Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
206s -
max time network
198s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
24/11/2022, 00:23
Static task
static1
Behavioral task
behavioral1
Sample
48bce367cdbf227506afd9188b94769bb2edbfbb4bfc8f1d22b2b9b1b5a1c632.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
48bce367cdbf227506afd9188b94769bb2edbfbb4bfc8f1d22b2b9b1b5a1c632.exe
Resource
win10v2004-20221111-en
General
-
Target
48bce367cdbf227506afd9188b94769bb2edbfbb4bfc8f1d22b2b9b1b5a1c632.exe
-
Size
132KB
-
MD5
1647b2f3918dd74d6d5ca8d872862120
-
SHA1
88cf066813b7053972de1f02ee66a0ccb1d1b2f6
-
SHA256
48bce367cdbf227506afd9188b94769bb2edbfbb4bfc8f1d22b2b9b1b5a1c632
-
SHA512
a6ce64ab2eaa7ec8bcd685b66ccdee7a592abbaca57ade5c8ae73abff5533d528ed5ac2d184bb335bf039e3ba68266bf5b5775b829d12787e28a222111eb7076
-
SSDEEP
1536:n41ZjiuypIIKZrDJxtJu9uRiIelOQ212IE6jDSUaWpsE4BjP4YTyDhQHy4ktXM:IZXyc89uRvsW6EqyDhayXM
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 48bce367cdbf227506afd9188b94769bb2edbfbb4bfc8f1d22b2b9b1b5a1c632.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" nejeb.exe -
Executes dropped EXE 1 IoCs
pid Process 4044 nejeb.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 48bce367cdbf227506afd9188b94769bb2edbfbb4bfc8f1d22b2b9b1b5a1c632.exe -
Adds Run key to start application 2 TTPs 28 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nejeb = "C:\\Users\\Admin\\nejeb.exe /s" nejeb.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nejeb = "C:\\Users\\Admin\\nejeb.exe /i" nejeb.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nejeb = "C:\\Users\\Admin\\nejeb.exe /g" nejeb.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nejeb = "C:\\Users\\Admin\\nejeb.exe /v" nejeb.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nejeb = "C:\\Users\\Admin\\nejeb.exe /f" nejeb.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nejeb = "C:\\Users\\Admin\\nejeb.exe /m" nejeb.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nejeb = "C:\\Users\\Admin\\nejeb.exe /k" nejeb.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nejeb = "C:\\Users\\Admin\\nejeb.exe /t" nejeb.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nejeb = "C:\\Users\\Admin\\nejeb.exe /n" nejeb.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nejeb = "C:\\Users\\Admin\\nejeb.exe /z" nejeb.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nejeb = "C:\\Users\\Admin\\nejeb.exe /y" nejeb.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nejeb = "C:\\Users\\Admin\\nejeb.exe /l" nejeb.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nejeb = "C:\\Users\\Admin\\nejeb.exe /o" nejeb.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nejeb = "C:\\Users\\Admin\\nejeb.exe /c" 48bce367cdbf227506afd9188b94769bb2edbfbb4bfc8f1d22b2b9b1b5a1c632.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nejeb = "C:\\Users\\Admin\\nejeb.exe /q" nejeb.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nejeb = "C:\\Users\\Admin\\nejeb.exe /j" nejeb.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nejeb = "C:\\Users\\Admin\\nejeb.exe /c" nejeb.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nejeb = "C:\\Users\\Admin\\nejeb.exe /r" nejeb.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nejeb = "C:\\Users\\Admin\\nejeb.exe /a" nejeb.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nejeb = "C:\\Users\\Admin\\nejeb.exe /e" nejeb.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 48bce367cdbf227506afd9188b94769bb2edbfbb4bfc8f1d22b2b9b1b5a1c632.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Windows\CurrentVersion\Run\ nejeb.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nejeb = "C:\\Users\\Admin\\nejeb.exe /h" nejeb.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nejeb = "C:\\Users\\Admin\\nejeb.exe /x" nejeb.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nejeb = "C:\\Users\\Admin\\nejeb.exe /p" nejeb.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nejeb = "C:\\Users\\Admin\\nejeb.exe /u" nejeb.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nejeb = "C:\\Users\\Admin\\nejeb.exe /b" nejeb.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nejeb = "C:\\Users\\Admin\\nejeb.exe /d" nejeb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4000 48bce367cdbf227506afd9188b94769bb2edbfbb4bfc8f1d22b2b9b1b5a1c632.exe 4000 48bce367cdbf227506afd9188b94769bb2edbfbb4bfc8f1d22b2b9b1b5a1c632.exe 4044 nejeb.exe 4044 nejeb.exe 4044 nejeb.exe 4044 nejeb.exe 4044 nejeb.exe 4044 nejeb.exe 4044 nejeb.exe 4044 nejeb.exe 4044 nejeb.exe 4044 nejeb.exe 4044 nejeb.exe 4044 nejeb.exe 4044 nejeb.exe 4044 nejeb.exe 4044 nejeb.exe 4044 nejeb.exe 4044 nejeb.exe 4044 nejeb.exe 4044 nejeb.exe 4044 nejeb.exe 4044 nejeb.exe 4044 nejeb.exe 4044 nejeb.exe 4044 nejeb.exe 4044 nejeb.exe 4044 nejeb.exe 4044 nejeb.exe 4044 nejeb.exe 4044 nejeb.exe 4044 nejeb.exe 4044 nejeb.exe 4044 nejeb.exe 4044 nejeb.exe 4044 nejeb.exe 4044 nejeb.exe 4044 nejeb.exe 4044 nejeb.exe 4044 nejeb.exe 4044 nejeb.exe 4044 nejeb.exe 4044 nejeb.exe 4044 nejeb.exe 4044 nejeb.exe 4044 nejeb.exe 4044 nejeb.exe 4044 nejeb.exe 4044 nejeb.exe 4044 nejeb.exe 4044 nejeb.exe 4044 nejeb.exe 4044 nejeb.exe 4044 nejeb.exe 4044 nejeb.exe 4044 nejeb.exe 4044 nejeb.exe 4044 nejeb.exe 4044 nejeb.exe 4044 nejeb.exe 4044 nejeb.exe 4044 nejeb.exe 4044 nejeb.exe 4044 nejeb.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4000 48bce367cdbf227506afd9188b94769bb2edbfbb4bfc8f1d22b2b9b1b5a1c632.exe 4044 nejeb.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4000 wrote to memory of 4044 4000 48bce367cdbf227506afd9188b94769bb2edbfbb4bfc8f1d22b2b9b1b5a1c632.exe 83 PID 4000 wrote to memory of 4044 4000 48bce367cdbf227506afd9188b94769bb2edbfbb4bfc8f1d22b2b9b1b5a1c632.exe 83 PID 4000 wrote to memory of 4044 4000 48bce367cdbf227506afd9188b94769bb2edbfbb4bfc8f1d22b2b9b1b5a1c632.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\48bce367cdbf227506afd9188b94769bb2edbfbb4bfc8f1d22b2b9b1b5a1c632.exe"C:\Users\Admin\AppData\Local\Temp\48bce367cdbf227506afd9188b94769bb2edbfbb4bfc8f1d22b2b9b1b5a1c632.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Users\Admin\nejeb.exe"C:\Users\Admin\nejeb.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4044
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
132KB
MD5b89025dbefa1d822efd0487311f0f74f
SHA16337bab1842214059822cc7876872f6171e79c98
SHA2569feaec1434ab7b61c02cba0d10f5d948ec5f735c6f8b89708f9d9ce4f4b437cc
SHA51200d6c72ad260c6e184b93bdd33ba2be5cf8dcb0e31dd6010a91e14066f338273bca70cb5d3a0ce333546369c3377a9cb1536d2ed85500f86957ef0a45a8ebadb
-
Filesize
132KB
MD5b89025dbefa1d822efd0487311f0f74f
SHA16337bab1842214059822cc7876872f6171e79c98
SHA2569feaec1434ab7b61c02cba0d10f5d948ec5f735c6f8b89708f9d9ce4f4b437cc
SHA51200d6c72ad260c6e184b93bdd33ba2be5cf8dcb0e31dd6010a91e14066f338273bca70cb5d3a0ce333546369c3377a9cb1536d2ed85500f86957ef0a45a8ebadb