Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
153s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23/11/2022, 20:55
Static task
static1
Behavioral task
behavioral1
Sample
425cadc8fcf70f4059966a449ac4e4e0ba8089526056611f6277f7f541403faf.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
425cadc8fcf70f4059966a449ac4e4e0ba8089526056611f6277f7f541403faf.exe
Resource
win10v2004-20221111-en
General
-
Target
425cadc8fcf70f4059966a449ac4e4e0ba8089526056611f6277f7f541403faf.exe
-
Size
112KB
-
MD5
1570b43e0fa58df33f131a7a31e1d98f
-
SHA1
901bae9f0ae0f1af725ade6f50eede6e3c5e3422
-
SHA256
425cadc8fcf70f4059966a449ac4e4e0ba8089526056611f6277f7f541403faf
-
SHA512
37a3216694e682d2c4e3d3d72553ecd1a8a3285f633c12aeb4ea5a03d58e9e329f21e6bbbd56632d603ad2be07c770fa9134887d8f0e3379320225139709704e
-
SSDEEP
3072:7ysIkT5lJlfkX9kXWqgkXAkXAkXAkXtkX8kXQkXhkXIkX/kXdkX+kXmkXJkXMkXH:7ysIkrkX9kXWqgkXAkXAkXAkXtkX8kXl
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" seowoo.exe -
Executes dropped EXE 1 IoCs
pid Process 1876 seowoo.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\Control Panel\International\Geo\Nation 425cadc8fcf70f4059966a449ac4e4e0ba8089526056611f6277f7f541403faf.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\Software\Microsoft\Windows\CurrentVersion\Run\ seowoo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seowoo = "C:\\Users\\Admin\\seowoo.exe" seowoo.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1876 seowoo.exe 1876 seowoo.exe 1876 seowoo.exe 1876 seowoo.exe 1876 seowoo.exe 1876 seowoo.exe 1876 seowoo.exe 1876 seowoo.exe 1876 seowoo.exe 1876 seowoo.exe 1876 seowoo.exe 1876 seowoo.exe 1876 seowoo.exe 1876 seowoo.exe 1876 seowoo.exe 1876 seowoo.exe 1876 seowoo.exe 1876 seowoo.exe 1876 seowoo.exe 1876 seowoo.exe 1876 seowoo.exe 1876 seowoo.exe 1876 seowoo.exe 1876 seowoo.exe 1876 seowoo.exe 1876 seowoo.exe 1876 seowoo.exe 1876 seowoo.exe 1876 seowoo.exe 1876 seowoo.exe 1876 seowoo.exe 1876 seowoo.exe 1876 seowoo.exe 1876 seowoo.exe 1876 seowoo.exe 1876 seowoo.exe 1876 seowoo.exe 1876 seowoo.exe 1876 seowoo.exe 1876 seowoo.exe 1876 seowoo.exe 1876 seowoo.exe 1876 seowoo.exe 1876 seowoo.exe 1876 seowoo.exe 1876 seowoo.exe 1876 seowoo.exe 1876 seowoo.exe 1876 seowoo.exe 1876 seowoo.exe 1876 seowoo.exe 1876 seowoo.exe 1876 seowoo.exe 1876 seowoo.exe 1876 seowoo.exe 1876 seowoo.exe 1876 seowoo.exe 1876 seowoo.exe 1876 seowoo.exe 1876 seowoo.exe 1876 seowoo.exe 1876 seowoo.exe 1876 seowoo.exe 1876 seowoo.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1972 425cadc8fcf70f4059966a449ac4e4e0ba8089526056611f6277f7f541403faf.exe 1876 seowoo.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1972 wrote to memory of 1876 1972 425cadc8fcf70f4059966a449ac4e4e0ba8089526056611f6277f7f541403faf.exe 84 PID 1972 wrote to memory of 1876 1972 425cadc8fcf70f4059966a449ac4e4e0ba8089526056611f6277f7f541403faf.exe 84 PID 1972 wrote to memory of 1876 1972 425cadc8fcf70f4059966a449ac4e4e0ba8089526056611f6277f7f541403faf.exe 84 PID 1876 wrote to memory of 1972 1876 seowoo.exe 83 PID 1876 wrote to memory of 1972 1876 seowoo.exe 83 PID 1876 wrote to memory of 1972 1876 seowoo.exe 83 PID 1876 wrote to memory of 1972 1876 seowoo.exe 83 PID 1876 wrote to memory of 1972 1876 seowoo.exe 83 PID 1876 wrote to memory of 1972 1876 seowoo.exe 83 PID 1876 wrote to memory of 1972 1876 seowoo.exe 83 PID 1876 wrote to memory of 1972 1876 seowoo.exe 83 PID 1876 wrote to memory of 1972 1876 seowoo.exe 83 PID 1876 wrote to memory of 1972 1876 seowoo.exe 83 PID 1876 wrote to memory of 1972 1876 seowoo.exe 83 PID 1876 wrote to memory of 1972 1876 seowoo.exe 83 PID 1876 wrote to memory of 1972 1876 seowoo.exe 83 PID 1876 wrote to memory of 1972 1876 seowoo.exe 83 PID 1876 wrote to memory of 1972 1876 seowoo.exe 83 PID 1876 wrote to memory of 1972 1876 seowoo.exe 83 PID 1876 wrote to memory of 1972 1876 seowoo.exe 83 PID 1876 wrote to memory of 1972 1876 seowoo.exe 83 PID 1876 wrote to memory of 1972 1876 seowoo.exe 83 PID 1876 wrote to memory of 1972 1876 seowoo.exe 83 PID 1876 wrote to memory of 1972 1876 seowoo.exe 83 PID 1876 wrote to memory of 1972 1876 seowoo.exe 83 PID 1876 wrote to memory of 1972 1876 seowoo.exe 83 PID 1876 wrote to memory of 1972 1876 seowoo.exe 83 PID 1876 wrote to memory of 1972 1876 seowoo.exe 83 PID 1876 wrote to memory of 1972 1876 seowoo.exe 83 PID 1876 wrote to memory of 1972 1876 seowoo.exe 83 PID 1876 wrote to memory of 1972 1876 seowoo.exe 83 PID 1876 wrote to memory of 1972 1876 seowoo.exe 83 PID 1876 wrote to memory of 1972 1876 seowoo.exe 83 PID 1876 wrote to memory of 1972 1876 seowoo.exe 83 PID 1876 wrote to memory of 1972 1876 seowoo.exe 83 PID 1876 wrote to memory of 1972 1876 seowoo.exe 83 PID 1876 wrote to memory of 1972 1876 seowoo.exe 83 PID 1876 wrote to memory of 1972 1876 seowoo.exe 83 PID 1876 wrote to memory of 1972 1876 seowoo.exe 83 PID 1876 wrote to memory of 1972 1876 seowoo.exe 83 PID 1876 wrote to memory of 1972 1876 seowoo.exe 83 PID 1876 wrote to memory of 1972 1876 seowoo.exe 83 PID 1876 wrote to memory of 1972 1876 seowoo.exe 83 PID 1876 wrote to memory of 1972 1876 seowoo.exe 83 PID 1876 wrote to memory of 1972 1876 seowoo.exe 83 PID 1876 wrote to memory of 1972 1876 seowoo.exe 83 PID 1876 wrote to memory of 1972 1876 seowoo.exe 83 PID 1876 wrote to memory of 1972 1876 seowoo.exe 83 PID 1876 wrote to memory of 1972 1876 seowoo.exe 83 PID 1876 wrote to memory of 1972 1876 seowoo.exe 83 PID 1876 wrote to memory of 1972 1876 seowoo.exe 83 PID 1876 wrote to memory of 1972 1876 seowoo.exe 83 PID 1876 wrote to memory of 1972 1876 seowoo.exe 83 PID 1876 wrote to memory of 1972 1876 seowoo.exe 83 PID 1876 wrote to memory of 1972 1876 seowoo.exe 83 PID 1876 wrote to memory of 1972 1876 seowoo.exe 83 PID 1876 wrote to memory of 1972 1876 seowoo.exe 83 PID 1876 wrote to memory of 1972 1876 seowoo.exe 83 PID 1876 wrote to memory of 1972 1876 seowoo.exe 83 PID 1876 wrote to memory of 1972 1876 seowoo.exe 83 PID 1876 wrote to memory of 1972 1876 seowoo.exe 83 PID 1876 wrote to memory of 1972 1876 seowoo.exe 83 PID 1876 wrote to memory of 1972 1876 seowoo.exe 83 PID 1876 wrote to memory of 1972 1876 seowoo.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\425cadc8fcf70f4059966a449ac4e4e0ba8089526056611f6277f7f541403faf.exe"C:\Users\Admin\AppData\Local\Temp\425cadc8fcf70f4059966a449ac4e4e0ba8089526056611f6277f7f541403faf.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Users\Admin\seowoo.exe"C:\Users\Admin\seowoo.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1876
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
112KB
MD5bbfee9c874a64307f1fc5e0022a582d1
SHA1f3b64b00ebe9157d0b1f4cd366adecf6e9bf9318
SHA25636d945ec458e6c0f856a64f0e5d85bebf5f87653d3bc77787573c14e5d93a360
SHA51236decbcfb44c6ef5e7cfe0c48db299c5436c126aedce567d9f04304762570153a1f1bd3d4b4f954000ea3898cd8cd0781a0b97eb061befa62982abbfa5c1aa05
-
Filesize
112KB
MD5bbfee9c874a64307f1fc5e0022a582d1
SHA1f3b64b00ebe9157d0b1f4cd366adecf6e9bf9318
SHA25636d945ec458e6c0f856a64f0e5d85bebf5f87653d3bc77787573c14e5d93a360
SHA51236decbcfb44c6ef5e7cfe0c48db299c5436c126aedce567d9f04304762570153a1f1bd3d4b4f954000ea3898cd8cd0781a0b97eb061befa62982abbfa5c1aa05