Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
41s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
07/11/2022, 16:32
Static task
static1
Behavioral task
behavioral1
Sample
05e8656c4a76c7570c0a46b09a8d372a7273bec025f53262a3d05173c5cc4072.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
05e8656c4a76c7570c0a46b09a8d372a7273bec025f53262a3d05173c5cc4072.exe
Resource
win10v2004-20220901-en
General
-
Target
05e8656c4a76c7570c0a46b09a8d372a7273bec025f53262a3d05173c5cc4072.exe
-
Size
140KB
-
MD5
0d1d16ab46d47ed401f19bf01117c02c
-
SHA1
465cbffe841b5d4f9b0ac990db7a2a61ee54b143
-
SHA256
05e8656c4a76c7570c0a46b09a8d372a7273bec025f53262a3d05173c5cc4072
-
SHA512
1ce76d908ea79feb601aa1e7985097cb647cb55ba9c1762642dedd3691bec583c9e14459d1269b06e999c7311284084d6b37948a0b274a6cf25730de58ac0044
-
SSDEEP
3072:U9Pj7FuHCxABX562J7fT4PE6fUneYkLpE6H/4oQZiEmvNz:UFufBJ1J7f8z9ScWov5
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 05e8656c4a76c7570c0a46b09a8d372a7273bec025f53262a3d05173c5cc4072.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" suepiuy.exe -
Executes dropped EXE 1 IoCs
pid Process 1272 suepiuy.exe -
Loads dropped DLL 2 IoCs
pid Process 1344 05e8656c4a76c7570c0a46b09a8d372a7273bec025f53262a3d05173c5cc4072.exe 1344 05e8656c4a76c7570c0a46b09a8d372a7273bec025f53262a3d05173c5cc4072.exe -
Adds Run key to start application 2 TTPs 53 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ suepiuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\suepiuy = "C:\\Users\\Admin\\suepiuy.exe /l" suepiuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\suepiuy = "C:\\Users\\Admin\\suepiuy.exe /B" suepiuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\suepiuy = "C:\\Users\\Admin\\suepiuy.exe /j" suepiuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\suepiuy = "C:\\Users\\Admin\\suepiuy.exe /D" suepiuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\suepiuy = "C:\\Users\\Admin\\suepiuy.exe /u" suepiuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\suepiuy = "C:\\Users\\Admin\\suepiuy.exe /I" suepiuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\suepiuy = "C:\\Users\\Admin\\suepiuy.exe /M" suepiuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\suepiuy = "C:\\Users\\Admin\\suepiuy.exe /b" suepiuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\suepiuy = "C:\\Users\\Admin\\suepiuy.exe /n" suepiuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\suepiuy = "C:\\Users\\Admin\\suepiuy.exe /v" suepiuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\suepiuy = "C:\\Users\\Admin\\suepiuy.exe /r" suepiuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\suepiuy = "C:\\Users\\Admin\\suepiuy.exe /e" suepiuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\suepiuy = "C:\\Users\\Admin\\suepiuy.exe /o" suepiuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\suepiuy = "C:\\Users\\Admin\\suepiuy.exe /S" suepiuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\suepiuy = "C:\\Users\\Admin\\suepiuy.exe /R" suepiuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\suepiuy = "C:\\Users\\Admin\\suepiuy.exe /G" suepiuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\suepiuy = "C:\\Users\\Admin\\suepiuy.exe /d" suepiuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\suepiuy = "C:\\Users\\Admin\\suepiuy.exe /P" suepiuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\suepiuy = "C:\\Users\\Admin\\suepiuy.exe /O" suepiuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\suepiuy = "C:\\Users\\Admin\\suepiuy.exe /k" suepiuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\suepiuy = "C:\\Users\\Admin\\suepiuy.exe /W" suepiuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\suepiuy = "C:\\Users\\Admin\\suepiuy.exe /K" suepiuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\suepiuy = "C:\\Users\\Admin\\suepiuy.exe /f" suepiuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\suepiuy = "C:\\Users\\Admin\\suepiuy.exe /a" suepiuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\suepiuy = "C:\\Users\\Admin\\suepiuy.exe /h" suepiuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\suepiuy = "C:\\Users\\Admin\\suepiuy.exe /V" suepiuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\suepiuy = "C:\\Users\\Admin\\suepiuy.exe /e" 05e8656c4a76c7570c0a46b09a8d372a7273bec025f53262a3d05173c5cc4072.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\suepiuy = "C:\\Users\\Admin\\suepiuy.exe /g" suepiuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\suepiuy = "C:\\Users\\Admin\\suepiuy.exe /p" suepiuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\suepiuy = "C:\\Users\\Admin\\suepiuy.exe /U" suepiuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\suepiuy = "C:\\Users\\Admin\\suepiuy.exe /q" suepiuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\suepiuy = "C:\\Users\\Admin\\suepiuy.exe /x" suepiuy.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 05e8656c4a76c7570c0a46b09a8d372a7273bec025f53262a3d05173c5cc4072.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\suepiuy = "C:\\Users\\Admin\\suepiuy.exe /X" suepiuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\suepiuy = "C:\\Users\\Admin\\suepiuy.exe /i" suepiuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\suepiuy = "C:\\Users\\Admin\\suepiuy.exe /T" suepiuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\suepiuy = "C:\\Users\\Admin\\suepiuy.exe /H" suepiuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\suepiuy = "C:\\Users\\Admin\\suepiuy.exe /J" suepiuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\suepiuy = "C:\\Users\\Admin\\suepiuy.exe /F" suepiuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\suepiuy = "C:\\Users\\Admin\\suepiuy.exe /m" suepiuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\suepiuy = "C:\\Users\\Admin\\suepiuy.exe /C" suepiuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\suepiuy = "C:\\Users\\Admin\\suepiuy.exe /Q" suepiuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\suepiuy = "C:\\Users\\Admin\\suepiuy.exe /t" suepiuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\suepiuy = "C:\\Users\\Admin\\suepiuy.exe /y" suepiuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\suepiuy = "C:\\Users\\Admin\\suepiuy.exe /L" suepiuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\suepiuy = "C:\\Users\\Admin\\suepiuy.exe /Z" suepiuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\suepiuy = "C:\\Users\\Admin\\suepiuy.exe /Y" suepiuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\suepiuy = "C:\\Users\\Admin\\suepiuy.exe /N" suepiuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\suepiuy = "C:\\Users\\Admin\\suepiuy.exe /E" suepiuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\suepiuy = "C:\\Users\\Admin\\suepiuy.exe /s" suepiuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\suepiuy = "C:\\Users\\Admin\\suepiuy.exe /A" suepiuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\suepiuy = "C:\\Users\\Admin\\suepiuy.exe /c" suepiuy.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1344 05e8656c4a76c7570c0a46b09a8d372a7273bec025f53262a3d05173c5cc4072.exe 1272 suepiuy.exe 1272 suepiuy.exe 1272 suepiuy.exe 1272 suepiuy.exe 1272 suepiuy.exe 1272 suepiuy.exe 1272 suepiuy.exe 1272 suepiuy.exe 1272 suepiuy.exe 1272 suepiuy.exe 1272 suepiuy.exe 1272 suepiuy.exe 1272 suepiuy.exe 1272 suepiuy.exe 1272 suepiuy.exe 1272 suepiuy.exe 1272 suepiuy.exe 1272 suepiuy.exe 1272 suepiuy.exe 1272 suepiuy.exe 1272 suepiuy.exe 1272 suepiuy.exe 1272 suepiuy.exe 1272 suepiuy.exe 1272 suepiuy.exe 1272 suepiuy.exe 1272 suepiuy.exe 1272 suepiuy.exe 1272 suepiuy.exe 1272 suepiuy.exe 1272 suepiuy.exe 1272 suepiuy.exe 1272 suepiuy.exe 1272 suepiuy.exe 1272 suepiuy.exe 1272 suepiuy.exe 1272 suepiuy.exe 1272 suepiuy.exe 1272 suepiuy.exe 1272 suepiuy.exe 1272 suepiuy.exe 1272 suepiuy.exe 1272 suepiuy.exe 1272 suepiuy.exe 1272 suepiuy.exe 1272 suepiuy.exe 1272 suepiuy.exe 1272 suepiuy.exe 1272 suepiuy.exe 1272 suepiuy.exe 1272 suepiuy.exe 1272 suepiuy.exe 1272 suepiuy.exe 1272 suepiuy.exe 1272 suepiuy.exe 1272 suepiuy.exe 1272 suepiuy.exe 1272 suepiuy.exe 1272 suepiuy.exe 1272 suepiuy.exe 1272 suepiuy.exe 1272 suepiuy.exe 1272 suepiuy.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1344 05e8656c4a76c7570c0a46b09a8d372a7273bec025f53262a3d05173c5cc4072.exe 1272 suepiuy.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1344 wrote to memory of 1272 1344 05e8656c4a76c7570c0a46b09a8d372a7273bec025f53262a3d05173c5cc4072.exe 26 PID 1344 wrote to memory of 1272 1344 05e8656c4a76c7570c0a46b09a8d372a7273bec025f53262a3d05173c5cc4072.exe 26 PID 1344 wrote to memory of 1272 1344 05e8656c4a76c7570c0a46b09a8d372a7273bec025f53262a3d05173c5cc4072.exe 26 PID 1344 wrote to memory of 1272 1344 05e8656c4a76c7570c0a46b09a8d372a7273bec025f53262a3d05173c5cc4072.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\05e8656c4a76c7570c0a46b09a8d372a7273bec025f53262a3d05173c5cc4072.exe"C:\Users\Admin\AppData\Local\Temp\05e8656c4a76c7570c0a46b09a8d372a7273bec025f53262a3d05173c5cc4072.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Users\Admin\suepiuy.exe"C:\Users\Admin\suepiuy.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1272
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
140KB
MD557898830009245119a523114cf912d98
SHA1c662ec2f8bc4b42e88fd4be7e9476747b27d6698
SHA25687549406251e49c24e32e7ba148eedc4535999739e7f11f6202d750e1a142f72
SHA51225242c214e4765907a43817056a0dc4fc18ab9566c846bbea4b130e31494f79681f406767cadb007978472e44f687bf32a8c41be59fc43be8053d85539577a8c
-
Filesize
140KB
MD557898830009245119a523114cf912d98
SHA1c662ec2f8bc4b42e88fd4be7e9476747b27d6698
SHA25687549406251e49c24e32e7ba148eedc4535999739e7f11f6202d750e1a142f72
SHA51225242c214e4765907a43817056a0dc4fc18ab9566c846bbea4b130e31494f79681f406767cadb007978472e44f687bf32a8c41be59fc43be8053d85539577a8c
-
Filesize
140KB
MD557898830009245119a523114cf912d98
SHA1c662ec2f8bc4b42e88fd4be7e9476747b27d6698
SHA25687549406251e49c24e32e7ba148eedc4535999739e7f11f6202d750e1a142f72
SHA51225242c214e4765907a43817056a0dc4fc18ab9566c846bbea4b130e31494f79681f406767cadb007978472e44f687bf32a8c41be59fc43be8053d85539577a8c
-
Filesize
140KB
MD557898830009245119a523114cf912d98
SHA1c662ec2f8bc4b42e88fd4be7e9476747b27d6698
SHA25687549406251e49c24e32e7ba148eedc4535999739e7f11f6202d750e1a142f72
SHA51225242c214e4765907a43817056a0dc4fc18ab9566c846bbea4b130e31494f79681f406767cadb007978472e44f687bf32a8c41be59fc43be8053d85539577a8c