Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30/10/2022, 20:02
Static task
static1
Behavioral task
behavioral1
Sample
b4f8d752f46ddae98e3f5e83329b5f6aa1c17c22a59bda6c8c5e3bf6713e05e2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b4f8d752f46ddae98e3f5e83329b5f6aa1c17c22a59bda6c8c5e3bf6713e05e2.exe
Resource
win10v2004-20220812-en
General
-
Target
b4f8d752f46ddae98e3f5e83329b5f6aa1c17c22a59bda6c8c5e3bf6713e05e2.exe
-
Size
260KB
-
MD5
a1d70650b0247293705b2994585f09c0
-
SHA1
49ba3cdc210933b6ad8a944666e7884969c4cf04
-
SHA256
b4f8d752f46ddae98e3f5e83329b5f6aa1c17c22a59bda6c8c5e3bf6713e05e2
-
SHA512
a00718501098631c816896eae8fa61004bf3519deeac7ab658816e32aeb7e0776d564fb53310099880f66e7ba30a8253457324a7ac9c54928f058bac5f653cdd
-
SSDEEP
3072:bgfAlNommvh25n/kZoSUjMqXnpWAkpAmTSrMaIOYt/jo7LAtPhjjtZnfHFEoWBf3:bdrgTSrMaIl/jcLijfHFEHWzXvjT85R
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ffxoer.exe -
Executes dropped EXE 1 IoCs
pid Process 2108 ffxoer.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation b4f8d752f46ddae98e3f5e83329b5f6aa1c17c22a59bda6c8c5e3bf6713e05e2.exe -
Adds Run key to start application 2 TTPs 53 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ffxoer = "C:\\Users\\Admin\\ffxoer.exe /u" ffxoer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ffxoer = "C:\\Users\\Admin\\ffxoer.exe /H" ffxoer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ffxoer = "C:\\Users\\Admin\\ffxoer.exe /x" ffxoer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ffxoer = "C:\\Users\\Admin\\ffxoer.exe /i" ffxoer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ffxoer = "C:\\Users\\Admin\\ffxoer.exe /b" ffxoer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ffxoer = "C:\\Users\\Admin\\ffxoer.exe /l" ffxoer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ffxoer = "C:\\Users\\Admin\\ffxoer.exe /G" ffxoer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ffxoer = "C:\\Users\\Admin\\ffxoer.exe /W" ffxoer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ffxoer = "C:\\Users\\Admin\\ffxoer.exe /R" ffxoer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ffxoer = "C:\\Users\\Admin\\ffxoer.exe /V" ffxoer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ffxoer = "C:\\Users\\Admin\\ffxoer.exe /Y" ffxoer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ffxoer = "C:\\Users\\Admin\\ffxoer.exe /J" ffxoer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ffxoer = "C:\\Users\\Admin\\ffxoer.exe /v" ffxoer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ffxoer = "C:\\Users\\Admin\\ffxoer.exe /f" ffxoer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ffxoer = "C:\\Users\\Admin\\ffxoer.exe /y" ffxoer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ffxoer = "C:\\Users\\Admin\\ffxoer.exe /I" ffxoer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ffxoer = "C:\\Users\\Admin\\ffxoer.exe /E" ffxoer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ffxoer = "C:\\Users\\Admin\\ffxoer.exe /U" ffxoer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ffxoer = "C:\\Users\\Admin\\ffxoer.exe /w" ffxoer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ffxoer = "C:\\Users\\Admin\\ffxoer.exe /j" ffxoer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ffxoer = "C:\\Users\\Admin\\ffxoer.exe /S" ffxoer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ffxoer = "C:\\Users\\Admin\\ffxoer.exe /N" ffxoer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ffxoer = "C:\\Users\\Admin\\ffxoer.exe /e" ffxoer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ffxoer = "C:\\Users\\Admin\\ffxoer.exe /c" ffxoer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ffxoer = "C:\\Users\\Admin\\ffxoer.exe /p" ffxoer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ffxoer = "C:\\Users\\Admin\\ffxoer.exe /d" ffxoer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ffxoer = "C:\\Users\\Admin\\ffxoer.exe /k" ffxoer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ffxoer = "C:\\Users\\Admin\\ffxoer.exe /T" ffxoer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ffxoer = "C:\\Users\\Admin\\ffxoer.exe /A" ffxoer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ffxoer = "C:\\Users\\Admin\\ffxoer.exe /q" ffxoer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ffxoer = "C:\\Users\\Admin\\ffxoer.exe /B" ffxoer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ffxoer = "C:\\Users\\Admin\\ffxoer.exe /z" ffxoer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ffxoer = "C:\\Users\\Admin\\ffxoer.exe /h" ffxoer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ffxoer = "C:\\Users\\Admin\\ffxoer.exe /n" ffxoer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ffxoer = "C:\\Users\\Admin\\ffxoer.exe /O" ffxoer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ffxoer = "C:\\Users\\Admin\\ffxoer.exe /P" ffxoer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ffxoer = "C:\\Users\\Admin\\ffxoer.exe /s" ffxoer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ffxoer = "C:\\Users\\Admin\\ffxoer.exe /C" ffxoer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ffxoer = "C:\\Users\\Admin\\ffxoer.exe /Q" ffxoer.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run\ ffxoer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ffxoer = "C:\\Users\\Admin\\ffxoer.exe /K" ffxoer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ffxoer = "C:\\Users\\Admin\\ffxoer.exe /t" ffxoer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ffxoer = "C:\\Users\\Admin\\ffxoer.exe /o" ffxoer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ffxoer = "C:\\Users\\Admin\\ffxoer.exe /D" ffxoer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ffxoer = "C:\\Users\\Admin\\ffxoer.exe /g" ffxoer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ffxoer = "C:\\Users\\Admin\\ffxoer.exe /L" ffxoer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ffxoer = "C:\\Users\\Admin\\ffxoer.exe /Z" ffxoer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ffxoer = "C:\\Users\\Admin\\ffxoer.exe /M" ffxoer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ffxoer = "C:\\Users\\Admin\\ffxoer.exe /X" ffxoer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ffxoer = "C:\\Users\\Admin\\ffxoer.exe /a" ffxoer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ffxoer = "C:\\Users\\Admin\\ffxoer.exe /F" ffxoer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ffxoer = "C:\\Users\\Admin\\ffxoer.exe /r" ffxoer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ffxoer = "C:\\Users\\Admin\\ffxoer.exe /m" ffxoer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2108 ffxoer.exe 2108 ffxoer.exe 2108 ffxoer.exe 2108 ffxoer.exe 2108 ffxoer.exe 2108 ffxoer.exe 2108 ffxoer.exe 2108 ffxoer.exe 2108 ffxoer.exe 2108 ffxoer.exe 2108 ffxoer.exe 2108 ffxoer.exe 2108 ffxoer.exe 2108 ffxoer.exe 2108 ffxoer.exe 2108 ffxoer.exe 2108 ffxoer.exe 2108 ffxoer.exe 2108 ffxoer.exe 2108 ffxoer.exe 2108 ffxoer.exe 2108 ffxoer.exe 2108 ffxoer.exe 2108 ffxoer.exe 2108 ffxoer.exe 2108 ffxoer.exe 2108 ffxoer.exe 2108 ffxoer.exe 2108 ffxoer.exe 2108 ffxoer.exe 2108 ffxoer.exe 2108 ffxoer.exe 2108 ffxoer.exe 2108 ffxoer.exe 2108 ffxoer.exe 2108 ffxoer.exe 2108 ffxoer.exe 2108 ffxoer.exe 2108 ffxoer.exe 2108 ffxoer.exe 2108 ffxoer.exe 2108 ffxoer.exe 2108 ffxoer.exe 2108 ffxoer.exe 2108 ffxoer.exe 2108 ffxoer.exe 2108 ffxoer.exe 2108 ffxoer.exe 2108 ffxoer.exe 2108 ffxoer.exe 2108 ffxoer.exe 2108 ffxoer.exe 2108 ffxoer.exe 2108 ffxoer.exe 2108 ffxoer.exe 2108 ffxoer.exe 2108 ffxoer.exe 2108 ffxoer.exe 2108 ffxoer.exe 2108 ffxoer.exe 2108 ffxoer.exe 2108 ffxoer.exe 2108 ffxoer.exe 2108 ffxoer.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2608 b4f8d752f46ddae98e3f5e83329b5f6aa1c17c22a59bda6c8c5e3bf6713e05e2.exe 2108 ffxoer.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2608 wrote to memory of 2108 2608 b4f8d752f46ddae98e3f5e83329b5f6aa1c17c22a59bda6c8c5e3bf6713e05e2.exe 81 PID 2608 wrote to memory of 2108 2608 b4f8d752f46ddae98e3f5e83329b5f6aa1c17c22a59bda6c8c5e3bf6713e05e2.exe 81 PID 2608 wrote to memory of 2108 2608 b4f8d752f46ddae98e3f5e83329b5f6aa1c17c22a59bda6c8c5e3bf6713e05e2.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\b4f8d752f46ddae98e3f5e83329b5f6aa1c17c22a59bda6c8c5e3bf6713e05e2.exe"C:\Users\Admin\AppData\Local\Temp\b4f8d752f46ddae98e3f5e83329b5f6aa1c17c22a59bda6c8c5e3bf6713e05e2.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Users\Admin\ffxoer.exe"C:\Users\Admin\ffxoer.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2108
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
260KB
MD5ef7e90b173c2e7ce779984e4d51fdf53
SHA1936dc966ae98c9226896ef392786e5bfe9c1a659
SHA2563058c57b9c211e221069a188a27f79f5ef7d62cb7203d2ae0e1acaedf00bbae7
SHA512ce070aeaf3ae256088a11eef06645c21f69e99b3a40313d49dabc8a6ad651659d1b10b8b60c0b29709c233afaa9f9b71ad92b828e603786d5f3a1a90169c1db0
-
Filesize
260KB
MD5ef7e90b173c2e7ce779984e4d51fdf53
SHA1936dc966ae98c9226896ef392786e5bfe9c1a659
SHA2563058c57b9c211e221069a188a27f79f5ef7d62cb7203d2ae0e1acaedf00bbae7
SHA512ce070aeaf3ae256088a11eef06645c21f69e99b3a40313d49dabc8a6ad651659d1b10b8b60c0b29709c233afaa9f9b71ad92b828e603786d5f3a1a90169c1db0