Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
18/10/2022, 03:30
Static task
static1
Behavioral task
behavioral1
Sample
d88c9fdff3af3895431fe8b671e706525e78fdff58e7d3c5b7b9af126a6db0a3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d88c9fdff3af3895431fe8b671e706525e78fdff58e7d3c5b7b9af126a6db0a3.exe
Resource
win10v2004-20220812-en
General
-
Target
d88c9fdff3af3895431fe8b671e706525e78fdff58e7d3c5b7b9af126a6db0a3.exe
-
Size
348KB
-
MD5
2287ea0569ff4c181a0050da1a33595b
-
SHA1
89eb589364d84823cd0cab91e7251eadec97e8e7
-
SHA256
d88c9fdff3af3895431fe8b671e706525e78fdff58e7d3c5b7b9af126a6db0a3
-
SHA512
e0614cde0270bcb2661993e216d6f9c5ce0454b49b170d415e7e167335a0ff9510f121dc97d28b040828b36c50ca95aaf574ea963e5457c8c799d4af5bb89f3f
-
SSDEEP
3072:ECXTo/0Yxyk0tQ9nLHbB9WPliBs2HWWEakGJm9cFso:ECusk4QxL7B9WPli+yWWEazH
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" d88c9fdff3af3895431fe8b671e706525e78fdff58e7d3c5b7b9af126a6db0a3.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" peauv.exe -
Executes dropped EXE 1 IoCs
pid Process 2492 peauv.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation d88c9fdff3af3895431fe8b671e706525e78fdff58e7d3c5b7b9af126a6db0a3.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\peauv = "C:\\Users\\Admin\\peauv.exe /w" peauv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\peauv = "C:\\Users\\Admin\\peauv.exe /i" peauv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\peauv = "C:\\Users\\Admin\\peauv.exe /n" peauv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\peauv = "C:\\Users\\Admin\\peauv.exe /c" peauv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\peauv = "C:\\Users\\Admin\\peauv.exe /t" peauv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\peauv = "C:\\Users\\Admin\\peauv.exe /q" peauv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\peauv = "C:\\Users\\Admin\\peauv.exe /p" peauv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\peauv = "C:\\Users\\Admin\\peauv.exe /g" peauv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\peauv = "C:\\Users\\Admin\\peauv.exe /b" peauv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\peauv = "C:\\Users\\Admin\\peauv.exe /f" peauv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\peauv = "C:\\Users\\Admin\\peauv.exe /l" peauv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\peauv = "C:\\Users\\Admin\\peauv.exe /a" peauv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\peauv = "C:\\Users\\Admin\\peauv.exe /y" peauv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\peauv = "C:\\Users\\Admin\\peauv.exe /m" peauv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\peauv = "C:\\Users\\Admin\\peauv.exe /r" peauv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\peauv = "C:\\Users\\Admin\\peauv.exe /s" peauv.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run\ peauv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\peauv = "C:\\Users\\Admin\\peauv.exe /u" peauv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\peauv = "C:\\Users\\Admin\\peauv.exe /e" peauv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\peauv = "C:\\Users\\Admin\\peauv.exe /j" peauv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\peauv = "C:\\Users\\Admin\\peauv.exe /x" peauv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\peauv = "C:\\Users\\Admin\\peauv.exe /d" peauv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\peauv = "C:\\Users\\Admin\\peauv.exe /o" peauv.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run\ d88c9fdff3af3895431fe8b671e706525e78fdff58e7d3c5b7b9af126a6db0a3.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\peauv = "C:\\Users\\Admin\\peauv.exe /h" peauv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\peauv = "C:\\Users\\Admin\\peauv.exe /z" peauv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\peauv = "C:\\Users\\Admin\\peauv.exe /k" peauv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\peauv = "C:\\Users\\Admin\\peauv.exe /g" d88c9fdff3af3895431fe8b671e706525e78fdff58e7d3c5b7b9af126a6db0a3.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\peauv = "C:\\Users\\Admin\\peauv.exe /v" peauv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1156 d88c9fdff3af3895431fe8b671e706525e78fdff58e7d3c5b7b9af126a6db0a3.exe 1156 d88c9fdff3af3895431fe8b671e706525e78fdff58e7d3c5b7b9af126a6db0a3.exe 2492 peauv.exe 2492 peauv.exe 2492 peauv.exe 2492 peauv.exe 2492 peauv.exe 2492 peauv.exe 2492 peauv.exe 2492 peauv.exe 2492 peauv.exe 2492 peauv.exe 2492 peauv.exe 2492 peauv.exe 2492 peauv.exe 2492 peauv.exe 2492 peauv.exe 2492 peauv.exe 2492 peauv.exe 2492 peauv.exe 2492 peauv.exe 2492 peauv.exe 2492 peauv.exe 2492 peauv.exe 2492 peauv.exe 2492 peauv.exe 2492 peauv.exe 2492 peauv.exe 2492 peauv.exe 2492 peauv.exe 2492 peauv.exe 2492 peauv.exe 2492 peauv.exe 2492 peauv.exe 2492 peauv.exe 2492 peauv.exe 2492 peauv.exe 2492 peauv.exe 2492 peauv.exe 2492 peauv.exe 2492 peauv.exe 2492 peauv.exe 2492 peauv.exe 2492 peauv.exe 2492 peauv.exe 2492 peauv.exe 2492 peauv.exe 2492 peauv.exe 2492 peauv.exe 2492 peauv.exe 2492 peauv.exe 2492 peauv.exe 2492 peauv.exe 2492 peauv.exe 2492 peauv.exe 2492 peauv.exe 2492 peauv.exe 2492 peauv.exe 2492 peauv.exe 2492 peauv.exe 2492 peauv.exe 2492 peauv.exe 2492 peauv.exe 2492 peauv.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1156 d88c9fdff3af3895431fe8b671e706525e78fdff58e7d3c5b7b9af126a6db0a3.exe 2492 peauv.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1156 wrote to memory of 2492 1156 d88c9fdff3af3895431fe8b671e706525e78fdff58e7d3c5b7b9af126a6db0a3.exe 85 PID 1156 wrote to memory of 2492 1156 d88c9fdff3af3895431fe8b671e706525e78fdff58e7d3c5b7b9af126a6db0a3.exe 85 PID 1156 wrote to memory of 2492 1156 d88c9fdff3af3895431fe8b671e706525e78fdff58e7d3c5b7b9af126a6db0a3.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\d88c9fdff3af3895431fe8b671e706525e78fdff58e7d3c5b7b9af126a6db0a3.exe"C:\Users\Admin\AppData\Local\Temp\d88c9fdff3af3895431fe8b671e706525e78fdff58e7d3c5b7b9af126a6db0a3.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Users\Admin\peauv.exe"C:\Users\Admin\peauv.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2492
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
348KB
MD57ca2b4aef4498a12a2c448aa5ea2bf6f
SHA1bf838ba029fd246fd3ed49be27ec90c9f20e44ce
SHA256c222d783c2b730e91deac82940a80091db540ff74784e0abc3b957a86140a9ab
SHA51252471c054516efe1ca9b96b12d5c7a9c4168a2b9ae8e417c0de6f46b3441b275ab5eac4203cdf9e249fcaada5a88a93803c10ffbc797e11f21eeb5ac69025992
-
Filesize
348KB
MD57ca2b4aef4498a12a2c448aa5ea2bf6f
SHA1bf838ba029fd246fd3ed49be27ec90c9f20e44ce
SHA256c222d783c2b730e91deac82940a80091db540ff74784e0abc3b957a86140a9ab
SHA51252471c054516efe1ca9b96b12d5c7a9c4168a2b9ae8e417c0de6f46b3441b275ab5eac4203cdf9e249fcaada5a88a93803c10ffbc797e11f21eeb5ac69025992