Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
20/10/2022, 10:13
Static task
static1
Behavioral task
behavioral1
Sample
2eb1244e5d4aee3e24c22ac15e7eda4286e03bda06450ec9c0a22096a5ce3f4c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2eb1244e5d4aee3e24c22ac15e7eda4286e03bda06450ec9c0a22096a5ce3f4c.exe
Resource
win10v2004-20220901-en
General
-
Target
2eb1244e5d4aee3e24c22ac15e7eda4286e03bda06450ec9c0a22096a5ce3f4c.exe
-
Size
216KB
-
MD5
a0648b89e9f3d3e8388ba5c426dc9f60
-
SHA1
1a886d540ea5a0725937910ede899827473747a5
-
SHA256
2eb1244e5d4aee3e24c22ac15e7eda4286e03bda06450ec9c0a22096a5ce3f4c
-
SHA512
ffa6cf84b7933adfbb3b353e06770674016e5fdb3c7614fcf3dab40b8c1b3c16f0b5775c45488a72573e788797243a45c6f08446286e558b6ec8323e68492e24
-
SSDEEP
6144:6oaV8kECtrkQ5zgMZUP15HcAgonAmKfwDVVc:vad1gMZUHcAgonAmZDV
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" poteh.exe -
Executes dropped EXE 1 IoCs
pid Process 1884 poteh.exe -
Loads dropped DLL 2 IoCs
pid Process 1648 2eb1244e5d4aee3e24c22ac15e7eda4286e03bda06450ec9c0a22096a5ce3f4c.exe 1648 2eb1244e5d4aee3e24c22ac15e7eda4286e03bda06450ec9c0a22096a5ce3f4c.exe -
Adds Run key to start application 2 TTPs 51 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\poteh = "C:\\Users\\Admin\\poteh.exe /a" poteh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\poteh = "C:\\Users\\Admin\\poteh.exe /Q" poteh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\poteh = "C:\\Users\\Admin\\poteh.exe /b" poteh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\poteh = "C:\\Users\\Admin\\poteh.exe /A" poteh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\poteh = "C:\\Users\\Admin\\poteh.exe /U" poteh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\poteh = "C:\\Users\\Admin\\poteh.exe /p" poteh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\poteh = "C:\\Users\\Admin\\poteh.exe /T" poteh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\poteh = "C:\\Users\\Admin\\poteh.exe /W" poteh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\poteh = "C:\\Users\\Admin\\poteh.exe /u" poteh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\poteh = "C:\\Users\\Admin\\poteh.exe /K" poteh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\poteh = "C:\\Users\\Admin\\poteh.exe /X" poteh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\poteh = "C:\\Users\\Admin\\poteh.exe /F" poteh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\poteh = "C:\\Users\\Admin\\poteh.exe /D" poteh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\poteh = "C:\\Users\\Admin\\poteh.exe /M" poteh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\poteh = "C:\\Users\\Admin\\poteh.exe /x" poteh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\poteh = "C:\\Users\\Admin\\poteh.exe /I" poteh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\poteh = "C:\\Users\\Admin\\poteh.exe /c" poteh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\poteh = "C:\\Users\\Admin\\poteh.exe /P" poteh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\poteh = "C:\\Users\\Admin\\poteh.exe /i" poteh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\poteh = "C:\\Users\\Admin\\poteh.exe /f" poteh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\poteh = "C:\\Users\\Admin\\poteh.exe /s" poteh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\poteh = "C:\\Users\\Admin\\poteh.exe /e" poteh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\poteh = "C:\\Users\\Admin\\poteh.exe /h" poteh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\poteh = "C:\\Users\\Admin\\poteh.exe /E" poteh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\poteh = "C:\\Users\\Admin\\poteh.exe /q" poteh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\poteh = "C:\\Users\\Admin\\poteh.exe /w" poteh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\poteh = "C:\\Users\\Admin\\poteh.exe /G" poteh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\poteh = "C:\\Users\\Admin\\poteh.exe /y" poteh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\poteh = "C:\\Users\\Admin\\poteh.exe /B" poteh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\poteh = "C:\\Users\\Admin\\poteh.exe /z" poteh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\poteh = "C:\\Users\\Admin\\poteh.exe /L" poteh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\poteh = "C:\\Users\\Admin\\poteh.exe /n" poteh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\poteh = "C:\\Users\\Admin\\poteh.exe /O" poteh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\poteh = "C:\\Users\\Admin\\poteh.exe /v" poteh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\poteh = "C:\\Users\\Admin\\poteh.exe /C" poteh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\poteh = "C:\\Users\\Admin\\poteh.exe /J" poteh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\poteh = "C:\\Users\\Admin\\poteh.exe /j" poteh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\poteh = "C:\\Users\\Admin\\poteh.exe /o" poteh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\poteh = "C:\\Users\\Admin\\poteh.exe /t" poteh.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ poteh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\poteh = "C:\\Users\\Admin\\poteh.exe /l" poteh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\poteh = "C:\\Users\\Admin\\poteh.exe /S" poteh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\poteh = "C:\\Users\\Admin\\poteh.exe /Y" poteh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\poteh = "C:\\Users\\Admin\\poteh.exe /Z" poteh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\poteh = "C:\\Users\\Admin\\poteh.exe /r" poteh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\poteh = "C:\\Users\\Admin\\poteh.exe /H" poteh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\poteh = "C:\\Users\\Admin\\poteh.exe /V" poteh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\poteh = "C:\\Users\\Admin\\poteh.exe /R" poteh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\poteh = "C:\\Users\\Admin\\poteh.exe /g" poteh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\poteh = "C:\\Users\\Admin\\poteh.exe /N" poteh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\poteh = "C:\\Users\\Admin\\poteh.exe /d" poteh.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1884 poteh.exe 1884 poteh.exe 1884 poteh.exe 1884 poteh.exe 1884 poteh.exe 1884 poteh.exe 1884 poteh.exe 1884 poteh.exe 1884 poteh.exe 1884 poteh.exe 1884 poteh.exe 1884 poteh.exe 1884 poteh.exe 1884 poteh.exe 1884 poteh.exe 1884 poteh.exe 1884 poteh.exe 1884 poteh.exe 1884 poteh.exe 1884 poteh.exe 1884 poteh.exe 1884 poteh.exe 1884 poteh.exe 1884 poteh.exe 1884 poteh.exe 1884 poteh.exe 1884 poteh.exe 1884 poteh.exe 1884 poteh.exe 1884 poteh.exe 1884 poteh.exe 1884 poteh.exe 1884 poteh.exe 1884 poteh.exe 1884 poteh.exe 1884 poteh.exe 1884 poteh.exe 1884 poteh.exe 1884 poteh.exe 1884 poteh.exe 1884 poteh.exe 1884 poteh.exe 1884 poteh.exe 1884 poteh.exe 1884 poteh.exe 1884 poteh.exe 1884 poteh.exe 1884 poteh.exe 1884 poteh.exe 1884 poteh.exe 1884 poteh.exe 1884 poteh.exe 1884 poteh.exe 1884 poteh.exe 1884 poteh.exe 1884 poteh.exe 1884 poteh.exe 1884 poteh.exe 1884 poteh.exe 1884 poteh.exe 1884 poteh.exe 1884 poteh.exe 1884 poteh.exe 1884 poteh.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1648 2eb1244e5d4aee3e24c22ac15e7eda4286e03bda06450ec9c0a22096a5ce3f4c.exe 1884 poteh.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1648 wrote to memory of 1884 1648 2eb1244e5d4aee3e24c22ac15e7eda4286e03bda06450ec9c0a22096a5ce3f4c.exe 28 PID 1648 wrote to memory of 1884 1648 2eb1244e5d4aee3e24c22ac15e7eda4286e03bda06450ec9c0a22096a5ce3f4c.exe 28 PID 1648 wrote to memory of 1884 1648 2eb1244e5d4aee3e24c22ac15e7eda4286e03bda06450ec9c0a22096a5ce3f4c.exe 28 PID 1648 wrote to memory of 1884 1648 2eb1244e5d4aee3e24c22ac15e7eda4286e03bda06450ec9c0a22096a5ce3f4c.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2eb1244e5d4aee3e24c22ac15e7eda4286e03bda06450ec9c0a22096a5ce3f4c.exe"C:\Users\Admin\AppData\Local\Temp\2eb1244e5d4aee3e24c22ac15e7eda4286e03bda06450ec9c0a22096a5ce3f4c.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Users\Admin\poteh.exe"C:\Users\Admin\poteh.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1884
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216KB
MD5682d8f17a9ae03bf51b27351c6fe532f
SHA1d796ab6488b72e9b192d6a59dd8e4e2164e6fd9e
SHA2566698fdf78f588c64b630d42ddd1de979334137cb1b10b608e8201b240ac18d60
SHA512b4e278bb7219a777a30533842fcddbba13ac07767378369349a4f83ba1090a938c6ee579e506d77d673a88ecc76f819dc8adcfa512811a48d446dc4a130edf78
-
Filesize
216KB
MD5682d8f17a9ae03bf51b27351c6fe532f
SHA1d796ab6488b72e9b192d6a59dd8e4e2164e6fd9e
SHA2566698fdf78f588c64b630d42ddd1de979334137cb1b10b608e8201b240ac18d60
SHA512b4e278bb7219a777a30533842fcddbba13ac07767378369349a4f83ba1090a938c6ee579e506d77d673a88ecc76f819dc8adcfa512811a48d446dc4a130edf78
-
Filesize
216KB
MD5682d8f17a9ae03bf51b27351c6fe532f
SHA1d796ab6488b72e9b192d6a59dd8e4e2164e6fd9e
SHA2566698fdf78f588c64b630d42ddd1de979334137cb1b10b608e8201b240ac18d60
SHA512b4e278bb7219a777a30533842fcddbba13ac07767378369349a4f83ba1090a938c6ee579e506d77d673a88ecc76f819dc8adcfa512811a48d446dc4a130edf78
-
Filesize
216KB
MD5682d8f17a9ae03bf51b27351c6fe532f
SHA1d796ab6488b72e9b192d6a59dd8e4e2164e6fd9e
SHA2566698fdf78f588c64b630d42ddd1de979334137cb1b10b608e8201b240ac18d60
SHA512b4e278bb7219a777a30533842fcddbba13ac07767378369349a4f83ba1090a938c6ee579e506d77d673a88ecc76f819dc8adcfa512811a48d446dc4a130edf78