Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
154s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
20/10/2022, 22:33
Static task
static1
Behavioral task
behavioral1
Sample
0e0070b461963b7d1d860840c8259ec7f6a1aaab619dfb66b9a2f91f0bda753b.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
0e0070b461963b7d1d860840c8259ec7f6a1aaab619dfb66b9a2f91f0bda753b.exe
Resource
win10v2004-20220812-en
General
-
Target
0e0070b461963b7d1d860840c8259ec7f6a1aaab619dfb66b9a2f91f0bda753b.exe
-
Size
140KB
-
MD5
59ccbd28fe7dab3e1d1704ace3846b20
-
SHA1
6e81d446e792801ed497f84e8576368044737880
-
SHA256
0e0070b461963b7d1d860840c8259ec7f6a1aaab619dfb66b9a2f91f0bda753b
-
SHA512
37a554fdec76b2009edb2abfd066748e9aaa08fc36d13388b568d557b82dc115da17aeefa51f9f8296c0c3661d49954b197234857592dad05ddd9f379fe9d728
-
SSDEEP
3072:QBV7clSAY5uXq0cu3XMO4nZLJY0PoeU60ohKdlLWOE:QBVtAY5uXq0cu3XMO4nZLJPot60ohKdR
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" puaiw.exe -
Executes dropped EXE 1 IoCs
pid Process 2976 puaiw.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 0e0070b461963b7d1d860840c8259ec7f6a1aaab619dfb66b9a2f91f0bda753b.exe -
Adds Run key to start application 2 TTPs 52 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puaiw = "C:\\Users\\Admin\\puaiw.exe /X" puaiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puaiw = "C:\\Users\\Admin\\puaiw.exe /e" puaiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puaiw = "C:\\Users\\Admin\\puaiw.exe /f" puaiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puaiw = "C:\\Users\\Admin\\puaiw.exe /V" puaiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puaiw = "C:\\Users\\Admin\\puaiw.exe /a" puaiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puaiw = "C:\\Users\\Admin\\puaiw.exe /Y" puaiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puaiw = "C:\\Users\\Admin\\puaiw.exe /E" puaiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puaiw = "C:\\Users\\Admin\\puaiw.exe /F" puaiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puaiw = "C:\\Users\\Admin\\puaiw.exe /n" puaiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puaiw = "C:\\Users\\Admin\\puaiw.exe /q" puaiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puaiw = "C:\\Users\\Admin\\puaiw.exe /G" puaiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puaiw = "C:\\Users\\Admin\\puaiw.exe /r" puaiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puaiw = "C:\\Users\\Admin\\puaiw.exe /m" puaiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puaiw = "C:\\Users\\Admin\\puaiw.exe /d" puaiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puaiw = "C:\\Users\\Admin\\puaiw.exe /O" puaiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puaiw = "C:\\Users\\Admin\\puaiw.exe /v" puaiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puaiw = "C:\\Users\\Admin\\puaiw.exe /U" puaiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puaiw = "C:\\Users\\Admin\\puaiw.exe /M" puaiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puaiw = "C:\\Users\\Admin\\puaiw.exe /K" puaiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puaiw = "C:\\Users\\Admin\\puaiw.exe /C" puaiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puaiw = "C:\\Users\\Admin\\puaiw.exe /h" puaiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puaiw = "C:\\Users\\Admin\\puaiw.exe /I" puaiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puaiw = "C:\\Users\\Admin\\puaiw.exe /l" puaiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puaiw = "C:\\Users\\Admin\\puaiw.exe /w" puaiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puaiw = "C:\\Users\\Admin\\puaiw.exe /i" puaiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puaiw = "C:\\Users\\Admin\\puaiw.exe /b" puaiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puaiw = "C:\\Users\\Admin\\puaiw.exe /P" puaiw.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\Run\ puaiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puaiw = "C:\\Users\\Admin\\puaiw.exe /j" puaiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puaiw = "C:\\Users\\Admin\\puaiw.exe /p" puaiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puaiw = "C:\\Users\\Admin\\puaiw.exe /c" puaiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puaiw = "C:\\Users\\Admin\\puaiw.exe /D" puaiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puaiw = "C:\\Users\\Admin\\puaiw.exe /x" puaiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puaiw = "C:\\Users\\Admin\\puaiw.exe /Z" puaiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puaiw = "C:\\Users\\Admin\\puaiw.exe /o" puaiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puaiw = "C:\\Users\\Admin\\puaiw.exe /B" puaiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puaiw = "C:\\Users\\Admin\\puaiw.exe /R" puaiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puaiw = "C:\\Users\\Admin\\puaiw.exe /z" puaiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puaiw = "C:\\Users\\Admin\\puaiw.exe /k" puaiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puaiw = "C:\\Users\\Admin\\puaiw.exe /Q" puaiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puaiw = "C:\\Users\\Admin\\puaiw.exe /t" puaiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puaiw = "C:\\Users\\Admin\\puaiw.exe /s" puaiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puaiw = "C:\\Users\\Admin\\puaiw.exe /g" puaiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puaiw = "C:\\Users\\Admin\\puaiw.exe /S" puaiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puaiw = "C:\\Users\\Admin\\puaiw.exe /y" puaiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puaiw = "C:\\Users\\Admin\\puaiw.exe /N" puaiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puaiw = "C:\\Users\\Admin\\puaiw.exe /J" puaiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puaiw = "C:\\Users\\Admin\\puaiw.exe /H" puaiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puaiw = "C:\\Users\\Admin\\puaiw.exe /A" puaiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puaiw = "C:\\Users\\Admin\\puaiw.exe /W" puaiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puaiw = "C:\\Users\\Admin\\puaiw.exe /L" puaiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puaiw = "C:\\Users\\Admin\\puaiw.exe /T" puaiw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2976 puaiw.exe 2976 puaiw.exe 2976 puaiw.exe 2976 puaiw.exe 2976 puaiw.exe 2976 puaiw.exe 2976 puaiw.exe 2976 puaiw.exe 2976 puaiw.exe 2976 puaiw.exe 2976 puaiw.exe 2976 puaiw.exe 2976 puaiw.exe 2976 puaiw.exe 2976 puaiw.exe 2976 puaiw.exe 2976 puaiw.exe 2976 puaiw.exe 2976 puaiw.exe 2976 puaiw.exe 2976 puaiw.exe 2976 puaiw.exe 2976 puaiw.exe 2976 puaiw.exe 2976 puaiw.exe 2976 puaiw.exe 2976 puaiw.exe 2976 puaiw.exe 2976 puaiw.exe 2976 puaiw.exe 2976 puaiw.exe 2976 puaiw.exe 2976 puaiw.exe 2976 puaiw.exe 2976 puaiw.exe 2976 puaiw.exe 2976 puaiw.exe 2976 puaiw.exe 2976 puaiw.exe 2976 puaiw.exe 2976 puaiw.exe 2976 puaiw.exe 2976 puaiw.exe 2976 puaiw.exe 2976 puaiw.exe 2976 puaiw.exe 2976 puaiw.exe 2976 puaiw.exe 2976 puaiw.exe 2976 puaiw.exe 2976 puaiw.exe 2976 puaiw.exe 2976 puaiw.exe 2976 puaiw.exe 2976 puaiw.exe 2976 puaiw.exe 2976 puaiw.exe 2976 puaiw.exe 2976 puaiw.exe 2976 puaiw.exe 2976 puaiw.exe 2976 puaiw.exe 2976 puaiw.exe 2976 puaiw.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 5044 0e0070b461963b7d1d860840c8259ec7f6a1aaab619dfb66b9a2f91f0bda753b.exe 2976 puaiw.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5044 wrote to memory of 2976 5044 0e0070b461963b7d1d860840c8259ec7f6a1aaab619dfb66b9a2f91f0bda753b.exe 84 PID 5044 wrote to memory of 2976 5044 0e0070b461963b7d1d860840c8259ec7f6a1aaab619dfb66b9a2f91f0bda753b.exe 84 PID 5044 wrote to memory of 2976 5044 0e0070b461963b7d1d860840c8259ec7f6a1aaab619dfb66b9a2f91f0bda753b.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e0070b461963b7d1d860840c8259ec7f6a1aaab619dfb66b9a2f91f0bda753b.exe"C:\Users\Admin\AppData\Local\Temp\0e0070b461963b7d1d860840c8259ec7f6a1aaab619dfb66b9a2f91f0bda753b.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Users\Admin\puaiw.exe"C:\Users\Admin\puaiw.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2976
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
140KB
MD5f0dfda89bbd52e34385a78f0a1962d8c
SHA1f7e0b4b0689166ce782d712db64af748590648c8
SHA256e7ae642908f3c5fd1be979f7f02dff62b46d79493a6b268fa3466b4e64c1b236
SHA51273d87098aa2b085d46b9c79102473b2656f21c131dfd12bcfece0b781fe4513abc791d7165cfe0dd9fbf548d7e7734e337d6eef5b8e81d1d4370996e29809b9e
-
Filesize
140KB
MD5f0dfda89bbd52e34385a78f0a1962d8c
SHA1f7e0b4b0689166ce782d712db64af748590648c8
SHA256e7ae642908f3c5fd1be979f7f02dff62b46d79493a6b268fa3466b4e64c1b236
SHA51273d87098aa2b085d46b9c79102473b2656f21c131dfd12bcfece0b781fe4513abc791d7165cfe0dd9fbf548d7e7734e337d6eef5b8e81d1d4370996e29809b9e