Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
23/11/2022, 20:55
Static task
static1
Behavioral task
behavioral1
Sample
425cadc8fcf70f4059966a449ac4e4e0ba8089526056611f6277f7f541403faf.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
425cadc8fcf70f4059966a449ac4e4e0ba8089526056611f6277f7f541403faf.exe
Resource
win10v2004-20221111-en
General
-
Target
425cadc8fcf70f4059966a449ac4e4e0ba8089526056611f6277f7f541403faf.exe
-
Size
112KB
-
MD5
1570b43e0fa58df33f131a7a31e1d98f
-
SHA1
901bae9f0ae0f1af725ade6f50eede6e3c5e3422
-
SHA256
425cadc8fcf70f4059966a449ac4e4e0ba8089526056611f6277f7f541403faf
-
SHA512
37a3216694e682d2c4e3d3d72553ecd1a8a3285f633c12aeb4ea5a03d58e9e329f21e6bbbd56632d603ad2be07c770fa9134887d8f0e3379320225139709704e
-
SSDEEP
3072:7ysIkT5lJlfkX9kXWqgkXAkXAkXAkXtkX8kXQkXhkXIkX/kXdkX+kXmkXJkXMkXH:7ysIkrkX9kXWqgkXAkXAkXAkXtkX8kXl
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" deogeer.exe -
Executes dropped EXE 1 IoCs
pid Process 2040 deogeer.exe -
Loads dropped DLL 2 IoCs
pid Process 1252 425cadc8fcf70f4059966a449ac4e4e0ba8089526056611f6277f7f541403faf.exe 1252 425cadc8fcf70f4059966a449ac4e4e0ba8089526056611f6277f7f541403faf.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ deogeer.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\deogeer = "C:\\Users\\Admin\\deogeer.exe" deogeer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2040 deogeer.exe 2040 deogeer.exe 2040 deogeer.exe 2040 deogeer.exe 2040 deogeer.exe 2040 deogeer.exe 2040 deogeer.exe 2040 deogeer.exe 2040 deogeer.exe 2040 deogeer.exe 2040 deogeer.exe 2040 deogeer.exe 2040 deogeer.exe 2040 deogeer.exe 2040 deogeer.exe 2040 deogeer.exe 2040 deogeer.exe 2040 deogeer.exe 2040 deogeer.exe 2040 deogeer.exe 2040 deogeer.exe 2040 deogeer.exe 2040 deogeer.exe 2040 deogeer.exe 2040 deogeer.exe 2040 deogeer.exe 2040 deogeer.exe 2040 deogeer.exe 2040 deogeer.exe 2040 deogeer.exe 2040 deogeer.exe 2040 deogeer.exe 2040 deogeer.exe 2040 deogeer.exe 2040 deogeer.exe 2040 deogeer.exe 2040 deogeer.exe 2040 deogeer.exe 2040 deogeer.exe 2040 deogeer.exe 2040 deogeer.exe 2040 deogeer.exe 2040 deogeer.exe 2040 deogeer.exe 2040 deogeer.exe 2040 deogeer.exe 2040 deogeer.exe 2040 deogeer.exe 2040 deogeer.exe 2040 deogeer.exe 2040 deogeer.exe 2040 deogeer.exe 2040 deogeer.exe 2040 deogeer.exe 2040 deogeer.exe 2040 deogeer.exe 2040 deogeer.exe 2040 deogeer.exe 2040 deogeer.exe 2040 deogeer.exe 2040 deogeer.exe 2040 deogeer.exe 2040 deogeer.exe 2040 deogeer.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1252 425cadc8fcf70f4059966a449ac4e4e0ba8089526056611f6277f7f541403faf.exe 2040 deogeer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1252 wrote to memory of 2040 1252 425cadc8fcf70f4059966a449ac4e4e0ba8089526056611f6277f7f541403faf.exe 27 PID 1252 wrote to memory of 2040 1252 425cadc8fcf70f4059966a449ac4e4e0ba8089526056611f6277f7f541403faf.exe 27 PID 1252 wrote to memory of 2040 1252 425cadc8fcf70f4059966a449ac4e4e0ba8089526056611f6277f7f541403faf.exe 27 PID 1252 wrote to memory of 2040 1252 425cadc8fcf70f4059966a449ac4e4e0ba8089526056611f6277f7f541403faf.exe 27 PID 2040 wrote to memory of 1252 2040 deogeer.exe 26 PID 2040 wrote to memory of 1252 2040 deogeer.exe 26 PID 2040 wrote to memory of 1252 2040 deogeer.exe 26 PID 2040 wrote to memory of 1252 2040 deogeer.exe 26 PID 2040 wrote to memory of 1252 2040 deogeer.exe 26 PID 2040 wrote to memory of 1252 2040 deogeer.exe 26 PID 2040 wrote to memory of 1252 2040 deogeer.exe 26 PID 2040 wrote to memory of 1252 2040 deogeer.exe 26 PID 2040 wrote to memory of 1252 2040 deogeer.exe 26 PID 2040 wrote to memory of 1252 2040 deogeer.exe 26 PID 2040 wrote to memory of 1252 2040 deogeer.exe 26 PID 2040 wrote to memory of 1252 2040 deogeer.exe 26 PID 2040 wrote to memory of 1252 2040 deogeer.exe 26 PID 2040 wrote to memory of 1252 2040 deogeer.exe 26 PID 2040 wrote to memory of 1252 2040 deogeer.exe 26 PID 2040 wrote to memory of 1252 2040 deogeer.exe 26 PID 2040 wrote to memory of 1252 2040 deogeer.exe 26 PID 2040 wrote to memory of 1252 2040 deogeer.exe 26 PID 2040 wrote to memory of 1252 2040 deogeer.exe 26 PID 2040 wrote to memory of 1252 2040 deogeer.exe 26 PID 2040 wrote to memory of 1252 2040 deogeer.exe 26 PID 2040 wrote to memory of 1252 2040 deogeer.exe 26 PID 2040 wrote to memory of 1252 2040 deogeer.exe 26 PID 2040 wrote to memory of 1252 2040 deogeer.exe 26 PID 2040 wrote to memory of 1252 2040 deogeer.exe 26 PID 2040 wrote to memory of 1252 2040 deogeer.exe 26 PID 2040 wrote to memory of 1252 2040 deogeer.exe 26 PID 2040 wrote to memory of 1252 2040 deogeer.exe 26 PID 2040 wrote to memory of 1252 2040 deogeer.exe 26 PID 2040 wrote to memory of 1252 2040 deogeer.exe 26 PID 2040 wrote to memory of 1252 2040 deogeer.exe 26 PID 2040 wrote to memory of 1252 2040 deogeer.exe 26 PID 2040 wrote to memory of 1252 2040 deogeer.exe 26 PID 2040 wrote to memory of 1252 2040 deogeer.exe 26 PID 2040 wrote to memory of 1252 2040 deogeer.exe 26 PID 2040 wrote to memory of 1252 2040 deogeer.exe 26 PID 2040 wrote to memory of 1252 2040 deogeer.exe 26 PID 2040 wrote to memory of 1252 2040 deogeer.exe 26 PID 2040 wrote to memory of 1252 2040 deogeer.exe 26 PID 2040 wrote to memory of 1252 2040 deogeer.exe 26 PID 2040 wrote to memory of 1252 2040 deogeer.exe 26 PID 2040 wrote to memory of 1252 2040 deogeer.exe 26 PID 2040 wrote to memory of 1252 2040 deogeer.exe 26 PID 2040 wrote to memory of 1252 2040 deogeer.exe 26 PID 2040 wrote to memory of 1252 2040 deogeer.exe 26 PID 2040 wrote to memory of 1252 2040 deogeer.exe 26 PID 2040 wrote to memory of 1252 2040 deogeer.exe 26 PID 2040 wrote to memory of 1252 2040 deogeer.exe 26 PID 2040 wrote to memory of 1252 2040 deogeer.exe 26 PID 2040 wrote to memory of 1252 2040 deogeer.exe 26 PID 2040 wrote to memory of 1252 2040 deogeer.exe 26 PID 2040 wrote to memory of 1252 2040 deogeer.exe 26 PID 2040 wrote to memory of 1252 2040 deogeer.exe 26 PID 2040 wrote to memory of 1252 2040 deogeer.exe 26 PID 2040 wrote to memory of 1252 2040 deogeer.exe 26 PID 2040 wrote to memory of 1252 2040 deogeer.exe 26 PID 2040 wrote to memory of 1252 2040 deogeer.exe 26 PID 2040 wrote to memory of 1252 2040 deogeer.exe 26 PID 2040 wrote to memory of 1252 2040 deogeer.exe 26 PID 2040 wrote to memory of 1252 2040 deogeer.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\425cadc8fcf70f4059966a449ac4e4e0ba8089526056611f6277f7f541403faf.exe"C:\Users\Admin\AppData\Local\Temp\425cadc8fcf70f4059966a449ac4e4e0ba8089526056611f6277f7f541403faf.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Users\Admin\deogeer.exe"C:\Users\Admin\deogeer.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2040
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
112KB
MD5b998a610f0a307af540c53d1ac9891ab
SHA1c4348f6393a5e7ea19a4b7889390e9ebfab292e8
SHA256a2956b79c02b24bc48a6d6fd6f6bcbdac15a65b4beed1726fc34df98840152c8
SHA512bc9174e4a80cd0a2ea97d1770e57c1769f002455c35c476b473b496f3d2abccd38085a9ea571c8d25f9e411949d3819c98ff0e04229e3cf986ec5ae56581c08e
-
Filesize
112KB
MD5b998a610f0a307af540c53d1ac9891ab
SHA1c4348f6393a5e7ea19a4b7889390e9ebfab292e8
SHA256a2956b79c02b24bc48a6d6fd6f6bcbdac15a65b4beed1726fc34df98840152c8
SHA512bc9174e4a80cd0a2ea97d1770e57c1769f002455c35c476b473b496f3d2abccd38085a9ea571c8d25f9e411949d3819c98ff0e04229e3cf986ec5ae56581c08e
-
Filesize
112KB
MD5b998a610f0a307af540c53d1ac9891ab
SHA1c4348f6393a5e7ea19a4b7889390e9ebfab292e8
SHA256a2956b79c02b24bc48a6d6fd6f6bcbdac15a65b4beed1726fc34df98840152c8
SHA512bc9174e4a80cd0a2ea97d1770e57c1769f002455c35c476b473b496f3d2abccd38085a9ea571c8d25f9e411949d3819c98ff0e04229e3cf986ec5ae56581c08e
-
Filesize
112KB
MD5b998a610f0a307af540c53d1ac9891ab
SHA1c4348f6393a5e7ea19a4b7889390e9ebfab292e8
SHA256a2956b79c02b24bc48a6d6fd6f6bcbdac15a65b4beed1726fc34df98840152c8
SHA512bc9174e4a80cd0a2ea97d1770e57c1769f002455c35c476b473b496f3d2abccd38085a9ea571c8d25f9e411949d3819c98ff0e04229e3cf986ec5ae56581c08e