Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
28/10/2022, 21:57
Static task
static1
Behavioral task
behavioral1
Sample
194b5a1b9b59b72bdc812341178c8fd2cfda256e199b19936d0122e3f8598f18.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
194b5a1b9b59b72bdc812341178c8fd2cfda256e199b19936d0122e3f8598f18.exe
Resource
win10v2004-20220812-en
General
-
Target
194b5a1b9b59b72bdc812341178c8fd2cfda256e199b19936d0122e3f8598f18.exe
-
Size
84KB
-
MD5
0c5128c21d0c67bd6d48f71877960300
-
SHA1
60845650b033ea94df071102c8891b98c38668e8
-
SHA256
194b5a1b9b59b72bdc812341178c8fd2cfda256e199b19936d0122e3f8598f18
-
SHA512
5c7eb06c538b0538fe0633c441bd79882131d702ec57902120e62138ee0e66c51f20ae853a6f0b355282e05beec88277b900f974ab2fda20c38597257a7df58a
-
SSDEEP
768:d6fmuec4OdJNUC1x2avPPpykILkGuIBLP3nqZCcLX/CVSFJ0T72Uap5/7TONS9:d/ZOdUCJwVuTocTzFJ0T72VpN9
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 194b5a1b9b59b72bdc812341178c8fd2cfda256e199b19936d0122e3f8598f18.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" daveb.exe -
Executes dropped EXE 1 IoCs
pid Process 1324 daveb.exe -
Loads dropped DLL 2 IoCs
pid Process 1504 194b5a1b9b59b72bdc812341178c8fd2cfda256e199b19936d0122e3f8598f18.exe 1504 194b5a1b9b59b72bdc812341178c8fd2cfda256e199b19936d0122e3f8598f18.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\daveb = "C:\\Users\\Admin\\daveb.exe /l" 194b5a1b9b59b72bdc812341178c8fd2cfda256e199b19936d0122e3f8598f18.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\daveb = "C:\\Users\\Admin\\daveb.exe /h" daveb.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\daveb = "C:\\Users\\Admin\\daveb.exe /s" daveb.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\daveb = "C:\\Users\\Admin\\daveb.exe /q" daveb.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\daveb = "C:\\Users\\Admin\\daveb.exe /g" daveb.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\daveb = "C:\\Users\\Admin\\daveb.exe /j" daveb.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\daveb = "C:\\Users\\Admin\\daveb.exe /c" daveb.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\daveb = "C:\\Users\\Admin\\daveb.exe /f" daveb.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\daveb = "C:\\Users\\Admin\\daveb.exe /u" daveb.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\daveb = "C:\\Users\\Admin\\daveb.exe /z" daveb.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\daveb = "C:\\Users\\Admin\\daveb.exe /y" daveb.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\daveb = "C:\\Users\\Admin\\daveb.exe /a" daveb.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\daveb = "C:\\Users\\Admin\\daveb.exe /v" daveb.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\daveb = "C:\\Users\\Admin\\daveb.exe /t" daveb.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\daveb = "C:\\Users\\Admin\\daveb.exe /n" daveb.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\daveb = "C:\\Users\\Admin\\daveb.exe /m" daveb.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\daveb = "C:\\Users\\Admin\\daveb.exe /e" daveb.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\daveb = "C:\\Users\\Admin\\daveb.exe /k" daveb.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\daveb = "C:\\Users\\Admin\\daveb.exe /x" daveb.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\daveb = "C:\\Users\\Admin\\daveb.exe /b" daveb.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\daveb = "C:\\Users\\Admin\\daveb.exe /p" daveb.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\daveb = "C:\\Users\\Admin\\daveb.exe /d" daveb.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\daveb = "C:\\Users\\Admin\\daveb.exe /w" daveb.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 194b5a1b9b59b72bdc812341178c8fd2cfda256e199b19936d0122e3f8598f18.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ daveb.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\daveb = "C:\\Users\\Admin\\daveb.exe /l" daveb.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\daveb = "C:\\Users\\Admin\\daveb.exe /r" daveb.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\daveb = "C:\\Users\\Admin\\daveb.exe /o" daveb.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\daveb = "C:\\Users\\Admin\\daveb.exe /i" daveb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1504 194b5a1b9b59b72bdc812341178c8fd2cfda256e199b19936d0122e3f8598f18.exe 1324 daveb.exe 1324 daveb.exe 1324 daveb.exe 1324 daveb.exe 1324 daveb.exe 1324 daveb.exe 1324 daveb.exe 1324 daveb.exe 1324 daveb.exe 1324 daveb.exe 1324 daveb.exe 1324 daveb.exe 1324 daveb.exe 1324 daveb.exe 1324 daveb.exe 1324 daveb.exe 1324 daveb.exe 1324 daveb.exe 1324 daveb.exe 1324 daveb.exe 1324 daveb.exe 1324 daveb.exe 1324 daveb.exe 1324 daveb.exe 1324 daveb.exe 1324 daveb.exe 1324 daveb.exe 1324 daveb.exe 1324 daveb.exe 1324 daveb.exe 1324 daveb.exe 1324 daveb.exe 1324 daveb.exe 1324 daveb.exe 1324 daveb.exe 1324 daveb.exe 1324 daveb.exe 1324 daveb.exe 1324 daveb.exe 1324 daveb.exe 1324 daveb.exe 1324 daveb.exe 1324 daveb.exe 1324 daveb.exe 1324 daveb.exe 1324 daveb.exe 1324 daveb.exe 1324 daveb.exe 1324 daveb.exe 1324 daveb.exe 1324 daveb.exe 1324 daveb.exe 1324 daveb.exe 1324 daveb.exe 1324 daveb.exe 1324 daveb.exe 1324 daveb.exe 1324 daveb.exe 1324 daveb.exe 1324 daveb.exe 1324 daveb.exe 1324 daveb.exe 1324 daveb.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1504 194b5a1b9b59b72bdc812341178c8fd2cfda256e199b19936d0122e3f8598f18.exe 1324 daveb.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1504 wrote to memory of 1324 1504 194b5a1b9b59b72bdc812341178c8fd2cfda256e199b19936d0122e3f8598f18.exe 26 PID 1504 wrote to memory of 1324 1504 194b5a1b9b59b72bdc812341178c8fd2cfda256e199b19936d0122e3f8598f18.exe 26 PID 1504 wrote to memory of 1324 1504 194b5a1b9b59b72bdc812341178c8fd2cfda256e199b19936d0122e3f8598f18.exe 26 PID 1504 wrote to memory of 1324 1504 194b5a1b9b59b72bdc812341178c8fd2cfda256e199b19936d0122e3f8598f18.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\194b5a1b9b59b72bdc812341178c8fd2cfda256e199b19936d0122e3f8598f18.exe"C:\Users\Admin\AppData\Local\Temp\194b5a1b9b59b72bdc812341178c8fd2cfda256e199b19936d0122e3f8598f18.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Users\Admin\daveb.exe"C:\Users\Admin\daveb.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1324
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD5258b6f34a110cfd51d379c89234a238e
SHA108e1fc110c86f6b6af563dea171977310b24061c
SHA2564e73c362e8b7f1c9599839d9791065bd5d4b8537ad9e0e4bf4b5d2f9d51e5224
SHA512c406a7e21643240e80ea25c26682b9d99f8f5c7256d65f94880f5a884baee602e0c31bb6e7b1f7eb4189d679e637e28f69874fadfe941fe57ae2d623511a639c
-
Filesize
84KB
MD5258b6f34a110cfd51d379c89234a238e
SHA108e1fc110c86f6b6af563dea171977310b24061c
SHA2564e73c362e8b7f1c9599839d9791065bd5d4b8537ad9e0e4bf4b5d2f9d51e5224
SHA512c406a7e21643240e80ea25c26682b9d99f8f5c7256d65f94880f5a884baee602e0c31bb6e7b1f7eb4189d679e637e28f69874fadfe941fe57ae2d623511a639c
-
Filesize
84KB
MD5258b6f34a110cfd51d379c89234a238e
SHA108e1fc110c86f6b6af563dea171977310b24061c
SHA2564e73c362e8b7f1c9599839d9791065bd5d4b8537ad9e0e4bf4b5d2f9d51e5224
SHA512c406a7e21643240e80ea25c26682b9d99f8f5c7256d65f94880f5a884baee602e0c31bb6e7b1f7eb4189d679e637e28f69874fadfe941fe57ae2d623511a639c
-
Filesize
84KB
MD5258b6f34a110cfd51d379c89234a238e
SHA108e1fc110c86f6b6af563dea171977310b24061c
SHA2564e73c362e8b7f1c9599839d9791065bd5d4b8537ad9e0e4bf4b5d2f9d51e5224
SHA512c406a7e21643240e80ea25c26682b9d99f8f5c7256d65f94880f5a884baee602e0c31bb6e7b1f7eb4189d679e637e28f69874fadfe941fe57ae2d623511a639c