Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
29/10/2022, 18:28
Static task
static1
Behavioral task
behavioral1
Sample
abcbb41b3385cc1f5c9065680742d4314f9f8f68cad118fe12359bae05929224.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
abcbb41b3385cc1f5c9065680742d4314f9f8f68cad118fe12359bae05929224.exe
Resource
win10v2004-20220812-en
General
-
Target
abcbb41b3385cc1f5c9065680742d4314f9f8f68cad118fe12359bae05929224.exe
-
Size
256KB
-
MD5
83a749e690c3701671b4bbfb8fd90fce
-
SHA1
5c8e950247db888df6c5c21a17120147df416972
-
SHA256
abcbb41b3385cc1f5c9065680742d4314f9f8f68cad118fe12359bae05929224
-
SHA512
b45135bc94133bfba002ece9a6257ab76028aca2ce11e8608a3d00d52773645231f527afc6ce8ed9ac8b6fe77f0b9f805342e5b79e2a653ac95455593315c101
-
SSDEEP
3072:4TGfWRrIMNRlZ62Pal2LBJXmzOHm5WZ3K+MCagdOY39cBKaRr5xwPVB:4yepp3PJXCOGY3eqOY39cBE
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" abcbb41b3385cc1f5c9065680742d4314f9f8f68cad118fe12359bae05929224.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" poeux.exe -
Executes dropped EXE 1 IoCs
pid Process 1820 poeux.exe -
Loads dropped DLL 2 IoCs
pid Process 1600 abcbb41b3385cc1f5c9065680742d4314f9f8f68cad118fe12359bae05929224.exe 1600 abcbb41b3385cc1f5c9065680742d4314f9f8f68cad118fe12359bae05929224.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\poeux = "C:\\Users\\Admin\\poeux.exe /g" poeux.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\poeux = "C:\\Users\\Admin\\poeux.exe /a" poeux.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\poeux = "C:\\Users\\Admin\\poeux.exe /f" poeux.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ poeux.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\poeux = "C:\\Users\\Admin\\poeux.exe /t" poeux.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\poeux = "C:\\Users\\Admin\\poeux.exe /m" poeux.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\poeux = "C:\\Users\\Admin\\poeux.exe /i" poeux.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ abcbb41b3385cc1f5c9065680742d4314f9f8f68cad118fe12359bae05929224.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\poeux = "C:\\Users\\Admin\\poeux.exe /c" poeux.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\poeux = "C:\\Users\\Admin\\poeux.exe /y" poeux.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\poeux = "C:\\Users\\Admin\\poeux.exe /e" poeux.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\poeux = "C:\\Users\\Admin\\poeux.exe /v" poeux.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\poeux = "C:\\Users\\Admin\\poeux.exe /x" poeux.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\poeux = "C:\\Users\\Admin\\poeux.exe /r" poeux.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\poeux = "C:\\Users\\Admin\\poeux.exe /d" poeux.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\poeux = "C:\\Users\\Admin\\poeux.exe /l" poeux.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\poeux = "C:\\Users\\Admin\\poeux.exe /n" poeux.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\poeux = "C:\\Users\\Admin\\poeux.exe /k" poeux.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\poeux = "C:\\Users\\Admin\\poeux.exe /s" poeux.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\poeux = "C:\\Users\\Admin\\poeux.exe /t" abcbb41b3385cc1f5c9065680742d4314f9f8f68cad118fe12359bae05929224.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\poeux = "C:\\Users\\Admin\\poeux.exe /o" poeux.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\poeux = "C:\\Users\\Admin\\poeux.exe /h" poeux.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\poeux = "C:\\Users\\Admin\\poeux.exe /p" poeux.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\poeux = "C:\\Users\\Admin\\poeux.exe /u" poeux.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\poeux = "C:\\Users\\Admin\\poeux.exe /j" poeux.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\poeux = "C:\\Users\\Admin\\poeux.exe /q" poeux.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\poeux = "C:\\Users\\Admin\\poeux.exe /b" poeux.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\poeux = "C:\\Users\\Admin\\poeux.exe /w" poeux.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\poeux = "C:\\Users\\Admin\\poeux.exe /z" poeux.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1600 abcbb41b3385cc1f5c9065680742d4314f9f8f68cad118fe12359bae05929224.exe 1820 poeux.exe 1820 poeux.exe 1820 poeux.exe 1820 poeux.exe 1820 poeux.exe 1820 poeux.exe 1820 poeux.exe 1820 poeux.exe 1820 poeux.exe 1820 poeux.exe 1820 poeux.exe 1820 poeux.exe 1820 poeux.exe 1820 poeux.exe 1820 poeux.exe 1820 poeux.exe 1820 poeux.exe 1820 poeux.exe 1820 poeux.exe 1820 poeux.exe 1820 poeux.exe 1820 poeux.exe 1820 poeux.exe 1820 poeux.exe 1820 poeux.exe 1820 poeux.exe 1820 poeux.exe 1820 poeux.exe 1820 poeux.exe 1820 poeux.exe 1820 poeux.exe 1820 poeux.exe 1820 poeux.exe 1820 poeux.exe 1820 poeux.exe 1820 poeux.exe 1820 poeux.exe 1820 poeux.exe 1820 poeux.exe 1820 poeux.exe 1820 poeux.exe 1820 poeux.exe 1820 poeux.exe 1820 poeux.exe 1820 poeux.exe 1820 poeux.exe 1820 poeux.exe 1820 poeux.exe 1820 poeux.exe 1820 poeux.exe 1820 poeux.exe 1820 poeux.exe 1820 poeux.exe 1820 poeux.exe 1820 poeux.exe 1820 poeux.exe 1820 poeux.exe 1820 poeux.exe 1820 poeux.exe 1820 poeux.exe 1820 poeux.exe 1820 poeux.exe 1820 poeux.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1600 abcbb41b3385cc1f5c9065680742d4314f9f8f68cad118fe12359bae05929224.exe 1820 poeux.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1600 wrote to memory of 1820 1600 abcbb41b3385cc1f5c9065680742d4314f9f8f68cad118fe12359bae05929224.exe 27 PID 1600 wrote to memory of 1820 1600 abcbb41b3385cc1f5c9065680742d4314f9f8f68cad118fe12359bae05929224.exe 27 PID 1600 wrote to memory of 1820 1600 abcbb41b3385cc1f5c9065680742d4314f9f8f68cad118fe12359bae05929224.exe 27 PID 1600 wrote to memory of 1820 1600 abcbb41b3385cc1f5c9065680742d4314f9f8f68cad118fe12359bae05929224.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\abcbb41b3385cc1f5c9065680742d4314f9f8f68cad118fe12359bae05929224.exe"C:\Users\Admin\AppData\Local\Temp\abcbb41b3385cc1f5c9065680742d4314f9f8f68cad118fe12359bae05929224.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Users\Admin\poeux.exe"C:\Users\Admin\poeux.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1820
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
256KB
MD5d003d51587ac2abe084274ac80c1b44f
SHA1bc3b7cf12c7dfa440b65c491629f26dee78a8965
SHA25696ec5da1cd552f000fff80faa82ae0776b077beed18051c4356c88f0dc553d37
SHA5122eac1bd8cede99eadbf351891f38ee09d389ba976ce899203312dde7285a970690720f7e8ecaf3516cb7b54914f1c1fc5d7171ed88872886feb84eabf2379b49
-
Filesize
256KB
MD5d003d51587ac2abe084274ac80c1b44f
SHA1bc3b7cf12c7dfa440b65c491629f26dee78a8965
SHA25696ec5da1cd552f000fff80faa82ae0776b077beed18051c4356c88f0dc553d37
SHA5122eac1bd8cede99eadbf351891f38ee09d389ba976ce899203312dde7285a970690720f7e8ecaf3516cb7b54914f1c1fc5d7171ed88872886feb84eabf2379b49
-
Filesize
256KB
MD5d003d51587ac2abe084274ac80c1b44f
SHA1bc3b7cf12c7dfa440b65c491629f26dee78a8965
SHA25696ec5da1cd552f000fff80faa82ae0776b077beed18051c4356c88f0dc553d37
SHA5122eac1bd8cede99eadbf351891f38ee09d389ba976ce899203312dde7285a970690720f7e8ecaf3516cb7b54914f1c1fc5d7171ed88872886feb84eabf2379b49
-
Filesize
256KB
MD5d003d51587ac2abe084274ac80c1b44f
SHA1bc3b7cf12c7dfa440b65c491629f26dee78a8965
SHA25696ec5da1cd552f000fff80faa82ae0776b077beed18051c4356c88f0dc553d37
SHA5122eac1bd8cede99eadbf351891f38ee09d389ba976ce899203312dde7285a970690720f7e8ecaf3516cb7b54914f1c1fc5d7171ed88872886feb84eabf2379b49