Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2022, 10:15
Static task
static1
Behavioral task
behavioral1
Sample
7fb47e10c997b236359891e027cac8c201d549a1247e6d853976736edb469977.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7fb47e10c997b236359891e027cac8c201d549a1247e6d853976736edb469977.exe
Resource
win10v2004-20220812-en
General
-
Target
7fb47e10c997b236359891e027cac8c201d549a1247e6d853976736edb469977.exe
-
Size
344KB
-
MD5
6a22ea27f79acb0a81c16b74470dd980
-
SHA1
0826df85115ed9cbf4b0ddf4ec4a1f19c69ca5cb
-
SHA256
7fb47e10c997b236359891e027cac8c201d549a1247e6d853976736edb469977
-
SHA512
d8fa5d9748551957cc227d62a746bd344fc11ac7559c4e5b5bfdf9048a3496def434d3e51889de1a45014be925a8f9cf649a258fbbdb0ed7aa66abf5871dde0e
-
SSDEEP
6144:t2YUV30T5bG9SWK/fObT/bGidhjhxEF0N3hL7VklVA3MZLhcYm9e4yqyQhNNnSZn:tdUV30T5qwWK/fObT/bGiA0NFVkWMZLF
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 7fb47e10c997b236359891e027cac8c201d549a1247e6d853976736edb469977.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" diiume.exe -
Executes dropped EXE 1 IoCs
pid Process 2356 diiume.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 7fb47e10c997b236359891e027cac8c201d549a1247e6d853976736edb469977.exe -
Adds Run key to start application 2 TTPs 53 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\diiume = "C:\\Users\\Admin\\diiume.exe /B" diiume.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\diiume = "C:\\Users\\Admin\\diiume.exe /T" diiume.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\diiume = "C:\\Users\\Admin\\diiume.exe /W" diiume.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\diiume = "C:\\Users\\Admin\\diiume.exe /M" diiume.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\diiume = "C:\\Users\\Admin\\diiume.exe /u" diiume.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\diiume = "C:\\Users\\Admin\\diiume.exe /f" diiume.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\diiume = "C:\\Users\\Admin\\diiume.exe /b" diiume.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\diiume = "C:\\Users\\Admin\\diiume.exe /c" diiume.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\diiume = "C:\\Users\\Admin\\diiume.exe /P" diiume.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\diiume = "C:\\Users\\Admin\\diiume.exe /y" diiume.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\diiume = "C:\\Users\\Admin\\diiume.exe /t" diiume.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\diiume = "C:\\Users\\Admin\\diiume.exe /l" diiume.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\diiume = "C:\\Users\\Admin\\diiume.exe /H" diiume.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\diiume = "C:\\Users\\Admin\\diiume.exe /g" diiume.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\diiume = "C:\\Users\\Admin\\diiume.exe /Q" diiume.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\diiume = "C:\\Users\\Admin\\diiume.exe /Z" diiume.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\diiume = "C:\\Users\\Admin\\diiume.exe /d" diiume.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\diiume = "C:\\Users\\Admin\\diiume.exe /L" diiume.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\diiume = "C:\\Users\\Admin\\diiume.exe /i" diiume.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\diiume = "C:\\Users\\Admin\\diiume.exe /j" diiume.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\diiume = "C:\\Users\\Admin\\diiume.exe /S" diiume.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\diiume = "C:\\Users\\Admin\\diiume.exe /K" diiume.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\diiume = "C:\\Users\\Admin\\diiume.exe /Y" diiume.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\diiume = "C:\\Users\\Admin\\diiume.exe /I" diiume.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\diiume = "C:\\Users\\Admin\\diiume.exe /s" diiume.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\diiume = "C:\\Users\\Admin\\diiume.exe /J" diiume.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\diiume = "C:\\Users\\Admin\\diiume.exe /n" diiume.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 7fb47e10c997b236359891e027cac8c201d549a1247e6d853976736edb469977.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\diiume = "C:\\Users\\Admin\\diiume.exe /a" diiume.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\diiume = "C:\\Users\\Admin\\diiume.exe /r" diiume.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\diiume = "C:\\Users\\Admin\\diiume.exe /U" diiume.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\diiume = "C:\\Users\\Admin\\diiume.exe /q" diiume.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\diiume = "C:\\Users\\Admin\\diiume.exe /x" diiume.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\diiume = "C:\\Users\\Admin\\diiume.exe /D" diiume.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\diiume = "C:\\Users\\Admin\\diiume.exe /k" diiume.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\diiume = "C:\\Users\\Admin\\diiume.exe /p" diiume.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\diiume = "C:\\Users\\Admin\\diiume.exe /v" diiume.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\diiume = "C:\\Users\\Admin\\diiume.exe /o" diiume.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\diiume = "C:\\Users\\Admin\\diiume.exe /m" diiume.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\diiume = "C:\\Users\\Admin\\diiume.exe /G" diiume.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\diiume = "C:\\Users\\Admin\\diiume.exe /X" diiume.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run\ diiume.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\diiume = "C:\\Users\\Admin\\diiume.exe /Y" 7fb47e10c997b236359891e027cac8c201d549a1247e6d853976736edb469977.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\diiume = "C:\\Users\\Admin\\diiume.exe /C" diiume.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\diiume = "C:\\Users\\Admin\\diiume.exe /w" diiume.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\diiume = "C:\\Users\\Admin\\diiume.exe /R" diiume.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\diiume = "C:\\Users\\Admin\\diiume.exe /E" diiume.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\diiume = "C:\\Users\\Admin\\diiume.exe /F" diiume.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\diiume = "C:\\Users\\Admin\\diiume.exe /N" diiume.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\diiume = "C:\\Users\\Admin\\diiume.exe /e" diiume.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\diiume = "C:\\Users\\Admin\\diiume.exe /A" diiume.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\diiume = "C:\\Users\\Admin\\diiume.exe /V" diiume.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\diiume = "C:\\Users\\Admin\\diiume.exe /h" diiume.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4112 7fb47e10c997b236359891e027cac8c201d549a1247e6d853976736edb469977.exe 4112 7fb47e10c997b236359891e027cac8c201d549a1247e6d853976736edb469977.exe 2356 diiume.exe 2356 diiume.exe 2356 diiume.exe 2356 diiume.exe 2356 diiume.exe 2356 diiume.exe 2356 diiume.exe 2356 diiume.exe 2356 diiume.exe 2356 diiume.exe 2356 diiume.exe 2356 diiume.exe 2356 diiume.exe 2356 diiume.exe 2356 diiume.exe 2356 diiume.exe 2356 diiume.exe 2356 diiume.exe 2356 diiume.exe 2356 diiume.exe 2356 diiume.exe 2356 diiume.exe 2356 diiume.exe 2356 diiume.exe 2356 diiume.exe 2356 diiume.exe 2356 diiume.exe 2356 diiume.exe 2356 diiume.exe 2356 diiume.exe 2356 diiume.exe 2356 diiume.exe 2356 diiume.exe 2356 diiume.exe 2356 diiume.exe 2356 diiume.exe 2356 diiume.exe 2356 diiume.exe 2356 diiume.exe 2356 diiume.exe 2356 diiume.exe 2356 diiume.exe 2356 diiume.exe 2356 diiume.exe 2356 diiume.exe 2356 diiume.exe 2356 diiume.exe 2356 diiume.exe 2356 diiume.exe 2356 diiume.exe 2356 diiume.exe 2356 diiume.exe 2356 diiume.exe 2356 diiume.exe 2356 diiume.exe 2356 diiume.exe 2356 diiume.exe 2356 diiume.exe 2356 diiume.exe 2356 diiume.exe 2356 diiume.exe 2356 diiume.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4112 7fb47e10c997b236359891e027cac8c201d549a1247e6d853976736edb469977.exe 2356 diiume.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4112 wrote to memory of 2356 4112 7fb47e10c997b236359891e027cac8c201d549a1247e6d853976736edb469977.exe 81 PID 4112 wrote to memory of 2356 4112 7fb47e10c997b236359891e027cac8c201d549a1247e6d853976736edb469977.exe 81 PID 4112 wrote to memory of 2356 4112 7fb47e10c997b236359891e027cac8c201d549a1247e6d853976736edb469977.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\7fb47e10c997b236359891e027cac8c201d549a1247e6d853976736edb469977.exe"C:\Users\Admin\AppData\Local\Temp\7fb47e10c997b236359891e027cac8c201d549a1247e6d853976736edb469977.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Users\Admin\diiume.exe"C:\Users\Admin\diiume.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2356
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
344KB
MD5bbcae823c9d9bc7ae46a64a3bb8a584f
SHA1b72d15f6a88152f60651c0b22a5377bdec2a2713
SHA256b8ee2a18166037f3fb09c2d4526bfdf1e5edc8115c610f230078e32076eafb25
SHA5123bad1ad0e68d1b4a9053bcf79e0e53a75f4e814cd80c43ffad156521d0918dc74e4e4107a3b7077419a418cd93f2ed380386fe77d9e541eaac7f8d55d683944a
-
Filesize
344KB
MD5bbcae823c9d9bc7ae46a64a3bb8a584f
SHA1b72d15f6a88152f60651c0b22a5377bdec2a2713
SHA256b8ee2a18166037f3fb09c2d4526bfdf1e5edc8115c610f230078e32076eafb25
SHA5123bad1ad0e68d1b4a9053bcf79e0e53a75f4e814cd80c43ffad156521d0918dc74e4e4107a3b7077419a418cd93f2ed380386fe77d9e541eaac7f8d55d683944a