58c1c685efeae0e8a55f608ca0c90f1297f5eb55962dd167ffab
-
SSDEEP
6144:UBDrWZrQ+ONFDTIvgte8R2rHFllXgDMWd65QXoHqxVDTG/r1pAa+/mf2X+AxJ9:UBXWZrQ+ONFDTIvgte8R2rHFllXgDMWV
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 17b3b3ab6abfd697dbef20be374d736a3e5997d606678a91b16b92935a7f3243.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" tuueme.exe -
Executes dropped EXE 1 IoCs
pid Process 3592 tuueme.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 17b3b3ab6abfd697dbef20be374d736a3e5997d606678a91b16b92935a7f3243.exe -
Adds Run key to start application 2 TTPs 53 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tuueme = "C:\\Users\\Admin\\tuueme.exe /e" tuueme.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 17b3b3ab6abfd697dbef20be374d736a3e5997d606678a91b16b92935a7f3243.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tuueme = "C:\\Users\\Admin\\tuueme.exe /I" tuueme.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tuueme = "C:\\Users\\Admin\\tuueme.exe /P" tuueme.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tuueme = "C:\\Users\\Admin\\tuueme.exe /f" tuueme.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tuueme = "C:\\Users\\Admin\\tuueme.exe /H" tuueme.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tuueme = "C:\\Users\\Admin\\tuueme.exe /W" tuueme.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tuueme = "C:\\Users\\Admin\\tuueme.exe /K" tuueme.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tuueme = "C:\\Users\\Admin\\tuueme.exe /i" tuueme.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tuueme = "C:\\Users\\Admin\\tuueme.exe /J" tuueme.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tuueme = "C:\\Users\\Admin\\tuueme.exe /S" tuueme.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run\ tuueme.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tuueme = "C:\\Users\\Admin\\tuueme.exe /t" tuueme.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tuueme = "C:\\Users\\Admin\\tuueme.exe /T" tuueme.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tuueme = "C:\\Users\\Admin\\tuueme.exe /v" tuueme.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tuueme = "C:\\Users\\Admin\\tuueme.exe /a" tuueme.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tuueme = "C:\\Users\\Admin\\tuueme.exe /q" tuueme.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tuueme = "C:\\Users\\Admin\\tuueme.exe /m" tuueme.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tuueme = "C:\\Users\\Admin\\tuueme.exe /Y" tuueme.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tuueme = "C:\\Users\\Admin\\tuueme.exe /j" tuueme.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tuueme = "C:\\Users\\Admin\\tuueme.exe /M" tuueme.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tuueme = "C:\\Users\\Admin\\tuueme.exe /F" tuueme.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tuueme = "C:\\Users\\Admin\\tuueme.exe /y" tuueme.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tuueme = "C:\\Users\\Admin\\tuueme.exe /Z" tuueme.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tuueme = "C:\\Users\\Admin\\tuueme.exe /w" tuueme.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tuueme = "C:\\Users\\Admin\\tuueme.exe /N" tuueme.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tuueme = "C:\\Users\\Admin\\tuueme.exe /s" tuueme.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tuueme = "C:\\Users\\Admin\\tuueme.exe /g" tuueme.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tuueme = "C:\\Users\\Admin\\tuueme.exe /O" tuueme.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tuueme = "C:\\Users\\Admin\\tuueme.exe /n" tuueme.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tuueme = "C:\\Users\\Admin\\tuueme.exe /E" tuueme.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tuueme = "C:\\Users\\Admin\\tuueme.exe /u" tuueme.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tuueme = "C:\\Users\\Admin\\tuueme.exe /r" tuueme.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tuueme = "C:\\Users\\Admin\\tuueme.exe /V" tuueme.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tuueme = "C:\\Users\\Admin\\tuueme.exe /C" tuueme.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tuueme = "C:\\Users\\Admin\\tuueme.exe /k" tuueme.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tuueme = "C:\\Users\\Admin\\tuueme.exe /z" tuueme.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tuueme = "C:\\Users\\Admin\\tuueme.exe /j" 17b3b3ab6abfd697dbef20be374d736a3e5997d606678a91b16b92935a7f3243.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tuueme = "C:\\Users\\Admin\\tuueme.exe /U" tuueme.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tuueme = "C:\\Users\\Admin\\tuueme.exe /L" tuueme.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tuueme = "C:\\Users\\Admin\\tuueme.exe /X" tuueme.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tuueme = "C:\\Users\\Admin\\tuueme.exe /c" tuueme.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tuueme = "C:\\Users\\Admin\\tuueme.exe /B" tuueme.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tuueme = "C:\\Users\\Admin\\tuueme.exe /G" tuueme.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tuueme = "C:\\Users\\Admin\\tuueme.exe /p" tuueme.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tuueme = "C:\\Users\\Admin\\tuueme.exe /R" tuueme.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tuueme = "C:\\Users\\Admin\\tuueme.exe /b" tuueme.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tuueme = "C:\\Users\\Admin\\tuueme.exe /D" tuueme.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tuueme = "C:\\Users\\Admin\\tuueme.exe /l" tuueme.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tuueme = "C:\\Users\\Admin\\tuueme.exe /o" tuueme.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tuueme = "C:\\Users\\Admin\\tuueme.exe /d" tuueme.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tuueme = "C:\\Users\\Admin\\tuueme.exe /h" tuueme.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tuueme = "C:\\Users\\Admin\\tuueme.exe /Q" tuueme.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1948 17b3b3ab6abfd697dbef20be374d736a3e5997d606678a91b16b92935a7f3243.exe 1948 17b3b3ab6abfd697dbef20be374d736a3e5997d606678a91b16b92935a7f3243.exe 3592 tuueme.exe 3592 tuueme.exe 3592 tuueme.exe 3592 tuueme.exe 3592 tuueme.exe 3592 tuueme.exe 3592 tuueme.exe 3592 tuueme.exe 3592 tuueme.exe 3592 tuueme.exe 3592 tuueme.exe 3592 tuueme.exe 3592 tuueme.exe 3592 tuueme.exe 3592 tuueme.exe 3592 tuueme.exe 3592 tuueme.exe 3592 tuueme.exe 3592 tuueme.exe 3592 tuueme.exe 3592 tuueme.exe 3592 tuueme.exe 3592 tuueme.exe 3592 tuueme.exe 3592 tuueme.exe 3592 tuueme.exe 3592 tuueme.exe 3592 tuueme.exe 3592 tuueme.exe 3592 tuueme.exe 3592 tuueme.exe 3592 tuueme.exe 3592 tuueme.exe 3592 tuueme.exe 3592 tuueme.exe 3592 tuueme.exe 3592 tuueme.exe 3592 tuueme.exe 3592 tuueme.exe 3592 tuueme.exe 3592 tuueme.exe 3592 tuueme.exe 3592 tuueme.exe 3592 tuueme.exe 3592 tuueme.exe 3592 tuueme.exe 3592 tuueme.exe 3592 tuueme.exe 3592 tuueme.exe 3592 tuueme.exe 3592 tuueme.exe 3592 tuueme.exe 3592 tuueme.exe 3592 tuueme.exe 3592 tuueme.exe 3592 tuueme.exe 3592 tuueme.exe 3592 tuueme.exe 3592 tuueme.exe 3592 tuueme.exe 3592 tuueme.exe 3592 tuueme.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1948 17b3b3ab6abfd697dbef20be374d736a3e5997d606678a91b16b92935a7f3243.exe 3592 tuueme.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1948 wrote to memory of 3592 1948 17b3b3ab6abfd697dbef20be374d736a3e5997d606678a91b16b92935a7f3243.exe 81 PID 1948 wrote to memory of 3592 1948 17b3b3ab6abfd697dbef20be374d736a3e5997d606678a91b16b92935a7f3243.exe 81 PID 1948 wrote to memory of 3592 1948 17b3b3ab6abfd697dbef20be374d736a3e5997d606678a91b16b92935a7f3243.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\17b3b3ab6abfd697dbef20be374d736a3e5997d606678a91b16b92935a7f3243.exe"C:\Users\Admin\AppData\Local\Temp\17b3b3ab6abfd697dbef20be374d736a3e5997d606678a91b16b92935a7f3243.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Users\Admin\tuueme.exe"C:\Users\Admin\tuueme.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3592
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
208KB
MD5d2e7517514ac3e4da9aa7044636be369
SHA18484dc5034498fe0fd0a7a516cbab689d3b561a0
SHA25637ca8b064243657cfb4bb687a2fb5c80896db7633600cdd189c7ba2c5e2b3f9e
SHA512e70416275334d8991bbff3d372fdac317eb2be1d9689c59d2991bd5f90ca7e08c6167330b8fb0e28395edb37ea9648f2a88f2155718337a0c0808dcd3fc848bf
-
Filesize
208KB
MD5d2e7517514ac3e4da9aa7044636be369
SHA18484dc5034498fe0fd0a7a516cbab689d3b561a0
SHA25637ca8b064243657cfb4bb687a2fb5c80896db7633600cdd189c7ba2c5e2b3f9e
SHA512e70416275334d8991bbff3d372fdac317eb2be1d9689c59d2991bd5f90ca7e08c6167330b8fb0e28395edb37ea9648f2a88f2155718337a0c0808dcd3fc848bf