Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
188s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
20/10/2022, 01:48
Static task
static1
Behavioral task
behavioral1
Sample
f000ded4841aad2de4aab785fac29304bdaa192cda93fe88c025e00b5a78072a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f000ded4841aad2de4aab785fac29304bdaa192cda93fe88c025e00b5a78072a.exe
Resource
win10v2004-20220812-en
General
-
Target
f000ded4841aad2de4aab785fac29304bdaa192cda93fe88c025e00b5a78072a.exe
-
Size
244KB
-
MD5
515da60d0d4e25123236ebd498a04ca0
-
SHA1
e584f9b990d0f140d7138ca673d9044af2203fc5
-
SHA256
f000ded4841aad2de4aab785fac29304bdaa192cda93fe88c025e00b5a78072a
-
SHA512
0dc1a1ed5737b683cd33c9ee5fc6b67265128dd3f658a89913ae1138f3c5ad5a04106d0ea0bb9f0aeb8278bc208fdf00d9ce0063ec1c59c9698e28b335254043
-
SSDEEP
3072:6jj2cWOJ9c4hcy1imsW7A0g3XDYHYTvZm3ov5Q4/cMIVH5bEvhSSqeLSqnjYLk:0qDK9tyy1imdJgc4s2QRhH5IXl
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" f000ded4841aad2de4aab785fac29304bdaa192cda93fe88c025e00b5a78072a.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" qdkauw.exe -
Executes dropped EXE 1 IoCs
pid Process 1336 qdkauw.exe -
Loads dropped DLL 2 IoCs
pid Process 944 f000ded4841aad2de4aab785fac29304bdaa192cda93fe88c025e00b5a78072a.exe 944 f000ded4841aad2de4aab785fac29304bdaa192cda93fe88c025e00b5a78072a.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qdkauw = "C:\\Users\\Admin\\qdkauw.exe /l" qdkauw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qdkauw = "C:\\Users\\Admin\\qdkauw.exe /h" qdkauw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qdkauw = "C:\\Users\\Admin\\qdkauw.exe /s" qdkauw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qdkauw = "C:\\Users\\Admin\\qdkauw.exe /f" qdkauw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qdkauw = "C:\\Users\\Admin\\qdkauw.exe /g" qdkauw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qdkauw = "C:\\Users\\Admin\\qdkauw.exe /e" qdkauw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qdkauw = "C:\\Users\\Admin\\qdkauw.exe /k" qdkauw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qdkauw = "C:\\Users\\Admin\\qdkauw.exe /u" qdkauw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qdkauw = "C:\\Users\\Admin\\qdkauw.exe /v" qdkauw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qdkauw = "C:\\Users\\Admin\\qdkauw.exe /z" qdkauw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qdkauw = "C:\\Users\\Admin\\qdkauw.exe /i" qdkauw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qdkauw = "C:\\Users\\Admin\\qdkauw.exe /j" qdkauw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qdkauw = "C:\\Users\\Admin\\qdkauw.exe /a" qdkauw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qdkauw = "C:\\Users\\Admin\\qdkauw.exe /o" qdkauw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qdkauw = "C:\\Users\\Admin\\qdkauw.exe /n" qdkauw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qdkauw = "C:\\Users\\Admin\\qdkauw.exe /e" f000ded4841aad2de4aab785fac29304bdaa192cda93fe88c025e00b5a78072a.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qdkauw = "C:\\Users\\Admin\\qdkauw.exe /p" qdkauw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qdkauw = "C:\\Users\\Admin\\qdkauw.exe /q" qdkauw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qdkauw = "C:\\Users\\Admin\\qdkauw.exe /c" qdkauw.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ qdkauw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qdkauw = "C:\\Users\\Admin\\qdkauw.exe /b" qdkauw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qdkauw = "C:\\Users\\Admin\\qdkauw.exe /w" qdkauw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qdkauw = "C:\\Users\\Admin\\qdkauw.exe /m" qdkauw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qdkauw = "C:\\Users\\Admin\\qdkauw.exe /r" qdkauw.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ f000ded4841aad2de4aab785fac29304bdaa192cda93fe88c025e00b5a78072a.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qdkauw = "C:\\Users\\Admin\\qdkauw.exe /x" qdkauw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qdkauw = "C:\\Users\\Admin\\qdkauw.exe /t" qdkauw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qdkauw = "C:\\Users\\Admin\\qdkauw.exe /d" qdkauw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qdkauw = "C:\\Users\\Admin\\qdkauw.exe /y" qdkauw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 944 f000ded4841aad2de4aab785fac29304bdaa192cda93fe88c025e00b5a78072a.exe 1336 qdkauw.exe 1336 qdkauw.exe 1336 qdkauw.exe 1336 qdkauw.exe 1336 qdkauw.exe 1336 qdkauw.exe 1336 qdkauw.exe 1336 qdkauw.exe 1336 qdkauw.exe 1336 qdkauw.exe 1336 qdkauw.exe 1336 qdkauw.exe 1336 qdkauw.exe 1336 qdkauw.exe 1336 qdkauw.exe 1336 qdkauw.exe 1336 qdkauw.exe 1336 qdkauw.exe 1336 qdkauw.exe 1336 qdkauw.exe 1336 qdkauw.exe 1336 qdkauw.exe 1336 qdkauw.exe 1336 qdkauw.exe 1336 qdkauw.exe 1336 qdkauw.exe 1336 qdkauw.exe 1336 qdkauw.exe 1336 qdkauw.exe 1336 qdkauw.exe 1336 qdkauw.exe 1336 qdkauw.exe 1336 qdkauw.exe 1336 qdkauw.exe 1336 qdkauw.exe 1336 qdkauw.exe 1336 qdkauw.exe 1336 qdkauw.exe 1336 qdkauw.exe 1336 qdkauw.exe 1336 qdkauw.exe 1336 qdkauw.exe 1336 qdkauw.exe 1336 qdkauw.exe 1336 qdkauw.exe 1336 qdkauw.exe 1336 qdkauw.exe 1336 qdkauw.exe 1336 qdkauw.exe 1336 qdkauw.exe 1336 qdkauw.exe 1336 qdkauw.exe 1336 qdkauw.exe 1336 qdkauw.exe 1336 qdkauw.exe 1336 qdkauw.exe 1336 qdkauw.exe 1336 qdkauw.exe 1336 qdkauw.exe 1336 qdkauw.exe 1336 qdkauw.exe 1336 qdkauw.exe 1336 qdkauw.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 944 f000ded4841aad2de4aab785fac29304bdaa192cda93fe88c025e00b5a78072a.exe 1336 qdkauw.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 944 wrote to memory of 1336 944 f000ded4841aad2de4aab785fac29304bdaa192cda93fe88c025e00b5a78072a.exe 27 PID 944 wrote to memory of 1336 944 f000ded4841aad2de4aab785fac29304bdaa192cda93fe88c025e00b5a78072a.exe 27 PID 944 wrote to memory of 1336 944 f000ded4841aad2de4aab785fac29304bdaa192cda93fe88c025e00b5a78072a.exe 27 PID 944 wrote to memory of 1336 944 f000ded4841aad2de4aab785fac29304bdaa192cda93fe88c025e00b5a78072a.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\f000ded4841aad2de4aab785fac29304bdaa192cda93fe88c025e00b5a78072a.exe"C:\Users\Admin\AppData\Local\Temp\f000ded4841aad2de4aab785fac29304bdaa192cda93fe88c025e00b5a78072a.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Users\Admin\qdkauw.exe"C:\Users\Admin\qdkauw.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1336
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
244KB
MD51970e64ab8e7bbbfb8b3f119ac9165ef
SHA1508e3c39a747a880edcbf2bfe2f5076292014c88
SHA2568a67b6423578bcbecddc1836248567caae8e9f02bec8c4d8bcea6e6c10ae6edd
SHA512d4fc5e2845f81d3ed026d8dd4af3427ddb3aafe5e07f0bd150d23562d33eeb86a086123903a996b7192b52106fb5ceae9aa61aeff6709c33da89243405ce768b
-
Filesize
244KB
MD51970e64ab8e7bbbfb8b3f119ac9165ef
SHA1508e3c39a747a880edcbf2bfe2f5076292014c88
SHA2568a67b6423578bcbecddc1836248567caae8e9f02bec8c4d8bcea6e6c10ae6edd
SHA512d4fc5e2845f81d3ed026d8dd4af3427ddb3aafe5e07f0bd150d23562d33eeb86a086123903a996b7192b52106fb5ceae9aa61aeff6709c33da89243405ce768b
-
Filesize
244KB
MD51970e64ab8e7bbbfb8b3f119ac9165ef
SHA1508e3c39a747a880edcbf2bfe2f5076292014c88
SHA2568a67b6423578bcbecddc1836248567caae8e9f02bec8c4d8bcea6e6c10ae6edd
SHA512d4fc5e2845f81d3ed026d8dd4af3427ddb3aafe5e07f0bd150d23562d33eeb86a086123903a996b7192b52106fb5ceae9aa61aeff6709c33da89243405ce768b
-
Filesize
244KB
MD51970e64ab8e7bbbfb8b3f119ac9165ef
SHA1508e3c39a747a880edcbf2bfe2f5076292014c88
SHA2568a67b6423578bcbecddc1836248567caae8e9f02bec8c4d8bcea6e6c10ae6edd
SHA512d4fc5e2845f81d3ed026d8dd4af3427ddb3aafe5e07f0bd150d23562d33eeb86a086123903a996b7192b52106fb5ceae9aa61aeff6709c33da89243405ce768b